Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
OUXkIxeP6k.exe

Overview

General Information

Sample Name:OUXkIxeP6k.exe
Original Sample Name:0dc689f7349bdb4df33cb582154b13a2.exe
Analysis ID:1301258
MD5:0dc689f7349bdb4df33cb582154b13a2
SHA1:307ffcd9039444a2ef35ad37c70acb2de777e98e
SHA256:e897a30c719b8fdd9972b29fed87fb410f02e83e1b937d984a94ff491dd2fc80
Tags:exenjratRAT
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Njrat
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Uses netsh to modify the Windows network and firewall settings
.NET source code references suspicious native API functions
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
.NET source code contains potential unpacker
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Modifies the windows firewall
Drops executables to the windows directory (C:\Windows) and starts them
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Creates files inside the system directory
May infect USB drives
Internet Provider seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • OUXkIxeP6k.exe (PID: 7256 cmdline: C:\Users\user\Desktop\OUXkIxeP6k.exe MD5: 0DC689F7349BDB4DF33CB582154B13A2)
    • server.exe (PID: 7324 cmdline: "C:\Windows\server.exe" MD5: 0DC689F7349BDB4DF33CB582154B13A2)
      • netsh.exe (PID: 7356 cmdline: netsh firewall add allowedprogram "C:\Windows\server.exe" "server.exe" ENABLE MD5: A0AA3322BB46BBFC36AB9DC1DBBBB807)
        • conhost.exe (PID: 7372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Host": "2.tcp.eu.ngrok.io", "Port": "10690", "Version": "im523", "Campaign ID": "HacKed", "Install Name": "server.exe", "Install Dir": "WinDir"}
SourceRuleDescriptionAuthorStrings
OUXkIxeP6k.exeJoeSecurity_NjratYara detected NjratJoe Security
    OUXkIxeP6k.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
    • 0x81f0:$s1: netsh firewall delete allowedprogram
    • 0x80e6:$s2: netsh firewall add allowedprogram
    • 0x8250:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
    • 0x7eda:$s4: Execute ERROR
    • 0x7f3a:$s4: Execute ERROR
    • 0x7efe:$s5: Download ERROR
    • 0x8296:$s6: [kl]
    OUXkIxeP6k.exenjrat1Identify njRatBrian Wallace @botnet_hunter
    • 0x80e6:$a1: netsh firewall add allowedprogram
    • 0x82e0:$b1: [TAP]
    • 0x8286:$b2: & exit
    • 0x8252:$c1: md.exe /k ping 0 & del
    OUXkIxeP6k.exeWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0x64c1:$a1: get_Registry
    • 0x7efe:$a3: Download ERROR
    • 0x81f0:$a5: netsh firewall delete allowedprogram "
    SourceRuleDescriptionAuthorStrings
    C:\Windows\server.exeJoeSecurity_NjratYara detected NjratJoe Security
      C:\Windows\server.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
      • 0x81f0:$s1: netsh firewall delete allowedprogram
      • 0x80e6:$s2: netsh firewall add allowedprogram
      • 0x8250:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
      • 0x7eda:$s4: Execute ERROR
      • 0x7f3a:$s4: Execute ERROR
      • 0x7efe:$s5: Download ERROR
      • 0x8296:$s6: [kl]
      C:\Windows\server.exenjrat1Identify njRatBrian Wallace @botnet_hunter
      • 0x80e6:$a1: netsh firewall add allowedprogram
      • 0x82e0:$b1: [TAP]
      • 0x8286:$b2: & exit
      • 0x8252:$c1: md.exe /k ping 0 & del
      C:\Windows\server.exeWindows_Trojan_Njrat_30f3c220unknownunknown
      • 0x64c1:$a1: get_Registry
      • 0x7efe:$a3: Download ERROR
      • 0x81f0:$a5: netsh firewall delete allowedprogram "
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.354961445.00000000003A2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
        00000000.00000000.354961445.00000000003A2000.00000002.00000001.01000000.00000003.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
        • 0x7ee6:$a1: netsh firewall add allowedprogram
        • 0x80e0:$b1: [TAP]
        • 0x8086:$b2: & exit
        • 0x8052:$c1: md.exe /k ping 0 & del
        00000000.00000000.354961445.00000000003A2000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
        • 0x62c1:$a1: get_Registry
        • 0x7cfe:$a3: Download ERROR
        • 0x7ff0:$a5: netsh firewall delete allowedprogram "
        Process Memory Space: OUXkIxeP6k.exe PID: 7256JoeSecurity_NjratYara detected NjratJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.OUXkIxeP6k.exe.3a0000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
            0.0.OUXkIxeP6k.exe.3a0000.0.unpackMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
            • 0x81f0:$s1: netsh firewall delete allowedprogram
            • 0x80e6:$s2: netsh firewall add allowedprogram
            • 0x8250:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
            • 0x7eda:$s4: Execute ERROR
            • 0x7f3a:$s4: Execute ERROR
            • 0x7efe:$s5: Download ERROR
            • 0x8296:$s6: [kl]
            0.0.OUXkIxeP6k.exe.3a0000.0.unpacknjrat1Identify njRatBrian Wallace @botnet_hunter
            • 0x80e6:$a1: netsh firewall add allowedprogram
            • 0x82e0:$b1: [TAP]
            • 0x8286:$b2: & exit
            • 0x8252:$c1: md.exe /k ping 0 & del
            0.0.OUXkIxeP6k.exe.3a0000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
            • 0x64c1:$a1: get_Registry
            • 0x7efe:$a3: Download ERROR
            • 0x81f0:$a5: netsh firewall delete allowedprogram "
            No Sigma rule has matched
            Timestamp:192.168.2.33.126.37.1849723106902814856 08/31/23-21:32:13.734430
            SID:2814856
            Source Port:49723
            Destination Port:10690
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.127.138.5749760106902814856 08/31/23-21:33:16.466826
            SID:2814856
            Source Port:49760
            Destination Port:10690
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.126.37.1849723106902033132 08/31/23-21:32:13.713721
            SID:2033132
            Source Port:49723
            Destination Port:10690
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.126.37.1849723106902814860 08/31/23-21:32:19.864748
            SID:2814860
            Source Port:49723
            Destination Port:10690
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.127.138.5749760106902825563 08/31/23-21:33:16.466826
            SID:2825563
            Source Port:49760
            Destination Port:10690
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.126.37.1849723106902825563 08/31/23-21:32:13.734430
            SID:2825563
            Source Port:49723
            Destination Port:10690
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.127.138.5749760106902814860 08/31/23-21:33:24.963755
            SID:2814860
            Source Port:49760
            Destination Port:10690
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.127.138.5749760106902825564 08/31/23-21:33:24.963755
            SID:2825564
            Source Port:49760
            Destination Port:10690
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.126.37.1849723106902825564 08/31/23-21:32:19.864748
            SID:2825564
            Source Port:49723
            Destination Port:10690
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.127.138.5749760106902033132 08/31/23-21:33:16.446871
            SID:2033132
            Source Port:49760
            Destination Port:10690
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000000.00000000.354961445.00000000003A2000.00000002.00000001.01000000.00000003.sdmpMalware Configuration Extractor: Njrat {"Host": "2.tcp.eu.ngrok.io", "Port": "10690", "Version": "im523", "Campaign ID": "HacKed", "Install Name": "server.exe", "Install Dir": "WinDir"}
            Source: OUXkIxeP6k.exeReversingLabs: Detection: 100%
            Source: Yara matchFile source: OUXkIxeP6k.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.OUXkIxeP6k.exe.3a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.354961445.00000000003A2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: OUXkIxeP6k.exe PID: 7256, type: MEMORYSTR
            Source: Yara matchFile source: C:\Windows\server.exe, type: DROPPED
            Source: OUXkIxeP6k.exeAvira: detected
            Source: 2.tcp.eu.ngrok.ioAvira URL Cloud: Label: malware
            Source: C:\Windows\server.exeAvira: detection malicious, Label: TR/ATRAPS.Gen
            Source: C:\Windows\server.exeReversingLabs: Detection: 100%
            Source: OUXkIxeP6k.exeJoe Sandbox ML: detected
            Source: C:\Windows\server.exeJoe Sandbox ML: detected
            Source: OUXkIxeP6k.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dllJump to behavior
            Source: OUXkIxeP6k.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: OUXkIxeP6k.exe, 00000000.00000002.369848003.00000000029E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
            Source: OUXkIxeP6k.exe, 00000000.00000002.369848003.00000000029E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
            Source: OUXkIxeP6k.exe, 00000000.00000000.354961445.00000000003A2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: autorun.inf
            Source: OUXkIxeP6k.exe, 00000000.00000000.354961445.00000000003A2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: [autorun]
            Source: server.exe, 00000001.00000002.626345907.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
            Source: server.exe, 00000001.00000002.626345907.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
            Source: OUXkIxeP6k.exeBinary or memory string: autorun.inf
            Source: OUXkIxeP6k.exeBinary or memory string: [autorun]
            Source: server.exe.0.drBinary or memory string: autorun.inf
            Source: server.exe.0.drBinary or memory string: [autorun]

            Networking

            barindex
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.3:49723 -> 3.126.37.18:10690
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.3:49723 -> 3.126.37.18:10690
            Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.3:49723 -> 3.126.37.18:10690
            Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.3:49723 -> 3.126.37.18:10690
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.3:49723 -> 3.126.37.18:10690
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.3:49760 -> 3.127.138.57:10690
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.3:49760 -> 3.127.138.57:10690
            Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.3:49760 -> 3.127.138.57:10690
            Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.3:49760 -> 3.127.138.57:10690
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.3:49760 -> 3.127.138.57:10690
            Source: Malware configuration extractorURLs: 2.tcp.eu.ngrok.io
            Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
            Source: Joe Sandbox ViewIP Address: 3.126.37.18 3.126.37.18
            Source: Joe Sandbox ViewIP Address: 3.127.138.57 3.127.138.57
            Source: global trafficTCP traffic: 192.168.2.3:49723 -> 3.126.37.18:10690
            Source: global trafficTCP traffic: 192.168.2.3:49760 -> 3.127.138.57:10690
            Source: OUXkIxeP6k.exe, server.exe.0.drString found in binary or memory: https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0
            Source: unknownDNS traffic detected: queries for: 2.tcp.eu.ngrok.io

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: OUXkIxeP6k.exe, kl.cs.Net Code: VKCodeToUnicode
            Source: server.exe.0.dr, kl.cs.Net Code: VKCodeToUnicode
            Source: OUXkIxeP6k.exe, 00000000.00000002.369715152.0000000000A00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>memstr_8c221038-d

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: OUXkIxeP6k.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.OUXkIxeP6k.exe.3a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.354961445.00000000003A2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: OUXkIxeP6k.exe PID: 7256, type: MEMORYSTR
            Source: Yara matchFile source: C:\Windows\server.exe, type: DROPPED

            System Summary

            barindex
            Source: OUXkIxeP6k.exe, type: SAMPLEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: OUXkIxeP6k.exe, type: SAMPLEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: OUXkIxeP6k.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 0.0.OUXkIxeP6k.exe.3a0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 0.0.OUXkIxeP6k.exe.3a0000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.0.OUXkIxeP6k.exe.3a0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 00000000.00000000.354961445.00000000003A2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000000.00000000.354961445.00000000003A2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: C:\Windows\server.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Windows\server.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: C:\Windows\server.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: OUXkIxeP6k.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: OUXkIxeP6k.exe, type: SAMPLEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: OUXkIxeP6k.exe, type: SAMPLEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: OUXkIxeP6k.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 0.0.OUXkIxeP6k.exe.3a0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 0.0.OUXkIxeP6k.exe.3a0000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.0.OUXkIxeP6k.exe.3a0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 00000000.00000000.354961445.00000000003A2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000000.00000000.354961445.00000000003A2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: C:\Windows\server.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Windows\server.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: C:\Windows\server.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeFile created: C:\Windows\server.exeJump to behavior
            Source: OUXkIxeP6k.exeReversingLabs: Detection: 100%
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeFile read: C:\Users\user\Desktop\OUXkIxeP6k.exeJump to behavior
            Source: OUXkIxeP6k.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\OUXkIxeP6k.exe C:\Users\user\Desktop\OUXkIxeP6k.exe
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess created: C:\Windows\server.exe "C:\Windows\server.exe"
            Source: C:\Windows\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Windows\server.exe" "server.exe" ENABLE
            Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess created: C:\Windows\server.exe "C:\Windows\server.exe" Jump to behavior
            Source: C:\Windows\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Windows\server.exe" "server.exe" ENABLEJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
            Source: C:\Windows\server.exeCode function: 1_2_028927FE AdjustTokenPrivileges,1_2_028927FE
            Source: C:\Windows\server.exeCode function: 1_2_028927C7 AdjustTokenPrivileges,1_2_028927C7
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\OUXkIxeP6k.exe.logJump to behavior
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/4@2/2
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: OUXkIxeP6k.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
            Source: C:\Windows\server.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dllJump to behavior
            Source: C:\Windows\server.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
            Source: C:\Windows\server.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
            Source: C:\Windows\server.exeMutant created: \Sessions\1\BaseNamedObjects\c0cc0018757f2f3aabdafb7e8d266657
            Source: C:\Windows\server.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7372:120:WilError_01
            Source: C:\Windows\server.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\server.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dllJump to behavior
            Source: OUXkIxeP6k.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: OUXkIxeP6k.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: OUXkIxeP6k.exe, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: server.exe.0.dr, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])

            Persistence and Installation Behavior

            barindex
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeExecutable created and started: C:\Windows\server.exeJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeFile created: C:\Windows\server.exeJump to dropped file
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeFile created: C:\Windows\server.exeJump to dropped file
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exe TID: 7276Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\server.exe TID: 7368Thread sleep count: 6270 > 30Jump to behavior
            Source: C:\Windows\server.exeLast function: Thread delayed
            Source: C:\Windows\server.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\server.exeWindow / User API: threadDelayed 6270Jump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: server.exe, 00000001.00000002.624400292.0000000000C6B000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000002.00000003.385494218.0000000000D53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Windows\server.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: OUXkIxeP6k.exe, kl.csReference to suspicious API methods: MapVirtualKey(a, 0u)
            Source: OUXkIxeP6k.exe, kl.csReference to suspicious API methods: GetAsyncKeyState(num2)
            Source: OUXkIxeP6k.exe, OK.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, 100, ref lpszVer, 100)
            Source: C:\Users\user\Desktop\OUXkIxeP6k.exeProcess created: C:\Windows\server.exe "C:\Windows\server.exe" Jump to behavior
            Source: server.exe, 00000001.00000002.626345907.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.626345907.0000000002C86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: server.exe, 00000001.00000002.626345907.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.626345907.0000000002C86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager|9dk
            Source: server.exe, 00000001.00000002.626345907.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000001.00000002.626345907.0000000002C86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager<
            Source: C:\Windows\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\server.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: C:\Windows\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Windows\server.exe" "server.exe" ENABLE
            Source: C:\Windows\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Windows\server.exe" "server.exe" ENABLE

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: OUXkIxeP6k.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.OUXkIxeP6k.exe.3a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.354961445.00000000003A2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: OUXkIxeP6k.exe PID: 7256, type: MEMORYSTR
            Source: Yara matchFile source: C:\Windows\server.exe, type: DROPPED

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: OUXkIxeP6k.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.OUXkIxeP6k.exe.3a0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.354961445.00000000003A2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: OUXkIxeP6k.exe PID: 7256, type: MEMORYSTR
            Source: Yara matchFile source: C:\Windows\server.exe, type: DROPPED
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            1
            Replication Through Removable Media
            1
            Native API
            Path Interception1
            Access Token Manipulation
            121
            Masquerading
            11
            Input Capture
            11
            Security Software Discovery
            1
            Replication Through Removable Media
            11
            Input Capture
            Exfiltration Over Other Network Medium1
            Non-Standard Port
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts12
            Process Injection
            21
            Disable or Modify Tools
            LSASS Memory1
            Process Discovery
            Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
            Non-Application Layer Protocol
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
            Virtualization/Sandbox Evasion
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration11
            Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
            Access Token Manipulation
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script12
            Process Injection
            LSA Secrets1
            Peripheral Device Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common1
            Software Packing
            Cached Domain Credentials1
            Remote System Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync1
            File and Directory Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem12
            System Information Discovery
            Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            OUXkIxeP6k.exe100%ReversingLabsByteCode-MSIL.Backdoor.Ratenjay
            OUXkIxeP6k.exe100%AviraTR/ATRAPS.Gen
            OUXkIxeP6k.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Windows\server.exe100%AviraTR/ATRAPS.Gen
            C:\Windows\server.exe100%Joe Sandbox ML
            C:\Windows\server.exe100%ReversingLabsByteCode-MSIL.Backdoor.Ratenjay
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            2.tcp.eu.ngrok.io100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            2.tcp.eu.ngrok.io
            3.126.37.18
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              2.tcp.eu.ngrok.iotrue
              • Avira URL Cloud: malware
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0OUXkIxeP6k.exe, server.exe.0.drfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                3.126.37.18
                2.tcp.eu.ngrok.ioUnited States
                16509AMAZON-02UStrue
                3.127.138.57
                unknownUnited States
                16509AMAZON-02UStrue
                Joe Sandbox Version:38.0.0 Beryl
                Analysis ID:1301258
                Start date and time:2023-08-31 21:31:08 +02:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 7m 49s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:24
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample file name:OUXkIxeP6k.exe
                Original Sample Name:0dc689f7349bdb4df33cb582154b13a2.exe
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winEXE@6/4@2/2
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 106
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, eudb.ris.api.iris.microsoft.com, tse1.mm.bing.net, displaycatalog.mp.microsoft.com, g.bing.com, arc.msn.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: OUXkIxeP6k.exe
                No simulations
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                3.126.37.18eI43OwXSvq.exeGet hashmaliciousNjratBrowse
                  p0zYXkMETE.exeGet hashmaliciousNjratBrowse
                    i9z1c1OtFb.exeGet hashmaliciousNjratBrowse
                      7XyFhq6BDj.exeGet hashmaliciousNjratBrowse
                        JYGc3o49WE.exeGet hashmaliciousNjratBrowse
                          J6VIiRgq3w.exeGet hashmaliciousNjratBrowse
                            cTUu5Po5Hy.exeGet hashmaliciousNjratBrowse
                              KcWQQO3nZP.exeGet hashmaliciousNjratBrowse
                                zep8vTa4sg.exeGet hashmaliciousNjratBrowse
                                  u1LwUkKDIF.exeGet hashmaliciousNjratBrowse
                                    QBEgLAO40T.exeGet hashmaliciousNjratBrowse
                                      yPGBUzqVE3.exeGet hashmaliciousNjratBrowse
                                        LMva1J8Xkv.exeGet hashmaliciousNjratBrowse
                                          XlNjZS4E8x.exeGet hashmaliciousNjratBrowse
                                            YQAqWBVnuI.exeGet hashmaliciousNjratBrowse
                                              H7mLbVb7Tm.exeGet hashmaliciousNjratBrowse
                                                ojgIfElGah.exeGet hashmaliciousnjRatBrowse
                                                  08805499.dat.exeGet hashmaliciousNjratBrowse
                                                    jRnGamS2MZ.exeGet hashmaliciousNjratBrowse
                                                      6q6pkV893f.exeGet hashmaliciousnjRatBrowse
                                                        3.127.138.57eI43OwXSvq.exeGet hashmaliciousNjratBrowse
                                                          i9z1c1OtFb.exeGet hashmaliciousNjratBrowse
                                                            JYGc3o49WE.exeGet hashmaliciousNjratBrowse
                                                              J6VIiRgq3w.exeGet hashmaliciousNjratBrowse
                                                                7JdbeSrZ6s.exeGet hashmaliciousNjratBrowse
                                                                  KcWQQO3nZP.exeGet hashmaliciousNjratBrowse
                                                                    zep8vTa4sg.exeGet hashmaliciousNjratBrowse
                                                                      umyExrpkSF.exeGet hashmaliciousNjratBrowse
                                                                        QBEgLAO40T.exeGet hashmaliciousNjratBrowse
                                                                          4KWKhZNy9w.exeGet hashmaliciousNjratBrowse
                                                                            yPGBUzqVE3.exeGet hashmaliciousNjratBrowse
                                                                              D02E3399D85D6B14B30F440181EF5B8FE6B55C403B8C7.exeGet hashmaliciousnjRatBrowse
                                                                                2dZGR4PTLu.exeGet hashmaliciousNjratBrowse
                                                                                  LMva1J8Xkv.exeGet hashmaliciousNjratBrowse
                                                                                    XlNjZS4E8x.exeGet hashmaliciousNjratBrowse
                                                                                      1F3YBPagot.exeGet hashmaliciousNanocoreBrowse
                                                                                        H7mLbVb7Tm.exeGet hashmaliciousNjratBrowse
                                                                                          ojgIfElGah.exeGet hashmaliciousnjRatBrowse
                                                                                            GpVp3vYsZG.exeGet hashmaliciousNjratBrowse
                                                                                              xTKMqFC7DI.exeGet hashmaliciousNjratBrowse
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                2.tcp.eu.ngrok.ioQzzmZiGinp.exeGet hashmaliciousNjratBrowse
                                                                                                • 18.156.13.209
                                                                                                eI43OwXSvq.exeGet hashmaliciousNjratBrowse
                                                                                                • 18.197.239.5
                                                                                                p0zYXkMETE.exeGet hashmaliciousNjratBrowse
                                                                                                • 18.157.68.73
                                                                                                i9z1c1OtFb.exeGet hashmaliciousNjratBrowse
                                                                                                • 18.157.68.73
                                                                                                aF73k2XwGj.exeGet hashmaliciousNjratBrowse
                                                                                                • 18.192.93.86
                                                                                                7XyFhq6BDj.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.126.37.18
                                                                                                JYGc3o49WE.exeGet hashmaliciousNjratBrowse
                                                                                                • 18.157.68.73
                                                                                                J6VIiRgq3w.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.126.37.18
                                                                                                cTUu5Po5Hy.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.126.37.18
                                                                                                7JdbeSrZ6s.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.127.138.57
                                                                                                KcWQQO3nZP.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.126.37.18
                                                                                                zep8vTa4sg.exeGet hashmaliciousNjratBrowse
                                                                                                • 18.156.13.209
                                                                                                umyExrpkSF.exeGet hashmaliciousNjratBrowse
                                                                                                • 18.192.93.86
                                                                                                u1LwUkKDIF.exeGet hashmaliciousNjratBrowse
                                                                                                • 18.192.93.86
                                                                                                QBEgLAO40T.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.126.37.18
                                                                                                ps2ZmIdNTG.exeGet hashmaliciousNjratBrowse
                                                                                                • 18.157.68.73
                                                                                                4KWKhZNy9w.exeGet hashmaliciousNjratBrowse
                                                                                                • 18.197.239.5
                                                                                                yPGBUzqVE3.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.126.37.18
                                                                                                D02E3399D85D6B14B30F440181EF5B8FE6B55C403B8C7.exeGet hashmaliciousnjRatBrowse
                                                                                                • 18.156.13.209
                                                                                                2dZGR4PTLu.exeGet hashmaliciousNjratBrowse
                                                                                                • 18.157.68.73
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                AMAZON-02US_DM6PR14MB31321AF1D1740AED16B5EFA6B9E7A@DM6PR14MB3132.namprd14.prod.outlook.com_.emlGet hashmaliciousHTMLPhisher, ReCaptcha PhishBrowse
                                                                                                • 108.138.17.19
                                                                                                https://drilikath.com/cap?userid=hdelcambre@hilcorp.comGet hashmaliciousUnknownBrowse
                                                                                                • 35.158.23.65
                                                                                                https://drilikath.com/cap?userid=hdelcambre@hilcorp.comGet hashmaliciousUnknownBrowse
                                                                                                • 35.158.23.65
                                                                                                file.exeGet hashmaliciousFabookie, PrivateLoader, RedLine, SmokeLoader, TofseeBrowse
                                                                                                • 104.192.141.1
                                                                                                https://ppehostednetwork.guycirinelli.com/?vdogrdbyGet hashmaliciousUnknownBrowse
                                                                                                • 13.224.98.110
                                                                                                Q2'23 NL Valuation Summary.xlsxGet hashmaliciousUnknownBrowse
                                                                                                • 18.200.152.171
                                                                                                Q2'23 NL Valuation Summary.xlsxGet hashmaliciousUnknownBrowse
                                                                                                • 34.254.70.163
                                                                                                https://gem.godaddy.com/signups/activate/MS0td1p0ZTVQU3dBaVRWNVZXdkh4bDcwYks3ckI1bE56WmlZempOdWNIbWtzOHpuMVZHQllhSU5HNVIvcnJQZXdVUVJYTVUvd1R5elNvUTlqYVkvK3FBOFJRSXVSYVlJVTg9LS1QT2k5a0dNT3pOR1NiZFZnLS1iL3F4ODFHRi9URUYxc2lqcVhZeW1BPT0=?signup=6865562#ZGd3b3pkQGdjZ2FtaW5nLmNvbQ==Get hashmaliciousUnknownBrowse
                                                                                                • 13.224.98.160
                                                                                                https://app.pandadoc.com/document/3da17b170b8e34c034287f3d2181d5a568efff87Get hashmaliciousUnknownBrowse
                                                                                                • 52.10.63.124
                                                                                                6XXFpOCDeW.elfGet hashmaliciousMiraiBrowse
                                                                                                • 54.75.118.133
                                                                                                https://www.google.com/url?q=https://fqxgsh0f.page.link/H3Ed&source=gmail&ust=1693388827913000&usg=AOvVaw2gSJuJy6IwbTMljBQrm053Get hashmaliciousUnknownBrowse
                                                                                                • 18.156.195.47
                                                                                                http://crisgiano.sa.comGet hashmaliciousUnknownBrowse
                                                                                                • 13.224.98.49
                                                                                                https://lwyzv.goodairinc.xyz/?tgr=hkryzamphbnNvbkBiYWx0aW1vcmVhaXJjb2lsLmNvbQ==Get hashmaliciousUnknownBrowse
                                                                                                • 52.58.204.254
                                                                                                YC9n8RA9up.exeGet hashmaliciousNjratBrowse
                                                                                                • 18.158.249.75
                                                                                                _DM6PR05MB686012347D799C97F451008A88E6A@DM6PR05MB6860.namprd05.prod.outlook.com_.emlGet hashmaliciousHTMLPhisher, ReCaptcha PhishBrowse
                                                                                                • 13.225.78.99
                                                                                                https://indd.adobe.com/view/e5ca83a5-550b-4290-a4b3-167717c2d2b4Get hashmaliciousHTMLPhisherBrowse
                                                                                                • 13.224.103.118
                                                                                                https://conta.cc/3qSCcoeGet hashmaliciousUnknownBrowse
                                                                                                • 143.204.98.27
                                                                                                http://menti.com/aleehsdzay9hGet hashmaliciousUnknownBrowse
                                                                                                • 35.158.23.65
                                                                                                http://menti.com/aleehsdzay9hGet hashmaliciousUnknownBrowse
                                                                                                • 35.158.23.65
                                                                                                https://r20.rs6.net/tn.jsp?f=001iv8RXBraOwtuVKXJ2y_68h-bd0nNuBI7zvxiu2i5gyZNWL6D36wVM9cb45sZ8pjjX4EUtu7D3wZdavYTVjC33qKIY28g4o6KUlV2nGpUuWFHwtpXqT9nBQ0l2gpK2CcqhLZJhN222ljqULFwhKdFZA==&c=&ch=$#c2FyYS5hbGxlbkBzb2pvdXJucy5vcmc=Get hashmaliciousUnknownBrowse
                                                                                                • 35.158.23.65
                                                                                                No context
                                                                                                No context
                                                                                                Process:C:\Users\user\Desktop\OUXkIxeP6k.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:modified
                                                                                                Size (bytes):525
                                                                                                Entropy (8bit):5.2874233355119316
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:Q3LaJU20NaL10Ug+9Yz9t0U29hJ5g1B0U2ukyrFk7v:MLF20NaL3z2p29hJ5g522r0
                                                                                                MD5:80EFBEC081D7836D240503C4C9465FEC
                                                                                                SHA1:6AF398E08A359457083727BAF296445030A55AC3
                                                                                                SHA-256:C73F730EB5E05D15FAD6BE10AB51FE4D8A80B5E88B89D8BC80CC1DF09ACE1523
                                                                                                SHA-512:DEC3B1D9403894418AFD4433629CA6476C7BD359963328D17B93283B52EEC18B3725D2F02F0E9A142E705398DDDCE244D53829570E9DE1A87060A7DABFDCE5B3
                                                                                                Malicious:false
                                                                                                Reputation:high, very likely benign file
                                                                                                Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..
                                                                                                Process:C:\Users\user\Desktop\OUXkIxeP6k.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):37888
                                                                                                Entropy (8bit):5.575283234556748
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:F6/gUiDrblmJEpRGyEfdDPTuWCYqAlyrAF+rMRTyN/0L+EcoinblneHQM3epzXBu:c/yHpR9EfdDCWClA0rM+rMRa8Nun6t
                                                                                                MD5:0DC689F7349BDB4DF33CB582154B13A2
                                                                                                SHA1:307FFCD9039444A2EF35AD37C70ACB2DE777E98E
                                                                                                SHA-256:E897A30C719B8FDD9972B29FED87FB410F02E83E1B937D984A94FF491DD2FC80
                                                                                                SHA-512:A20A81D3DA075EAE8BF8CD0A7B5544CC1693903EFF7FDC1CBCB049AA986209B1C46E8AB729231B121733A57C310ABDAB13D1C7078A9807F7BC0B8725DE59677B
                                                                                                Malicious:true
                                                                                                Yara Hits:
                                                                                                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Windows\server.exe, Author: Joe Security
                                                                                                • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Windows\server.exe, Author: ditekSHen
                                                                                                • Rule: njrat1, Description: Identify njRat, Source: C:\Windows\server.exe, Author: Brian Wallace @botnet_hunter
                                                                                                • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Windows\server.exe, Author: unknown
                                                                                                Antivirus:
                                                                                                • Antivirus: Avira, Detection: 100%
                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                • Antivirus: ReversingLabs, Detection: 100%
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d................................. ........@.. ....................................@.................................p...K.......@............................................................................ ............... ..H............text....... ...................... ..`.rsrc...@...........................@..@.reloc..............................@..B........................H........e...E..........................................................&.(......**..(......*.s.........s.........s.........s..........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                                                                                Process:C:\Users\user\Desktop\OUXkIxeP6k.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):26
                                                                                                Entropy (8bit):3.95006375643621
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:ggPYV:rPYV
                                                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                Malicious:false
                                                                                                Reputation:high, very likely benign file
                                                                                                Preview:[ZoneTransfer]....ZoneId=0
                                                                                                Process:C:\Windows\SysWOW64\netsh.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):313
                                                                                                Entropy (8bit):4.971939296804078
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
                                                                                                MD5:689E2126A85BF55121488295EE068FA1
                                                                                                SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
                                                                                                SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
                                                                                                SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
                                                                                                Malicious:false
                                                                                                Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
                                                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Entropy (8bit):5.575283234556748
                                                                                                TrID:
                                                                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                • Windows Screen Saver (13104/52) 0.07%
                                                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                File name:OUXkIxeP6k.exe
                                                                                                File size:37'888 bytes
                                                                                                MD5:0dc689f7349bdb4df33cb582154b13a2
                                                                                                SHA1:307ffcd9039444a2ef35ad37c70acb2de777e98e
                                                                                                SHA256:e897a30c719b8fdd9972b29fed87fb410f02e83e1b937d984a94ff491dd2fc80
                                                                                                SHA512:a20a81d3da075eae8bf8cd0a7b5544cc1693903eff7fdc1cbcb049aa986209b1c46e8ab729231b121733a57c310abdab13d1c7078a9807f7bc0b8725de59677b
                                                                                                SSDEEP:384:F6/gUiDrblmJEpRGyEfdDPTuWCYqAlyrAF+rMRTyN/0L+EcoinblneHQM3epzXBu:c/yHpR9EfdDCWClA0rM+rMRa8Nun6t
                                                                                                TLSH:BA032A4D7FE18168C5FD157B05B2D41207BBE04B6E23D90E8EE564AA37636C18B90EF2
                                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d................................. ........@.. ....................................@................................
                                                                                                Icon Hash:90cececece8e8eb0
                                                                                                Entrypoint:0x40abbe
                                                                                                Entrypoint Section:.text
                                                                                                Digitally signed:false
                                                                                                Imagebase:0x400000
                                                                                                Subsystem:windows gui
                                                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                Time Stamp:0x64ED9B84 [Tue Aug 29 07:17:24 2023 UTC]
                                                                                                TLS Callbacks:
                                                                                                CLR (.Net) Version:
                                                                                                OS Version Major:4
                                                                                                OS Version Minor:0
                                                                                                File Version Major:4
                                                                                                File Version Minor:0
                                                                                                Subsystem Version Major:4
                                                                                                Subsystem Version Minor:0
                                                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                Instruction
                                                                                                jmp dword ptr [00402000h]
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xab700x4b.text
                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x240.rsrc
                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xe0000xc.reloc
                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                .text0x20000x8bc40x8c00False0.463671875data5.606637071256186IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                .rsrc0xc0000x2400x400False0.3134765625data4.968771659524424IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                .reloc0xe0000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                RT_MANIFEST0xc0580x1e7XML 1.0 document, ASCII text, with CRLF line terminators0.5338809034907598
                                                                                                DLLImport
                                                                                                mscoree.dll_CorExeMain
                                                                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                192.168.2.33.126.37.1849723106902814856 08/31/23-21:32:13.734430TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4972310690192.168.2.33.126.37.18
                                                                                                192.168.2.33.127.138.5749760106902814856 08/31/23-21:33:16.466826TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4976010690192.168.2.33.127.138.57
                                                                                                192.168.2.33.126.37.1849723106902033132 08/31/23-21:32:13.713721TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4972310690192.168.2.33.126.37.18
                                                                                                192.168.2.33.126.37.1849723106902814860 08/31/23-21:32:19.864748TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4972310690192.168.2.33.126.37.18
                                                                                                192.168.2.33.127.138.5749760106902825563 08/31/23-21:33:16.466826TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4976010690192.168.2.33.127.138.57
                                                                                                192.168.2.33.126.37.1849723106902825563 08/31/23-21:32:13.734430TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4972310690192.168.2.33.126.37.18
                                                                                                192.168.2.33.127.138.5749760106902814860 08/31/23-21:33:24.963755TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4976010690192.168.2.33.127.138.57
                                                                                                192.168.2.33.127.138.5749760106902825564 08/31/23-21:33:24.963755TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4976010690192.168.2.33.127.138.57
                                                                                                192.168.2.33.126.37.1849723106902825564 08/31/23-21:32:19.864748TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4972310690192.168.2.33.126.37.18
                                                                                                192.168.2.33.127.138.5749760106902033132 08/31/23-21:33:16.446871TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4976010690192.168.2.33.127.138.57
                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Aug 31, 2023 21:32:13.474442959 CEST4972310690192.168.2.33.126.37.18
                                                                                                Aug 31, 2023 21:32:13.494698048 CEST10690497233.126.37.18192.168.2.3
                                                                                                Aug 31, 2023 21:32:13.494904995 CEST4972310690192.168.2.33.126.37.18
                                                                                                Aug 31, 2023 21:32:13.713721037 CEST4972310690192.168.2.33.126.37.18
                                                                                                Aug 31, 2023 21:32:13.734252930 CEST10690497233.126.37.18192.168.2.3
                                                                                                Aug 31, 2023 21:32:13.734430075 CEST4972310690192.168.2.33.126.37.18
                                                                                                Aug 31, 2023 21:32:13.754625082 CEST10690497233.126.37.18192.168.2.3
                                                                                                Aug 31, 2023 21:32:19.864748001 CEST4972310690192.168.2.33.126.37.18
                                                                                                Aug 31, 2023 21:32:19.884938955 CEST10690497233.126.37.18192.168.2.3
                                                                                                Aug 31, 2023 21:32:35.068965912 CEST10690497233.126.37.18192.168.2.3
                                                                                                Aug 31, 2023 21:32:35.069312096 CEST4972310690192.168.2.33.126.37.18
                                                                                                Aug 31, 2023 21:32:50.172981024 CEST10690497233.126.37.18192.168.2.3
                                                                                                Aug 31, 2023 21:32:50.173156023 CEST4972310690192.168.2.33.126.37.18
                                                                                                Aug 31, 2023 21:33:05.280889034 CEST10690497233.126.37.18192.168.2.3
                                                                                                Aug 31, 2023 21:33:05.281157970 CEST4972310690192.168.2.33.126.37.18
                                                                                                Aug 31, 2023 21:33:14.328603029 CEST10690497233.126.37.18192.168.2.3
                                                                                                Aug 31, 2023 21:33:14.328994036 CEST4972310690192.168.2.33.126.37.18
                                                                                                Aug 31, 2023 21:33:16.338255882 CEST4972310690192.168.2.33.126.37.18
                                                                                                Aug 31, 2023 21:33:16.358678102 CEST10690497233.126.37.18192.168.2.3
                                                                                                Aug 31, 2023 21:33:16.412348032 CEST4976010690192.168.2.33.127.138.57
                                                                                                Aug 31, 2023 21:33:16.432238102 CEST10690497603.127.138.57192.168.2.3
                                                                                                Aug 31, 2023 21:33:16.432447910 CEST4976010690192.168.2.33.127.138.57
                                                                                                Aug 31, 2023 21:33:16.446871042 CEST4976010690192.168.2.33.127.138.57
                                                                                                Aug 31, 2023 21:33:16.466691017 CEST10690497603.127.138.57192.168.2.3
                                                                                                Aug 31, 2023 21:33:16.466825962 CEST4976010690192.168.2.33.127.138.57
                                                                                                Aug 31, 2023 21:33:16.486782074 CEST10690497603.127.138.57192.168.2.3
                                                                                                Aug 31, 2023 21:33:16.837976933 CEST4976010690192.168.2.33.127.138.57
                                                                                                Aug 31, 2023 21:33:16.857451916 CEST10690497603.127.138.57192.168.2.3
                                                                                                Aug 31, 2023 21:33:24.963754892 CEST4976010690192.168.2.33.127.138.57
                                                                                                Aug 31, 2023 21:33:24.983755112 CEST10690497603.127.138.57192.168.2.3
                                                                                                Aug 31, 2023 21:33:40.243279934 CEST10690497603.127.138.57192.168.2.3
                                                                                                Aug 31, 2023 21:33:40.243442059 CEST4976010690192.168.2.33.127.138.57
                                                                                                Aug 31, 2023 21:33:55.343378067 CEST10690497603.127.138.57192.168.2.3
                                                                                                Aug 31, 2023 21:33:55.343622923 CEST4976010690192.168.2.33.127.138.57
                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Aug 31, 2023 21:32:13.433357000 CEST5167453192.168.2.38.8.8.8
                                                                                                Aug 31, 2023 21:32:13.469288111 CEST53516748.8.8.8192.168.2.3
                                                                                                Aug 31, 2023 21:33:16.371946096 CEST5694453192.168.2.38.8.8.8
                                                                                                Aug 31, 2023 21:33:16.409573078 CEST53569448.8.8.8192.168.2.3
                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                Aug 31, 2023 21:32:13.433357000 CEST192.168.2.38.8.8.80x91a7Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                                                Aug 31, 2023 21:33:16.371946096 CEST192.168.2.38.8.8.80x3c96Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                Aug 31, 2023 21:32:13.469288111 CEST8.8.8.8192.168.2.30x91a7No error (0)2.tcp.eu.ngrok.io3.126.37.18A (IP address)IN (0x0001)false
                                                                                                Aug 31, 2023 21:33:16.409573078 CEST8.8.8.8192.168.2.30x3c96No error (0)2.tcp.eu.ngrok.io3.127.138.57A (IP address)IN (0x0001)false

                                                                                                Click to jump to process

                                                                                                Click to jump to process

                                                                                                Click to dive into process behavior distribution

                                                                                                Click to jump to process

                                                                                                Target ID:0
                                                                                                Start time:21:31:56
                                                                                                Start date:31/08/2023
                                                                                                Path:C:\Users\user\Desktop\OUXkIxeP6k.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\Desktop\OUXkIxeP6k.exe
                                                                                                Imagebase:0x3a0000
                                                                                                File size:37'888 bytes
                                                                                                MD5 hash:0DC689F7349BDB4DF33CB582154B13A2
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.354961445.00000000003A2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                                • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000000.354961445.00000000003A2000.00000002.00000001.01000000.00000003.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                                • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000000.354961445.00000000003A2000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:1
                                                                                                Start time:21:32:03
                                                                                                Start date:31/08/2023
                                                                                                Path:C:\Windows\server.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Windows\server.exe"
                                                                                                Imagebase:0x510000
                                                                                                File size:37'888 bytes
                                                                                                MD5 hash:0DC689F7349BDB4DF33CB582154B13A2
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Windows\server.exe, Author: Joe Security
                                                                                                • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Windows\server.exe, Author: ditekSHen
                                                                                                • Rule: njrat1, Description: Identify njRat, Source: C:\Windows\server.exe, Author: Brian Wallace @botnet_hunter
                                                                                                • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Windows\server.exe, Author: unknown
                                                                                                Antivirus matches:
                                                                                                • Detection: 100%, Avira
                                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                                • Detection: 100%, ReversingLabs
                                                                                                Reputation:low
                                                                                                Has exited:false

                                                                                                Target ID:2
                                                                                                Start time:21:32:10
                                                                                                Start date:31/08/2023
                                                                                                Path:C:\Windows\SysWOW64\netsh.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:netsh firewall add allowedprogram "C:\Windows\server.exe" "server.exe" ENABLE
                                                                                                Imagebase:0x1280000
                                                                                                File size:82'944 bytes
                                                                                                MD5 hash:A0AA3322BB46BBFC36AB9DC1DBBBB807
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:3
                                                                                                Start time:21:32:10
                                                                                                Start date:31/08/2023
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff766460000
                                                                                                File size:625'664 bytes
                                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Reset < >

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:9.6%
                                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                                  Signature Coverage:0%
                                                                                                  Total number of Nodes:31
                                                                                                  Total number of Limit Nodes:1
                                                                                                  execution_graph 1829 81a361 1830 81a392 RegQueryValueExW 1829->1830 1832 81a41b 1830->1832 1817 81a612 1819 81a646 CreateMutexW 1817->1819 1820 81a6c1 1819->1820 1825 81a2d2 1826 81a2d6 SetErrorMode 1825->1826 1828 81a33f 1826->1828 1833 81a462 1835 81a486 RegSetValueExW 1833->1835 1836 81a507 1835->1836 1821 81a8a4 1823 81a8c6 SetFileAttributesW 1821->1823 1824 81a90b 1823->1824 1813 81aa07 1814 81aa3e CopyFileW 1813->1814 1816 81aa8e 1814->1816 1793 81a8c6 1794 81a8ef SetFileAttributesW 1793->1794 1796 81a90b 1794->1796 1797 81a646 1800 81a67e CreateMutexW 1797->1800 1799 81a6c1 1800->1799 1805 81aa3e 1806 81aa67 CopyFileW 1805->1806 1808 81aa8e 1806->1808 1809 81a2fe 1810 81a32a SetErrorMode 1809->1810 1811 81a353 1809->1811 1812 81a33f 1810->1812 1811->1810

                                                                                                  Callgraph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  • Opacity -> Relevance
                                                                                                  • Disassembly available
                                                                                                  callgraph 0 Function_0081A005 1 Function_0081AA07 2 Function_00EE0968 44 Function_009C05D0 2->44 65 Function_009C05F6 2->65 3 Function_0081A486 4 Function_0081AB06 5 Function_0081AC11 6 Function_0081A710 7 Function_0081A392 8 Function_0081A612 9 Function_00812194 10 Function_00812098 11 Function_0081A09A 12 Function_009C0000 13 Function_009C0700 14 Function_0081289D 15 Function_0081201C 16 Function_0081A81E 17 Function_0081AB9E 18 Function_0081A120 19 Function_009C0638 37 Function_009C065A 19->37 20 Function_0081A8A4 21 Function_0081AC24 22 Function_009C05B0 23 Function_009C0730 24 Function_00EE0D40 25 Function_0081A02E 26 Function_00812430 27 Function_008122B4 28 Function_00EE0F58 29 Function_00EE0E55 30 Function_008123BC 31 Function_0081213C 32 Function_0081A23C 33 Function_0081AA3E 34 Function_009C025D 35 Function_0081A540 36 Function_00812044 38 Function_0081A7C7 39 Function_0081ACC7 40 Function_00EE0BA8 41 Function_0081A646 42 Function_0081A8C6 43 Function_0081AC46 45 Function_00EE0C22 46 Function_0081AACF 47 Function_0081A74E 48 Function_008120D0 49 Function_0081A2D2 50 Function_0081A952 51 Function_00EE03BD 51->2 51->44 52 Function_00EE0938 51->52 51->65 52->44 52->65 53 Function_00812458 54 Function_009C05C0 55 Function_0081A45C 56 Function_0081A25E 57 Function_0081A361 58 Function_0081AAE1 59 Function_0081A462 60 Function_00EE0C8D 61 Function_00812364 62 Function_00812264 63 Function_00EE0889 63->44 63->65 64 Function_00EE0006 66 Function_00EE0F05 67 Function_00EE0B03 68 Function_00EE0080 69 Function_0081A56E 70 Function_00EE0301 70->2 70->44 70->52 70->65 71 Function_008121F0 72 Function_0081A172 73 Function_009C066F 74 Function_008124F5 75 Function_008123F4 76 Function_0081A1F4 77 Function_0081AB74 78 Function_00EE0D98 79 Function_0081A078 80 Function_0081ACFA 81 Function_008125FD 82 Function_00EE0693 83 Function_00EE0310 83->2 83->44 83->52 83->65 84 Function_0081A2FE 85 Function_0081A97E

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 0 ee0968-ee0993 2 ee0a2e-ee0a30 0->2 3 ee0999-ee0a22 0->3 4 ee0a37-ee0a3c 2->4 152 ee0a24 call 9c05f6 3->152 153 ee0a24 call 9c05d0 3->153 6 ee0b1e-ee0bc2 4->6 7 ee0a42-ee0a7a 4->7 43 ee0c9e-ee0ca7 6->43 44 ee0bc8-ee0c8b 6->44 23 ee0a7c-ee0a9a 7->23 24 ee0aa1-ee0afc 7->24 23->24 62 ee0b01 24->62 48 ee0cad-ee0d3e 43->48 49 ee0d51-ee0d5a 43->49 44->43 45 ee0a2a-ee0a2c 45->2 47 ee0a32 45->47 47->4 48->49 50 ee0d5c-ee0d73 49->50 51 ee0d7a-ee0d83 49->51 50->51 53 ee0da9-ee0db2 51->53 54 ee0d85-ee0d96 51->54 59 ee0db8-ee0e06 53->59 60 ee0f33-ee0f3a 53->60 54->53 80 ee0f1c-ee0f2d 59->80 62->6 80->60 82 ee0e0b-ee0e14 80->82 84 ee0e1a-ee0f1a 82->84 85 ee0f40-ee0fd1 82->85 84->80 134 ee0f3b 84->134 115 ee10ca 85->115 116 ee0fd7-ee0fe8 85->116 117 ee10cc-ee10d3 115->117 122 ee0fea-ee100b 116->122 129 ee100d 122->129 130 ee1012-ee1048 122->130 129->130 139 ee104f-ee1077 130->139 140 ee104a 130->140 134->85 144 ee107d-ee10a1 139->144 145 ee1079-ee107b 139->145 140->139 148 ee10aa-ee10b4 144->148 149 ee10a3-ee10a8 144->149 145->117 150 ee10ba-ee10c4 148->150 151 ee10b6-ee10b8 148->151 149->117 150->115 150->122 151->117 152->45 153->45
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369811450.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_ee0000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: :@=k$X1dk
                                                                                                  • API String ID: 0-464293977
                                                                                                  • Opcode ID: f875a121315cdd34d5fd44d1ae4fc3e9867a00fb849aba8bc4ae1b4193cf71e5
                                                                                                  • Instruction ID: 3ec93d93c6de311bc1c599263e52bccdd4b70a8612149f7a30dbcbdc89ef3e5f
                                                                                                  • Opcode Fuzzy Hash: f875a121315cdd34d5fd44d1ae4fc3e9867a00fb849aba8bc4ae1b4193cf71e5
                                                                                                  • Instruction Fuzzy Hash: 5A028D307042548FDB18EB75D8516AE77E6AFC8309B108879D406DF3AADF399C82DB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 154 81a612-81a695 158 81a697 154->158 159 81a69a-81a6a3 154->159 158->159 160 81a6a5 159->160 161 81a6a8-81a6b1 159->161 160->161 162 81a6b3-81a6d7 CreateMutexW 161->162 163 81a702-81a707 161->163 166 81a709-81a70e 162->166 167 81a6d9-81a6ff 162->167 163->162 166->167
                                                                                                  APIs
                                                                                                  • CreateMutexW.KERNELBASE(?,?), ref: 0081A6B9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369621898.000000000081A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0081A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_81a000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateMutex
                                                                                                  • String ID:
                                                                                                  • API String ID: 1964310414-0
                                                                                                  • Opcode ID: 0ccbbdc3e27f817d0d0cce9e444b931e6c34b8dcbb7775363db54f9f62b659dc
                                                                                                  • Instruction ID: d1628f8defa35a2ecd5b2b93085befea3316f0d8ff618f233fe05a77248db5ae
                                                                                                  • Opcode Fuzzy Hash: 0ccbbdc3e27f817d0d0cce9e444b931e6c34b8dcbb7775363db54f9f62b659dc
                                                                                                  • Instruction Fuzzy Hash: F93195B55097806FE712CB25DC85B96FFF8EF06314F08849AE944CB292D375E909CB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 170 81a361-81a3cf 173 81a3d1 170->173 174 81a3d4-81a3dd 170->174 173->174 175 81a3e2-81a3e8 174->175 176 81a3df 174->176 177 81a3ea 175->177 178 81a3ed-81a404 175->178 176->175 177->178 180 81a406-81a419 RegQueryValueExW 178->180 181 81a43b-81a440 178->181 182 81a442-81a447 180->182 183 81a41b-81a438 180->183 181->180 182->183
                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E2C,616AC498,00000000,00000000,00000000,00000000), ref: 0081A40C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369621898.000000000081A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0081A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_81a000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: 57446c46593d5ef78b37d72736015a49900382e5f5dd20363ff16b38f11de5c8
                                                                                                  • Instruction ID: dbc69bda544560b3e6f03d4f61ad0e536157131b873893a9a90ac93ef64805da
                                                                                                  • Opcode Fuzzy Hash: 57446c46593d5ef78b37d72736015a49900382e5f5dd20363ff16b38f11de5c8
                                                                                                  • Instruction Fuzzy Hash: DC318076105744AFE721CF25CC85F92BBBCEF06710F08849AE945CB252D364E849CB72
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 187 81a462-81a4c3 190 81a4c5 187->190 191 81a4c8-81a4d4 187->191 190->191 192 81a4d6 191->192 193 81a4d9-81a4f0 191->193 192->193 195 81a4f2-81a505 RegSetValueExW 193->195 196 81a527-81a52c 193->196 197 81a507-81a524 195->197 198 81a52e-81a533 195->198 196->195 198->197
                                                                                                  APIs
                                                                                                  • RegSetValueExW.KERNELBASE(?,00000E2C,616AC498,00000000,00000000,00000000,00000000), ref: 0081A4F8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369621898.000000000081A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0081A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_81a000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value
                                                                                                  • String ID:
                                                                                                  • API String ID: 3702945584-0
                                                                                                  • Opcode ID: ff7a29ce52f4c6cb26e6c6b971d3fb9439fdf01daa92b93e675d007e007b539c
                                                                                                  • Instruction ID: 85ce4b010ca6f894807ca9961b24423896c9374f775a8d4fd4da43a1aaa54c1c
                                                                                                  • Opcode Fuzzy Hash: ff7a29ce52f4c6cb26e6c6b971d3fb9439fdf01daa92b93e675d007e007b539c
                                                                                                  • Instruction Fuzzy Hash: 3B218176109384AFDB228B65DC45FA7BFBCEF46210F08849AE985DB152C264E849C772
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 217 81aa07-81aa65 219 81aa67 217->219 220 81aa6a-81aa70 217->220 219->220 221 81aa72 220->221 222 81aa75-81aa7e 220->222 221->222 223 81aac1-81aac6 222->223 224 81aa80-81aaa0 CopyFileW 222->224 223->224 227 81aaa2-81aabe 224->227 228 81aac8-81aacd 224->228 228->227
                                                                                                  APIs
                                                                                                  • CopyFileW.KERNELBASE(?,?,?), ref: 0081AA86
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369621898.000000000081A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0081A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_81a000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CopyFile
                                                                                                  • String ID:
                                                                                                  • API String ID: 1304948518-0
                                                                                                  • Opcode ID: 6cd8b393b8210373c51540562fe21c1af5efc5344d30af733df7ff6b559a190a
                                                                                                  • Instruction ID: 30c937ede80b34a660806a7d365e5b8f9dc89948d449a0c8b420382c3ef3e0ce
                                                                                                  • Opcode Fuzzy Hash: 6cd8b393b8210373c51540562fe21c1af5efc5344d30af733df7ff6b559a190a
                                                                                                  • Instruction Fuzzy Hash: E62171B25053809FD715CB25DD45B92BFF8EF16310F0984EAE849CB162D224E949CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 202 81a646-81a695 205 81a697 202->205 206 81a69a-81a6a3 202->206 205->206 207 81a6a5 206->207 208 81a6a8-81a6b1 206->208 207->208 209 81a6b3-81a6bb CreateMutexW 208->209 210 81a702-81a707 208->210 211 81a6c1-81a6d7 209->211 210->209 213 81a709-81a70e 211->213 214 81a6d9-81a6ff 211->214 213->214
                                                                                                  APIs
                                                                                                  • CreateMutexW.KERNELBASE(?,?), ref: 0081A6B9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369621898.000000000081A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0081A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_81a000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateMutex
                                                                                                  • String ID:
                                                                                                  • API String ID: 1964310414-0
                                                                                                  • Opcode ID: e2a4330216e45dff8de360cd14486a8e53335167703ef28d732ce38b2a6bf13b
                                                                                                  • Instruction ID: 19318c7c086375021b29dc3353ac93ec2d58e1498e25610b3895b0f4634657c2
                                                                                                  • Opcode Fuzzy Hash: e2a4330216e45dff8de360cd14486a8e53335167703ef28d732ce38b2a6bf13b
                                                                                                  • Instruction Fuzzy Hash: 7021C275501200AFEB24DF25DD85BA6FBECEF04314F08846AED45CB241D374E949CA72
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 230 81a392-81a3cf 232 81a3d1 230->232 233 81a3d4-81a3dd 230->233 232->233 234 81a3e2-81a3e8 233->234 235 81a3df 233->235 236 81a3ea 234->236 237 81a3ed-81a404 234->237 235->234 236->237 239 81a406-81a419 RegQueryValueExW 237->239 240 81a43b-81a440 237->240 241 81a442-81a447 239->241 242 81a41b-81a438 239->242 240->239 241->242
                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E2C,616AC498,00000000,00000000,00000000,00000000), ref: 0081A40C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369621898.000000000081A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0081A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_81a000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: d2b0dc1241ce9a5a9f58430de0f5089c3532c0bb71d1ff564ac8092d93d87c95
                                                                                                  • Instruction ID: e1765363109f0dd6b2ed0be4bcdfee6425bca66ff51c280b493861911b392479
                                                                                                  • Opcode Fuzzy Hash: d2b0dc1241ce9a5a9f58430de0f5089c3532c0bb71d1ff564ac8092d93d87c95
                                                                                                  • Instruction Fuzzy Hash: AC219076601204AFEB20DF25DC85FA6F7ECFF04710F14846AE946CB252D764E949CA72
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 246 81a486-81a4c3 248 81a4c5 246->248 249 81a4c8-81a4d4 246->249 248->249 250 81a4d6 249->250 251 81a4d9-81a4f0 249->251 250->251 253 81a4f2-81a505 RegSetValueExW 251->253 254 81a527-81a52c 251->254 255 81a507-81a524 253->255 256 81a52e-81a533 253->256 254->253 256->255
                                                                                                  APIs
                                                                                                  • RegSetValueExW.KERNELBASE(?,00000E2C,616AC498,00000000,00000000,00000000,00000000), ref: 0081A4F8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369621898.000000000081A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0081A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_81a000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value
                                                                                                  • String ID:
                                                                                                  • API String ID: 3702945584-0
                                                                                                  • Opcode ID: 60e16668ccbebfd79abc03ab06facf5992ed514c2c3dae4f49261ef9f33710c3
                                                                                                  • Instruction ID: b9fd2edefb886a86494c59ae05ce502693fcf3e13b8f19c772e0f94269837b5f
                                                                                                  • Opcode Fuzzy Hash: 60e16668ccbebfd79abc03ab06facf5992ed514c2c3dae4f49261ef9f33710c3
                                                                                                  • Instruction Fuzzy Hash: F311B176501204AFEB219E25DC85FA6FBACEF04714F04846AED49CB252D364E848CA72
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 260 ee0938-ee0993 262 ee0a2e-ee0a30 260->262 263 ee0999-ee0a22 260->263 264 ee0a37-ee0a3c 262->264 412 ee0a24 call 9c05f6 263->412 413 ee0a24 call 9c05d0 263->413 266 ee0b1e-ee0bc2 264->266 267 ee0a42-ee0a7a 264->267 303 ee0c9e-ee0ca7 266->303 304 ee0bc8-ee0c8b 266->304 283 ee0a7c-ee0a9a 267->283 284 ee0aa1-ee0afc 267->284 283->284 322 ee0b01 284->322 308 ee0cad-ee0d3e 303->308 309 ee0d51-ee0d5a 303->309 304->303 305 ee0a2a-ee0a2c 305->262 307 ee0a32 305->307 307->264 308->309 310 ee0d5c-ee0d73 309->310 311 ee0d7a-ee0d83 309->311 310->311 313 ee0da9-ee0db2 311->313 314 ee0d85-ee0d96 311->314 319 ee0db8-ee0e06 313->319 320 ee0f33-ee0f3a 313->320 314->313 340 ee0f1c-ee0f2d 319->340 322->266 340->320 342 ee0e0b-ee0e14 340->342 344 ee0e1a-ee0f1a 342->344 345 ee0f40-ee0fd1 342->345 344->340 394 ee0f3b 344->394 375 ee10ca 345->375 376 ee0fd7-ee0fe8 345->376 377 ee10cc-ee10d3 375->377 382 ee0fea-ee100b 376->382 389 ee100d 382->389 390 ee1012-ee1048 382->390 389->390 399 ee104f-ee1077 390->399 400 ee104a 390->400 394->345 404 ee107d-ee10a1 399->404 405 ee1079-ee107b 399->405 400->399 408 ee10aa-ee10b4 404->408 409 ee10a3-ee10a8 404->409 405->377 410 ee10ba-ee10c4 408->410 411 ee10b6-ee10b8 408->411 409->377 410->375 410->382 411->377 412->305 413->305
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369811450.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_ee0000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: :@=k
                                                                                                  • API String ID: 0-2126559863
                                                                                                  • Opcode ID: f9469fe1c6285a2a333d7950b0322b84d3e9d46260b6ed4d7bf7ae755b338e74
                                                                                                  • Instruction ID: c6736b03150faaa4274b20f476abc1271f50113afbcf66ccaf4fea6f2b25fa09
                                                                                                  • Opcode Fuzzy Hash: f9469fe1c6285a2a333d7950b0322b84d3e9d46260b6ed4d7bf7ae755b338e74
                                                                                                  • Instruction Fuzzy Hash: 86C18B347082509FDB19FB74E8516AD37E3AB88309B108879D406DF3AADF399C42DB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 414 81a2d2-81a2d4 415 81a2d6-81a2dd 414->415 416 81a2de-81a328 414->416 415->416 418 81a353-81a358 416->418 419 81a32a-81a33d SetErrorMode 416->419 418->419 420 81a35a-81a35f 419->420 421 81a33f-81a352 419->421 420->421
                                                                                                  APIs
                                                                                                  • SetErrorMode.KERNELBASE(?), ref: 0081A330
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369621898.000000000081A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0081A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_81a000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorMode
                                                                                                  • String ID:
                                                                                                  • API String ID: 2340568224-0
                                                                                                  • Opcode ID: 2606f042984b1ff1ec36fbb5ace7fec19b5267c7153aa7357fa784be3912d447
                                                                                                  • Instruction ID: 0953bba47ca9c2628bb4f717acff108881ff6e92fa977a6f7e9439899dfc420c
                                                                                                  • Opcode Fuzzy Hash: 2606f042984b1ff1ec36fbb5ace7fec19b5267c7153aa7357fa784be3912d447
                                                                                                  • Instruction Fuzzy Hash: AC211A7540E3C06FD7238B25DC54A52BFB4EF07220F0980DBDD858B263C269A849DB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 424 81a8a4-81a8ed 426 81a8f2-81a8fb 424->426 427 81a8ef 424->427 428 81a8fd-81a91d SetFileAttributesW 426->428 429 81a93c-81a941 426->429 427->426 432 81a943-81a948 428->432 433 81a91f-81a93b 428->433 429->428 432->433
                                                                                                  APIs
                                                                                                  • SetFileAttributesW.KERNELBASE(?,?), ref: 0081A903
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369621898.000000000081A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0081A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_81a000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AttributesFile
                                                                                                  • String ID:
                                                                                                  • API String ID: 3188754299-0
                                                                                                  • Opcode ID: c4ad600dbce1e3d9497dc2a5db411791a41f38e5b0da780ce17c431f0bcc6634
                                                                                                  • Instruction ID: 3d4f87acfa03aac7f3fc997437d989e676c7dcec35edf2e4f16703b5a0eedd66
                                                                                                  • Opcode Fuzzy Hash: c4ad600dbce1e3d9497dc2a5db411791a41f38e5b0da780ce17c431f0bcc6634
                                                                                                  • Instruction Fuzzy Hash: E311B6715053809FDB15CF25DC45B56BFE8EF06220F0984AEEC45CB252D234E848CB72
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 435 81aa3e-81aa65 436 81aa67 435->436 437 81aa6a-81aa70 435->437 436->437 438 81aa72 437->438 439 81aa75-81aa7e 437->439 438->439 440 81aac1-81aac6 439->440 441 81aa80-81aa88 CopyFileW 439->441 440->441 443 81aa8e-81aaa0 441->443 444 81aaa2-81aabe 443->444 445 81aac8-81aacd 443->445 445->444
                                                                                                  APIs
                                                                                                  • CopyFileW.KERNELBASE(?,?,?), ref: 0081AA86
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369621898.000000000081A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0081A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_81a000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CopyFile
                                                                                                  • String ID:
                                                                                                  • API String ID: 1304948518-0
                                                                                                  • Opcode ID: 69c4535a4a34e1960670cc364394fbb07009851e3235948cb337886e2e629560
                                                                                                  • Instruction ID: b3810a64374db5912393d43d291c7a435164c2bdef72d7fb84308a618d16ce4b
                                                                                                  • Opcode Fuzzy Hash: 69c4535a4a34e1960670cc364394fbb07009851e3235948cb337886e2e629560
                                                                                                  • Instruction Fuzzy Hash: 32118E716012509FEB24DF69E985B96FBE8EF04320F08C4AADC49CB251D234E948CA62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 447 81a8c6-81a8ed 448 81a8f2-81a8fb 447->448 449 81a8ef 447->449 450 81a8fd-81a905 SetFileAttributesW 448->450 451 81a93c-81a941 448->451 449->448 453 81a90b-81a91d 450->453 451->450 454 81a943-81a948 453->454 455 81a91f-81a93b 453->455 454->455
                                                                                                  APIs
                                                                                                  • SetFileAttributesW.KERNELBASE(?,?), ref: 0081A903
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369621898.000000000081A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0081A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_81a000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AttributesFile
                                                                                                  • String ID:
                                                                                                  • API String ID: 3188754299-0
                                                                                                  • Opcode ID: 28ac45becaa802b4a0c98ec81f872620bf0f366b5b56dbdb84cfd9805ddf8b3c
                                                                                                  • Instruction ID: dddb61234c5de5a86684cc78bab76e938a92cd60b601bb8a5048ff124b762bc8
                                                                                                  • Opcode Fuzzy Hash: 28ac45becaa802b4a0c98ec81f872620bf0f366b5b56dbdb84cfd9805ddf8b3c
                                                                                                  • Instruction Fuzzy Hash: FD01D2715013049FDB24DF25D8857A6FBE8EF04320F08C0AADD09CB301D234E888CB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 457 81a2fe-81a328 458 81a353-81a358 457->458 459 81a32a-81a33d SetErrorMode 457->459 458->459 460 81a35a-81a35f 459->460 461 81a33f-81a352 459->461 460->461
                                                                                                  APIs
                                                                                                  • SetErrorMode.KERNELBASE(?), ref: 0081A330
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369621898.000000000081A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0081A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_81a000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorMode
                                                                                                  • String ID:
                                                                                                  • API String ID: 2340568224-0
                                                                                                  • Opcode ID: ab140c032df431b7d0bf110c3afc2fb8f000efbb9b6d18265e4103edf0e41d19
                                                                                                  • Instruction ID: c5871d243a8d8b2e820b130a6d106b86eae8f30b8cb6cf1513de7ba363ca53cf
                                                                                                  • Opcode Fuzzy Hash: ab140c032df431b7d0bf110c3afc2fb8f000efbb9b6d18265e4103edf0e41d19
                                                                                                  • Instruction Fuzzy Hash: 5CF0A435905344DFDB20DF19D885765FBA4EF04324F08C0AADD494B312D279A948CA62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 464 ee0310-ee0334 466 ee033e-ee0346 464->466 467 ee0336-ee0338 464->467 468 ee034e-ee0391 466->468 469 ee0348-ee034d 466->469 467->466 472 ee03d8-ee0418 468->472 473 ee0393-ee03bb 468->473 480 ee041f 472->480 481 ee041a 472->481 478 ee03ce 473->478 478->472 517 ee041f call ee0968 480->517 518 ee041f call ee0938 480->518 519 ee041f call 9c05f6 480->519 520 ee041f call 9c05d0 480->520 481->480 482 ee0425-ee0434 483 ee046b-ee0523 482->483 484 ee0436-ee0460 482->484 503 ee0525-ee0569 483->503 504 ee0570-ee0587 483->504 484->483 503->504 505 ee058d-ee05bf 504->505 506 ee0880 504->506 505->506 517->482 518->482 519->482 520->482
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369811450.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_ee0000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 527ac9dd51f43553cf988c7d77eea03ae2c9a355c1aeb365d5818ac5827655ee
                                                                                                  • Instruction ID: 31c4b66cc7a1639b9d8ca9a6299ae555d81646ad9d6685e7158730a91a57d8c1
                                                                                                  • Opcode Fuzzy Hash: 527ac9dd51f43553cf988c7d77eea03ae2c9a355c1aeb365d5818ac5827655ee
                                                                                                  • Instruction Fuzzy Hash: AE51F1317042048BDB18AB7998116BD37E7AFC9348B148469E001EF3E9DF79DD42CBA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369811450.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_ee0000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6f30ebc85e37abc2af150178709cb96aeebfe6bf0bf31679638d585c6b399bc8
                                                                                                  • Instruction ID: d6d79fe3691094b141e1335af00e97a87ed90b2fafdb5a53bd099d018e877809
                                                                                                  • Opcode Fuzzy Hash: 6f30ebc85e37abc2af150178709cb96aeebfe6bf0bf31679638d585c6b399bc8
                                                                                                  • Instruction Fuzzy Hash: 9E41E2717006108BDB18BB7994116BD36D7AFC9788B448469E002EF3E9DF7D8D4287E2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369811450.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_ee0000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6bd29d40a5a5ac0835b571e240ab00ed8696d693c389f7dc7acb21511c3116f9
                                                                                                  • Instruction ID: 8f1fb05b57f48a35f0838db82f6685d0cf52252ca71cd998c36db445b960c0c5
                                                                                                  • Opcode Fuzzy Hash: 6bd29d40a5a5ac0835b571e240ab00ed8696d693c389f7dc7acb21511c3116f9
                                                                                                  • Instruction Fuzzy Hash: 32510A712192868BC704FF38E88199A37A7FB8560A7108D7AE0458F2BFEB745D45CBC1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369811450.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_ee0000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: dba19652998a9c9443c1f1f9d1024050f3d353b920f095743a5773d004526594
                                                                                                  • Instruction ID: 2c8055cc929374988311aa0de866accec4f8d77bfc42474579505598d36591b6
                                                                                                  • Opcode Fuzzy Hash: dba19652998a9c9443c1f1f9d1024050f3d353b920f095743a5773d004526594
                                                                                                  • Instruction Fuzzy Hash: 0D01D76541E7C09FD7079B3058AAA903FB16D2744438F84CB8889DF9A7E10E4C0ECB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369711252.00000000009C0000.00000040.00000020.00020000.00000000.sdmp, Offset: 009C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_9c0000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 475c420869d8bc1151ed90ee1c27010773ebaf1c07725a40da359d8776127125
                                                                                                  • Instruction ID: 46f7f77c5e9d62c181dc0be69d744d3359e76e9285d00282220b856ca24b2801
                                                                                                  • Opcode Fuzzy Hash: 475c420869d8bc1151ed90ee1c27010773ebaf1c07725a40da359d8776127125
                                                                                                  • Instruction Fuzzy Hash: 1201A9B65097806FD7118B16EC41863FFF8DF86520709C4EFEC498B652D229A909CB76
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369811450.0000000000EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_ee0000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 194e7c2c6f51ea450a6e821c3cd797247584acf184276373add1606d50fe3a89
                                                                                                  • Instruction ID: ece9b807e4b60d5c757a12c73ccbe9ccf3872547f45956cbc8a2c3e68d3fb6f7
                                                                                                  • Opcode Fuzzy Hash: 194e7c2c6f51ea450a6e821c3cd797247584acf184276373add1606d50fe3a89
                                                                                                  • Instruction Fuzzy Hash: EB015B31208386DFC715EB78E4558993BE6FF85308B14886DE485CF36ADA368804DB82
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369711252.00000000009C0000.00000040.00000020.00020000.00000000.sdmp, Offset: 009C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_9c0000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a771c37c732cb4a9d814b4fcf5d52fbf887f655e5cfd0dac468ee318aa2f36de
                                                                                                  • Instruction ID: 4f4f4daec6774a9461e6eec46ccd588ced911f88e4f997f2d1e6d936d67c03b0
                                                                                                  • Opcode Fuzzy Hash: a771c37c732cb4a9d814b4fcf5d52fbf887f655e5cfd0dac468ee318aa2f36de
                                                                                                  • Instruction Fuzzy Hash: 6FE092B66416005B9650DF0BEC41462F7E8EB84630B18C07FDC0E8B710D279B504CEB5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369617951.0000000000812000.00000040.00000800.00020000.00000000.sdmp, Offset: 00812000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_812000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1d7f4221afc1f8adff4af02849bc714228fae53aca84c4452a4bcbb1bc596f32
                                                                                                  • Instruction ID: a55d4fc20210ea426b22f2f984dd6d69df4503db8618617719dc2ac6290304c5
                                                                                                  • Opcode Fuzzy Hash: 1d7f4221afc1f8adff4af02849bc714228fae53aca84c4452a4bcbb1bc596f32
                                                                                                  • Instruction Fuzzy Hash: 92D05E79205A814FE326DA2CD1A9B953BD8BF51B04F4644F9E800CB673C368E9D1D200
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.369617951.0000000000812000.00000040.00000800.00020000.00000000.sdmp, Offset: 00812000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_812000_OUXkIxeP6k.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ccee70897c0271770a76adb0d37fd8dda64ae9f0ac3f9e0deb7e7a53a878e1bb
                                                                                                  • Instruction ID: 3606649b9857e5559eecd774479348171ddb3996b315914a8ac4356a05fe50ad
                                                                                                  • Opcode Fuzzy Hash: ccee70897c0271770a76adb0d37fd8dda64ae9f0ac3f9e0deb7e7a53a878e1bb
                                                                                                  • Instruction Fuzzy Hash: 9CD017342002814FC715DA1CC194F9937A8BF41B04F0644A8AC10CB372C3A8D8D1D600
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:16.9%
                                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                                  Signature Coverage:2.3%
                                                                                                  Total number of Nodes:133
                                                                                                  Total number of Limit Nodes:5
                                                                                                  execution_graph 6513 acaaae 6514 acaada FindCloseChangeNotification 6513->6514 6515 acab10 6513->6515 6516 acaae8 6514->6516 6515->6514 6625 28924ce 6627 2892503 ioctlsocket 6625->6627 6628 289252f 6627->6628 6517 2890986 6519 28909be MapViewOfFile 6517->6519 6520 2890a0d 6519->6520 6629 2891546 6632 2891581 LoadLibraryA 6629->6632 6631 28915be 6632->6631 6633 aca2fe 6634 aca32a SetErrorMode 6633->6634 6635 aca353 6633->6635 6636 aca33f 6634->6636 6635->6634 6521 289029a 6524 28902d2 WSASocketW 6521->6524 6523 289030e 6524->6523 6637 2890fde 6638 2891019 getaddrinfo 6637->6638 6640 289108b 6638->6640 6641 2890652 6642 28906a2 GetComputerNameW 6641->6642 6643 28906b0 6642->6643 6525 2851718 6526 2851362 6525->6526 6531 2851763 6526->6531 6536 28517d1 6526->6536 6541 28517ef 6526->6541 6546 2851802 6526->6546 6532 285179b 6531->6532 6533 285194c 6532->6533 6551 2852077 6532->6551 6555 28520d8 6532->6555 6537 28517d8 6536->6537 6538 285194c 6537->6538 6539 2852077 2 API calls 6537->6539 6540 28520d8 2 API calls 6537->6540 6539->6538 6540->6538 6542 28517f6 6541->6542 6543 285194c 6542->6543 6544 2852077 2 API calls 6542->6544 6545 28520d8 2 API calls 6542->6545 6544->6543 6545->6543 6547 2851809 6546->6547 6548 285194c 6547->6548 6549 2852077 2 API calls 6547->6549 6550 28520d8 2 API calls 6547->6550 6549->6548 6550->6548 6552 2852080 6551->6552 6553 28520ac 6552->6553 6559 28526f0 6552->6559 6553->6533 6556 2852103 6555->6556 6557 285214b 6556->6557 6558 28526f0 2 API calls 6556->6558 6557->6533 6558->6557 6560 2852725 6559->6560 6564 28912ba 6560->6564 6567 289124a 6560->6567 6561 2852760 6561->6553 6565 289130a GetVolumeInformationA 6564->6565 6566 2891312 6565->6566 6566->6561 6568 28912ba GetVolumeInformationA 6567->6568 6570 2891312 6568->6570 6570->6561 6644 2892a56 6647 2892a8b GetProcessWorkingSetSize 6644->6647 6646 2892ab7 6647->6646 6648 28907d6 6650 289080e ConvertStringSecurityDescriptorToSecurityDescriptorW 6648->6650 6651 289084f 6650->6651 6571 acb20e 6572 acb24c DuplicateHandle 6571->6572 6573 acb284 6571->6573 6574 acb25a 6572->6574 6573->6572 6652 aca74e 6653 aca77a FindCloseChangeNotification 6652->6653 6655 aca784 6653->6655 6575 2890c2a 6576 2890c5f shutdown 6575->6576 6578 2890c88 6576->6578 6579 28925aa 6581 28925d3 select 6579->6581 6582 2892608 6581->6582 6583 2851120 KiUserExceptionDispatcher 6584 2851154 6583->6584 6585 aca486 6588 aca4bb RegSetValueExW 6585->6588 6587 aca507 6588->6587 6589 acaa06 6590 acaa6b 6589->6590 6591 acaa35 WaitForInputIdle 6589->6591 6590->6591 6592 acaa43 6591->6592 6660 aca646 6661 aca67e CreateMutexW 6660->6661 6663 aca6c1 6661->6663 6593 acbb82 6596 acbbba CreateFileW 6593->6596 6595 acbc09 6596->6595 6597 2892b3a 6598 2892b6f SetProcessWorkingSetSize 6597->6598 6600 2892b9b 6598->6600 6664 289297a 6666 28929af GetExitCodeProcess 6664->6666 6667 28929d8 6666->6667 6601 acbc9a 6604 acbccf GetFileType 6601->6604 6603 acbcfc 6604->6603 6605 aca09a 6606 aca0cf send 6605->6606 6607 aca107 6605->6607 6608 aca0dd 6606->6608 6607->6606 6609 28911be 6611 28911f3 WSAConnect 6609->6611 6612 2891212 6611->6612 6668 289267e 6670 28926a7 LookupPrivilegeValueW 6668->6670 6671 28926ce 6670->6671 6672 28927fe 6674 289282d AdjustTokenPrivileges 6672->6674 6675 289284f 6674->6675 6679 28922fe 6680 2892336 RegCreateKeyExW 6679->6680 6682 28923a8 6680->6682 6613 2890032 6615 2890067 ReadFile 6613->6615 6616 2890099 6615->6616 6683 2890ef2 6685 2890f27 GetProcessTimes 6683->6685 6686 2890f59 6685->6686 6617 aca392 6620 aca3c7 RegQueryValueExW 6617->6620 6619 aca41b 6620->6619 6687 acab52 6688 acab8a RegOpenKeyExW 6687->6688 6690 acabe0 6688->6690
                                                                                                  APIs
                                                                                                  • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 02892847
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AdjustPrivilegesToken
                                                                                                  • String ID:
                                                                                                  • API String ID: 2874748243-0
                                                                                                  • Opcode ID: 2fcb947b96fc0dfe6a588220d48db858516b715953d24976d89b842570ef8303
                                                                                                  • Instruction ID: 647809abfdef5b56d7d5a0d5341af41091f51a625a62cd69cc235fb6803a5e87
                                                                                                  • Opcode Fuzzy Hash: 2fcb947b96fc0dfe6a588220d48db858516b715953d24976d89b842570ef8303
                                                                                                  • Instruction Fuzzy Hash: 5D21BF79509380AFDB228F24DC44B52BFB4AF06210F0884DAE988CB563D335A908CB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 02892847
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AdjustPrivilegesToken
                                                                                                  • String ID:
                                                                                                  • API String ID: 2874748243-0
                                                                                                  • Opcode ID: 45ccd79240e27e9740d993032c56094c92821338a80973b2fe41611f14c5f0ce
                                                                                                  • Instruction ID: 95204380ab64e3dbf481274bc15eb9bf27cad3d6c92c3ad86f15643993781ee1
                                                                                                  • Opcode Fuzzy Hash: 45ccd79240e27e9740d993032c56094c92821338a80973b2fe41611f14c5f0ce
                                                                                                  • Instruction Fuzzy Hash: EC117C79500345AFEB21CF65D885B66FBE4EF08224F08C4AAED49DB626D335E418CF61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 746 2851120-285115b KiUserExceptionDispatcher 749 2851163 746->749 750 2851165 749->750 782 2851167 call acac19 750->782 783 2851167 call acac5a 750->783 751 285116c-285119e 754 28511a0-28511a2 751->754 755 28511ed-28511f0 751->755 779 28511a4 call 27505d4 754->779 780 28511a4 call 27505f6 754->780 781 28511a4 call 2851ce8 754->781 756 28511f2-2851200 755->756 757 285126d-285128a 755->757 756->750 758 2851206-285120a 756->758 760 285120c-285121d 758->760 761 285125e-2851268 758->761 759 28511aa-28511b9 762 28511bb-28511e2 759->762 763 28511ea 759->763 760->757 769 285121f-285122f 760->769 761->749 762->763 763->755 770 2851231-285123c 769->770 771 2851250-2851256 769->771 770->757 774 285123e-2851248 770->774 771->761 774->771 779->759 780->759 781->759 782->751 783->751
                                                                                                  APIs
                                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 02851147
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626318314.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2850000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DispatcherExceptionUser
                                                                                                  • String ID:
                                                                                                  • API String ID: 6842923-0
                                                                                                  • Opcode ID: b94149ef1eee7e25d708e195add29e02aa8aa7243aacd0b81ce8f37034f74c24
                                                                                                  • Instruction ID: 5b5b8339c9540d3e8d0271dd75787d923d6203e8ee6a7a80d3bc88afc4a04b13
                                                                                                  • Opcode Fuzzy Hash: b94149ef1eee7e25d708e195add29e02aa8aa7243aacd0b81ce8f37034f74c24
                                                                                                  • Instruction Fuzzy Hash: 0441B6397002258FCB14DF74D8886AD77A6EF88209B14847AD809CB39ADF35DD46CBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 784 2851111-285111c 785 2851163 784->785 786 285111e-285114d KiUserExceptionDispatcher 784->786 787 2851165 785->787 788 2851154-285115b 786->788 821 2851167 call acac19 787->821 822 2851167 call acac5a 787->822 788->785 789 285116c-285119e 793 28511a0-28511a2 789->793 794 28511ed-28511f0 789->794 818 28511a4 call 27505d4 793->818 819 28511a4 call 27505f6 793->819 820 28511a4 call 2851ce8 793->820 795 28511f2-2851200 794->795 796 285126d-285128a 794->796 795->787 797 2851206-285120a 795->797 799 285120c-285121d 797->799 800 285125e-2851268 797->800 798 28511aa-28511b9 801 28511bb-28511e2 798->801 802 28511ea 798->802 799->796 808 285121f-285122f 799->808 800->785 801->802 802->794 809 2851231-285123c 808->809 810 2851250-2851256 808->810 809->796 813 285123e-2851248 809->813 810->800 813->810 818->798 819->798 820->798 821->789 822->789
                                                                                                  APIs
                                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 02851147
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626318314.0000000002850000.00000040.00000800.00020000.00000000.sdmp, Offset: 02850000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2850000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DispatcherExceptionUser
                                                                                                  • String ID:
                                                                                                  • API String ID: 6842923-0
                                                                                                  • Opcode ID: 8170d699a3a966caa425578a3a6bde78a4bc52e5914da435be8d45e75c18f8b8
                                                                                                  • Instruction ID: 4528ebd481506854dc037def0e59d48754380dc652fbc6e2fa1e89888d770274
                                                                                                  • Opcode Fuzzy Hash: 8170d699a3a966caa425578a3a6bde78a4bc52e5914da435be8d45e75c18f8b8
                                                                                                  • Instruction Fuzzy Hash: 354197396012158FCB15DF74C8986AE77E6EF88205B1484BAD809DF39ADB35DD42CBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 823 2890187-28901a7 824 28901c9-28901fb 823->824 825 28901a9-28901c8 823->825 828 28901fe-2890256 RegQueryValueExW 824->828 825->824 830 289025c-2890272 828->830
                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E2C,?,?), ref: 0289024E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: 0aed524cd341c40a52e1af8afe0881c92ccc02d297298bafdb3b534f985ddca5
                                                                                                  • Instruction ID: edc17abe531650fd584201387334fb706b243da08c3f2eb818197893fbb6f937
                                                                                                  • Opcode Fuzzy Hash: 0aed524cd341c40a52e1af8afe0881c92ccc02d297298bafdb3b534f985ddca5
                                                                                                  • Instruction Fuzzy Hash: 0D317E6500E3C06FD7138B218C65B61BFB4EF47610F0A85CBE8848F5A3D229A909C7B2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 831 28922d2-2892356 835 2892358 831->835 836 289235b-2892367 831->836 835->836 837 2892369 836->837 838 289236c-2892375 836->838 837->838 839 289237a-2892391 838->839 840 2892377 838->840 842 28923d3-28923d8 839->842 843 2892393-28923a6 RegCreateKeyExW 839->843 840->839 842->843 844 28923a8-28923d0 843->844 845 28923da-28923df 843->845 845->844
                                                                                                  APIs
                                                                                                  • RegCreateKeyExW.KERNELBASE(?,00000E2C), ref: 02892399
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Create
                                                                                                  • String ID:
                                                                                                  • API String ID: 2289755597-0
                                                                                                  • Opcode ID: 0cc4fdf78471ea6569ae044def437d194690ffc9d8b8c064c9ec57fc7a4a902a
                                                                                                  • Instruction ID: 4149b8789c884143a588d4f30f8de48ede0deab8092d384501997fcbdb1e0fc0
                                                                                                  • Opcode Fuzzy Hash: 0cc4fdf78471ea6569ae044def437d194690ffc9d8b8c064c9ec57fc7a4a902a
                                                                                                  • Instruction Fuzzy Hash: F431A476104344AFDB21CB25CC85F67FBFCEF09210F08899AE989CB562D324E808DB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 850 acbb4b-acbbda 854 acbbdc 850->854 855 acbbdf-acbbeb 850->855 854->855 856 acbbed 855->856 857 acbbf0-acbbf9 855->857 856->857 858 acbc4a-acbc4f 857->858 859 acbbfb-acbc1f CreateFileW 857->859 858->859 862 acbc51-acbc56 859->862 863 acbc21-acbc47 859->863 862->863
                                                                                                  APIs
                                                                                                  • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00ACBC01
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateFile
                                                                                                  • String ID:
                                                                                                  • API String ID: 823142352-0
                                                                                                  • Opcode ID: 20e7ced175c4142bf60dd5dc92566b9c0e11c06f3ad094c4769d495c0cb0f6b3
                                                                                                  • Instruction ID: 71bc73e3a75ba57d762845f09f3928767f563158d9e39528313eeb464139bcaa
                                                                                                  • Opcode Fuzzy Hash: 20e7ced175c4142bf60dd5dc92566b9c0e11c06f3ad094c4769d495c0cb0f6b3
                                                                                                  • Instruction Fuzzy Hash: F13183B5505340AFEB22CF25DD45F62BFE8EF06314F09849EE9848B252D365E909CB71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 866 2890fbc-289107b 872 28910cd-28910d2 866->872 873 289107d-2891085 getaddrinfo 866->873 872->873 875 289108b-289109d 873->875 876 289109f-28910ca 875->876 877 28910d4-28910d9 875->877 877->876
                                                                                                  APIs
                                                                                                  • getaddrinfo.WS2_32(?,00000E2C), ref: 02891083
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: getaddrinfo
                                                                                                  • String ID:
                                                                                                  • API String ID: 300660673-0
                                                                                                  • Opcode ID: 7808218271de8989f9d5fe30172ffe5499030dd83b00f4e8075f1520d73b6b17
                                                                                                  • Instruction ID: a3ee8555f636876a6b71925ea8a75a0a4bd31d968457241541dc11286781a8e5
                                                                                                  • Opcode Fuzzy Hash: 7808218271de8989f9d5fe30172ffe5499030dd83b00f4e8075f1520d73b6b17
                                                                                                  • Instruction Fuzzy Hash: CC31B3B6004344AFEB21DB60DC45FA6FBECEF05314F04889AFA499B582D375A909CB71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 881 289124a-289130c GetVolumeInformationA 884 2891312-289133b 881->884
                                                                                                  APIs
                                                                                                  • GetVolumeInformationA.KERNELBASE(?,00000E2C,?,?), ref: 0289130A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InformationVolume
                                                                                                  • String ID:
                                                                                                  • API String ID: 2039140958-0
                                                                                                  • Opcode ID: 2e6076ab8c0866242cd0590f2f21bbe1627aab088d776c02d3f0d9ef56f7ad6b
                                                                                                  • Instruction ID: c410059df1354d0d097821b078025daf011af5d8b5fcc8ff9b06c7450972e3da
                                                                                                  • Opcode Fuzzy Hash: 2e6076ab8c0866242cd0590f2f21bbe1627aab088d776c02d3f0d9ef56f7ad6b
                                                                                                  • Instruction Fuzzy Hash: 11318E7140E3C16FD7138B359C51BA2BFB8AF47210F1981DBE8848F5A3D225A959C7A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetProcessTimes.KERNELBASE(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 02890F51
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ProcessTimes
                                                                                                  • String ID:
                                                                                                  • API String ID: 1995159646-0
                                                                                                  • Opcode ID: b2f0c0c6b549f75fa3b87a2cef6e6c7d56e3bce7b6d6ec7afa6867be7b2ecf0b
                                                                                                  • Instruction ID: 8237a593317b8ac72a3773e5367adc5e3829ecb685f90fa60229b6fe08ce65b6
                                                                                                  • Opcode Fuzzy Hash: b2f0c0c6b549f75fa3b87a2cef6e6c7d56e3bce7b6d6ec7afa6867be7b2ecf0b
                                                                                                  • Instruction Fuzzy Hash: 9B31D7765093846FDB128F60DC45FA6BFB8EF46310F0884DAE985DB1A3D225A909C771
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 886 acab1e-acabad 890 acabaf 886->890 891 acabb2-acabc9 886->891 890->891 893 acac0b-acac10 891->893 894 acabcb-acabde RegOpenKeyExW 891->894 893->894 895 acabe0-acac08 894->895 896 acac12-acac17 894->896 896->895
                                                                                                  APIs
                                                                                                  • RegOpenKeyExW.KERNELBASE(?,00000E2C), ref: 00ACABD1
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Open
                                                                                                  • String ID:
                                                                                                  • API String ID: 71445658-0
                                                                                                  • Opcode ID: acec2b93129ece8343e7e258b5b227ba82f8d0fae08c12cfabdcdadf1e9275ae
                                                                                                  • Instruction ID: 103b122db981655752855deac6a20428f9e2fdb10eac85c615a4f0d48d1e42da
                                                                                                  • Opcode Fuzzy Hash: acec2b93129ece8343e7e258b5b227ba82f8d0fae08c12cfabdcdadf1e9275ae
                                                                                                  • Instruction Fuzzy Hash: D831A4764097846FE7228B61DC85FA6FFBCEF06314F08849AE985DB153D224A909C771
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E2C), ref: 02890847
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DescriptorSecurity$ConvertString
                                                                                                  • String ID:
                                                                                                  • API String ID: 3907675253-0
                                                                                                  • Opcode ID: afca89f208b1530dd9687e126830bf0658b92099020b15d00853a77b7fbcc895
                                                                                                  • Instruction ID: b172bb96e4fac6653db388bb3a6e3d6a4dbd11b265f1fb31c4bacd45a021197e
                                                                                                  • Opcode Fuzzy Hash: afca89f208b1530dd9687e126830bf0658b92099020b15d00853a77b7fbcc895
                                                                                                  • Instruction Fuzzy Hash: E6319176504385AFEB21DB64DC45FA7FFE8EF06610F0888AAE944DB552D324A809CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CreateMutexW.KERNELBASE(?,?), ref: 00ACA6B9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateMutex
                                                                                                  • String ID:
                                                                                                  • API String ID: 1964310414-0
                                                                                                  • Opcode ID: 99fca8a767d442ea57954865a78535c15f782ddd0b30ab79366c1e228b5e5407
                                                                                                  • Instruction ID: 7603a8dc1157638a0f000c9b27f02f57f28f585216dd383e54062adf1ee0f65a
                                                                                                  • Opcode Fuzzy Hash: 99fca8a767d442ea57954865a78535c15f782ddd0b30ab79366c1e228b5e5407
                                                                                                  • Instruction Fuzzy Hash: 903192B55093846FE711CB25CC45F66FFF8EF06214F09849AE944CB292D324A809CB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegCreateKeyExW.KERNELBASE(?,00000E2C), ref: 02892399
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Create
                                                                                                  • String ID:
                                                                                                  • API String ID: 2289755597-0
                                                                                                  • Opcode ID: 7518bf8151d4d6fdb072c882e43d26e48d6c204f109dfa79fba9ca50816affde
                                                                                                  • Instruction ID: db995854932c59feed5b91796809db5f8eef52f83ead726d6c1f6b476ed4e98a
                                                                                                  • Opcode Fuzzy Hash: 7518bf8151d4d6fdb072c882e43d26e48d6c204f109dfa79fba9ca50816affde
                                                                                                  • Instruction Fuzzy Hash: 1221A27A500204AFEB20DE25DC85F67F7ECEF08614F08896AED49C7661D324E4089B61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 00ACA40C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: 14d84b931a9942be425eec1c378fd1c59c23c1a8f36dfc37f30e6cc1b0c29108
                                                                                                  • Instruction ID: 6600f870b5d9314aacfb49720a2d5a33f71be716cff0ff35084b783834b15b38
                                                                                                  • Opcode Fuzzy Hash: 14d84b931a9942be425eec1c378fd1c59c23c1a8f36dfc37f30e6cc1b0c29108
                                                                                                  • Instruction Fuzzy Hash: C2318176509784AFE721CF25CC85F62FBB8EF06314F09849AE945CB252D364E809CB72
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • getaddrinfo.WS2_32(?,00000E2C), ref: 02891083
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: getaddrinfo
                                                                                                  • String ID:
                                                                                                  • API String ID: 300660673-0
                                                                                                  • Opcode ID: dc360f0fc35e9ffda148b05d06c9c78fb6d3abb13968f56daba31c4340c5f1c2
                                                                                                  • Instruction ID: b4b83556bc330fe6e62d9cf284a756f79c0a1b2044d84d513d3bd56bd620cc01
                                                                                                  • Opcode Fuzzy Hash: dc360f0fc35e9ffda148b05d06c9c78fb6d3abb13968f56daba31c4340c5f1c2
                                                                                                  • Instruction Fuzzy Hash: 5021B175100205AEFB31EB20DC89FAAF7ACEF04714F14885AEA499B541D775A5098BB1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: select
                                                                                                  • String ID:
                                                                                                  • API String ID: 1274211008-0
                                                                                                  • Opcode ID: c929fad40e049844f093a03d1220798770a339d9fec99d39c36bd44d028b15da
                                                                                                  • Instruction ID: 7adcac767a06a3fd45b3e4408a0b5c75fbbcf9483daf85878070ea88b8636b7d
                                                                                                  • Opcode Fuzzy Hash: c929fad40e049844f093a03d1220798770a339d9fec99d39c36bd44d028b15da
                                                                                                  • Instruction Fuzzy Hash: 1E215E79509384AFDB22CF24DC54A52BFF8EF06214B0884DAED88CB163D364E849CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetExitCodeProcess.KERNELBASE(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 028929D0
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CodeExitProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 3861947596-0
                                                                                                  • Opcode ID: 459154bed83afc589d243b622df582f11eeaf91c29d1c10f1d2c6a54f3bd6343
                                                                                                  • Instruction ID: db8042395cb0cc12621a35713caea7fb7b4265a8b0552368b8b402d296b5ec4c
                                                                                                  • Opcode Fuzzy Hash: 459154bed83afc589d243b622df582f11eeaf91c29d1c10f1d2c6a54f3bd6343
                                                                                                  • Instruction Fuzzy Hash: E721A7765093846FEB12CB24DC45B96BFA8DF06210F0884EBE944DF193D264A909C771
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileView
                                                                                                  • String ID:
                                                                                                  • API String ID: 3314676101-0
                                                                                                  • Opcode ID: 20d8dbe233ca41f5f2a26fd59200fb0ae1ab214433f9275fbdd7355980c5cc27
                                                                                                  • Instruction ID: f4d87b31e1d2a5dd72aa2cf7da7ed3d7daa0923edb1c084677cb0f9bf630d690
                                                                                                  • Opcode Fuzzy Hash: 20d8dbe233ca41f5f2a26fd59200fb0ae1ab214433f9275fbdd7355980c5cc27
                                                                                                  • Instruction Fuzzy Hash: BB21B176005384AFEB22CF25DC44FA6FFF8EF09210F08849EE9848B252D365B508CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • WSASocketW.WS2_32(?,?,?,?,?), ref: 02890306
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Socket
                                                                                                  • String ID:
                                                                                                  • API String ID: 38366605-0
                                                                                                  • Opcode ID: 5e8d2954da27809409a5f593edb2e0893010cc328b164b1ab217a4ae2df23eca
                                                                                                  • Instruction ID: e6dbadda21717d0f4b1c0fd64d27a5e244ca7b1ec72375a72af4a8602ac01c2a
                                                                                                  • Opcode Fuzzy Hash: 5e8d2954da27809409a5f593edb2e0893010cc328b164b1ab217a4ae2df23eca
                                                                                                  • Instruction Fuzzy Hash: B721A675409380AFDB21CF65DC45F66FFF8EF09210F08849EE9858B652D375A408CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegSetValueExW.KERNELBASE(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 00ACA4F8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value
                                                                                                  • String ID:
                                                                                                  • API String ID: 3702945584-0
                                                                                                  • Opcode ID: 3e48d840fe3b8686028258b5d147342b405a64ccce9a1eb74e9fc457b0a6dc7d
                                                                                                  • Instruction ID: 8363ba5e106c10e22a1e43a4abb70ce6bb7a50304d4528836d04b3b64c91a18b
                                                                                                  • Opcode Fuzzy Hash: 3e48d840fe3b8686028258b5d147342b405a64ccce9a1eb74e9fc457b0a6dc7d
                                                                                                  • Instruction Fuzzy Hash: 1521C472104384AFD7228F20DC45F67FFB8EF0A314F08849AE985DB152C264E808C772
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetFileType.KERNELBASE(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 00ACBCED
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileType
                                                                                                  • String ID:
                                                                                                  • API String ID: 3081899298-0
                                                                                                  • Opcode ID: c1df27e7030e797b10b70d126faa235f850c8c8b502121dd8a6b72499cdbaca0
                                                                                                  • Instruction ID: d800a229a6f266f08d2770063cd25244216bd4402f06490ffec3ae13a6837028
                                                                                                  • Opcode Fuzzy Hash: c1df27e7030e797b10b70d126faa235f850c8c8b502121dd8a6b72499cdbaca0
                                                                                                  • Instruction Fuzzy Hash: 8221F8B64087846FE712CB25DC51BA2BFB8EF47720F1884DBE9858B163D224A905C7B1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E2C), ref: 02890847
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DescriptorSecurity$ConvertString
                                                                                                  • String ID:
                                                                                                  • API String ID: 3907675253-0
                                                                                                  • Opcode ID: dfbeedb372cd7ba158615d343665d5fa52d10c37121470434c1770287042e2d3
                                                                                                  • Instruction ID: d116763e6fab9176b66a400dec540cc659027f44dc5e651d9d1b113cc3d73926
                                                                                                  • Opcode Fuzzy Hash: dfbeedb372cd7ba158615d343665d5fa52d10c37121470434c1770287042e2d3
                                                                                                  • Instruction Fuzzy Hash: C2219576600205AFEB20EF65DC45F6AFBACEF04614F08846AED48DB642D764E408CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 028926C6
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LookupPrivilegeValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3899507212-0
                                                                                                  • Opcode ID: a5d4f46b6bfd2c0f8cd756acfd573afe830d2b5f86c3d58a9cb9994bc99d06e4
                                                                                                  • Instruction ID: 07551e4b5fd1fff724b8c1bd6b387456baa899335c44efddd136c4b22cebde12
                                                                                                  • Opcode Fuzzy Hash: a5d4f46b6bfd2c0f8cd756acfd573afe830d2b5f86c3d58a9cb9994bc99d06e4
                                                                                                  • Instruction Fuzzy Hash: 502192B65093C06FDB12CF24DC54B52BFA8AF46224F0C84DAEC49DF253D225E809CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00ACBC01
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateFile
                                                                                                  • String ID:
                                                                                                  • API String ID: 823142352-0
                                                                                                  • Opcode ID: 395c9d6f036123b8e900bc3ccc716a5861a60dd43c2844b0daa523965bd38c13
                                                                                                  • Instruction ID: acdc93c75fd179a75c24b464dc22146851af67209982b846fb099b8745e16bd4
                                                                                                  • Opcode Fuzzy Hash: 395c9d6f036123b8e900bc3ccc716a5861a60dd43c2844b0daa523965bd38c13
                                                                                                  • Instruction Fuzzy Hash: BF21BD75504204AFEB21DF65DD86F66FBE8EF08310F04886EE9458B652D736E808CB71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 0289075C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: b74ddb0ce4dec9ef2d94c478926f430a43e94a05fb9cab47f1a90d4d88e21730
                                                                                                  • Instruction ID: f7f56ec71d13dfb568d2a164f784b5d9bfe80999aa354db9f510198912921b7e
                                                                                                  • Opcode Fuzzy Hash: b74ddb0ce4dec9ef2d94c478926f430a43e94a05fb9cab47f1a90d4d88e21730
                                                                                                  • Instruction Fuzzy Hash: 78219076105344AFEB21CF25DC85F66FBF8EF09220F08849AE949DB152D365E809CB71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ReadFile.KERNELBASE(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 02890091
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileRead
                                                                                                  • String ID:
                                                                                                  • API String ID: 2738559852-0
                                                                                                  • Opcode ID: 9dc358bec276e14d5438c06395c1a73c0eb28c82d45334d21dc3c357e3fa678b
                                                                                                  • Instruction ID: 14a0e8248dee0465b5ff3930620596bb38cc09e76224f40d74413816183f95b2
                                                                                                  • Opcode Fuzzy Hash: 9dc358bec276e14d5438c06395c1a73c0eb28c82d45334d21dc3c357e3fa678b
                                                                                                  • Instruction Fuzzy Hash: 96216576409384AFDB228F65DC45F56FFB8EF46214F0884DBE984DB153C265A409CB72
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegOpenKeyExW.KERNELBASE(?,00000E2C), ref: 00ACABD1
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Open
                                                                                                  • String ID:
                                                                                                  • API String ID: 71445658-0
                                                                                                  • Opcode ID: a264c41eef59e22133a4e6e1ace4307997349ac27ae4e110ad3ea8a2dd44aba6
                                                                                                  • Instruction ID: ef56c0a8a1d04f0993662a815e021d3e4b92d33e47bcac6e5d05d863a8403c78
                                                                                                  • Opcode Fuzzy Hash: a264c41eef59e22133a4e6e1ace4307997349ac27ae4e110ad3ea8a2dd44aba6
                                                                                                  • Instruction Fuzzy Hash: 5B21D472500608AFEB20DF64DC85F7BF7ECEF18314F04845AE9459B252D724E9088B71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetProcessWorkingSetSize.KERNEL32(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 02892B93
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ProcessSizeWorking
                                                                                                  • String ID:
                                                                                                  • API String ID: 3584180929-0
                                                                                                  • Opcode ID: 55205aff9d6c436f7d124d127f3f2c6ef6706f22ee0bac6dfb43342fd16e2ea5
                                                                                                  • Instruction ID: 8252ec5c5937c918da4b5cffb9e193e3e341d5c1fc38240b1d7c480a169586b2
                                                                                                  • Opcode Fuzzy Hash: 55205aff9d6c436f7d124d127f3f2c6ef6706f22ee0bac6dfb43342fd16e2ea5
                                                                                                  • Instruction Fuzzy Hash: EF219576509384AFDB21CF25DC45F66FFA8EF46210F0884ABE948DB152D364A944CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetProcessWorkingSetSize.KERNEL32(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 02892AAF
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ProcessSizeWorking
                                                                                                  • String ID:
                                                                                                  • API String ID: 3584180929-0
                                                                                                  • Opcode ID: 55205aff9d6c436f7d124d127f3f2c6ef6706f22ee0bac6dfb43342fd16e2ea5
                                                                                                  • Instruction ID: ab2ad1cdcd694203ce7a37811df51f6986291e8b35bc212754f678ec171a653e
                                                                                                  • Opcode Fuzzy Hash: 55205aff9d6c436f7d124d127f3f2c6ef6706f22ee0bac6dfb43342fd16e2ea5
                                                                                                  • Instruction Fuzzy Hash: 8D2195765093846FEB21CF25DC45F66FFA8EF46210F08C4ABE948DB152D364A408CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • shutdown.WS2_32(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 02890C80
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: shutdown
                                                                                                  • String ID:
                                                                                                  • API String ID: 2510479042-0
                                                                                                  • Opcode ID: d04b11093390e78d34637cd309021e4635d7bfa368583520280de95a3515c52e
                                                                                                  • Instruction ID: 98527b606f17d9fd927c5d21a1f747338713f155dbf5212ebea74d7ddb102a65
                                                                                                  • Opcode Fuzzy Hash: d04b11093390e78d34637cd309021e4635d7bfa368583520280de95a3515c52e
                                                                                                  • Instruction Fuzzy Hash: BD2195B6409384AFDB128F24DC45B56FFB8EF46214F0884DBE948DF153C368A549CB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 00ACA780
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ChangeCloseFindNotification
                                                                                                  • String ID:
                                                                                                  • API String ID: 2591292051-0
                                                                                                  • Opcode ID: 3713b58e6a08a6c288fcfc487d4d836cc3d48236b32f5e7c20d75d8841d41085
                                                                                                  • Instruction ID: 513384448ba7a8fd1b1a5ffb293b4f988405399dbbb613bf95e4c40c3348a4fd
                                                                                                  • Opcode Fuzzy Hash: 3713b58e6a08a6c288fcfc487d4d836cc3d48236b32f5e7c20d75d8841d41085
                                                                                                  • Instruction Fuzzy Hash: 0F21F2B54497849FD7128F64ED85BA1BFB4EF12324F0980DBEC448F263D2249949CBA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CreateMutexW.KERNELBASE(?,?), ref: 00ACA6B9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateMutex
                                                                                                  • String ID:
                                                                                                  • API String ID: 1964310414-0
                                                                                                  • Opcode ID: e43347b698b7b211b507a30297e7e858afb3628b1df51ebf9589f9cad66e50f0
                                                                                                  • Instruction ID: 37fe3d8ff18c854008e9ab0d53a61e3637c4cc42028d1a48272def1217cb3266
                                                                                                  • Opcode Fuzzy Hash: e43347b698b7b211b507a30297e7e858afb3628b1df51ebf9589f9cad66e50f0
                                                                                                  • Instruction Fuzzy Hash: B421CFB5600244AFE720DF25DD85F66FBE8EF14314F0884AEE949CB242D374E809CB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ioctlsocket.WS2_32(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 02892527
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ioctlsocket
                                                                                                  • String ID:
                                                                                                  • API String ID: 3577187118-0
                                                                                                  • Opcode ID: 79bbc61ac9f66642faf9b329d84663eff03218acb199c788f8fbee24453f7d20
                                                                                                  • Instruction ID: fe08b47fbe2f1de0795e77c1892377d922cc77cacded2fcbf53bc1b2007d3d14
                                                                                                  • Opcode Fuzzy Hash: 79bbc61ac9f66642faf9b329d84663eff03218acb199c788f8fbee24453f7d20
                                                                                                  • Instruction Fuzzy Hash: 43219376409384BFDB22CF64DC95F66FFA8EF46610F0884ABE9489B152C374A508CB71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 00ACA40C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: e2248bb557a0faf70bf393c41ffe232b1a56269a2104bb65019712a5e1f1badd
                                                                                                  • Instruction ID: 6276920d0692851afd94f910912174e670aa7197c21a8403cdc0e2f6f26b1155
                                                                                                  • Opcode Fuzzy Hash: e2248bb557a0faf70bf393c41ffe232b1a56269a2104bb65019712a5e1f1badd
                                                                                                  • Instruction Fuzzy Hash: 43219076600208AFEB20DF25DD85F66F7ECEF18714F04846AE945CB252D764E909CA72
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 02892900
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ChangeCloseFindNotification
                                                                                                  • String ID:
                                                                                                  • API String ID: 2591292051-0
                                                                                                  • Opcode ID: 6195329e7d35fe4b44fde8facc105c1c326a18dfb15c1f10eac9b0bab7b341a3
                                                                                                  • Instruction ID: 39ebab4104c89804fe074d65244e73a32130616cb3a5ef426ed587d094d987f6
                                                                                                  • Opcode Fuzzy Hash: 6195329e7d35fe4b44fde8facc105c1c326a18dfb15c1f10eac9b0bab7b341a3
                                                                                                  • Instruction Fuzzy Hash: 2521A4765093C05FDB128B25DC54A92BFB4AF07224F0D80DAEC858F663D2649908CB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 0289120A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Connect
                                                                                                  • String ID:
                                                                                                  • API String ID: 3144859779-0
                                                                                                  • Opcode ID: bcd6a1e9fe98f0c4c63d5716215c00d0f783c65cc0eac425ae56dff74b7a35a3
                                                                                                  • Instruction ID: c3dfc00c2f3be57cb48b0d543b452cc4678c7092a5ced60cebaf0e0ede772c32
                                                                                                  • Opcode Fuzzy Hash: bcd6a1e9fe98f0c4c63d5716215c00d0f783c65cc0eac425ae56dff74b7a35a3
                                                                                                  • Instruction Fuzzy Hash: 65215075408384AFDB228F65DC44B62FFF4EF06210F08859AE989CB262D375A819DB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileView
                                                                                                  • String ID:
                                                                                                  • API String ID: 3314676101-0
                                                                                                  • Opcode ID: a79eb16d5115259a39881164282cf036d3e70a5b4f41f5b3c9344784383e66f6
                                                                                                  • Instruction ID: 8f3e2e45066a055ccd3be36951d80b0e34d2b671a590870a1faa59b8c6a8b317
                                                                                                  • Opcode Fuzzy Hash: a79eb16d5115259a39881164282cf036d3e70a5b4f41f5b3c9344784383e66f6
                                                                                                  • Instruction Fuzzy Hash: AE21C076500204AFEB21DF25DD85FA6FBE8EF08314F08845AE9498B252D375F519CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • WSASocketW.WS2_32(?,?,?,?,?), ref: 02890306
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Socket
                                                                                                  • String ID:
                                                                                                  • API String ID: 38366605-0
                                                                                                  • Opcode ID: 890b9a7a2d5c4521f086987e5838eb8f3ff61831652554ee342494c251652015
                                                                                                  • Instruction ID: 7220eb2c9abe19fb51a7528168633ba667a877c261c2c154349cefe5a6c038f1
                                                                                                  • Opcode Fuzzy Hash: 890b9a7a2d5c4521f086987e5838eb8f3ff61831652554ee342494c251652015
                                                                                                  • Instruction Fuzzy Hash: 2A21F375404200AFEB21DF65DC45B66FBE8EF08314F08886EE9498B652D375A408CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LoadLibraryA.KERNELBASE(?,00000E2C), ref: 028915AF
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LibraryLoad
                                                                                                  • String ID:
                                                                                                  • API String ID: 1029625771-0
                                                                                                  • Opcode ID: caeed77b193a25a7bbab521293534a6cd1dcf372b8f8699ceaa31a615e585703
                                                                                                  • Instruction ID: 0ee2574b172ee6bcfd9e3e8f277d4042bab53efd6fd4fff41da7776461fe0a20
                                                                                                  • Opcode Fuzzy Hash: caeed77b193a25a7bbab521293534a6cd1dcf372b8f8699ceaa31a615e585703
                                                                                                  • Instruction Fuzzy Hash: 8C110675108344AFE721CB21DC85FA6FFA8DF05320F08849AFD499B192D368A949CB75
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 0289075C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: b79f244939a56a5a4c5d85cdee3177aa4c251cbbed607d36e346af1abe0fa5c1
                                                                                                  • Instruction ID: 150bc9da0dc72dee76b1ea21d2cb2b33b8aa3227fd75ee4c23034bb9eed2505d
                                                                                                  • Opcode Fuzzy Hash: b79f244939a56a5a4c5d85cdee3177aa4c251cbbed607d36e346af1abe0fa5c1
                                                                                                  • Instruction Fuzzy Hash: 0811AF7A500604AFEB20DE25DC81F66F7E8EF08624F08C46AE949CB252D366E409CA71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegSetValueExW.KERNELBASE(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 00ACA4F8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value
                                                                                                  • String ID:
                                                                                                  • API String ID: 3702945584-0
                                                                                                  • Opcode ID: 73dc6e371936fe4562a05e9eaa3dafbc7a5c77af665b6e1ab207b28e402920c9
                                                                                                  • Instruction ID: d33feef62c242a62b1b9808234dd14b82b33a0ba267eaf70a81797799a3ae78f
                                                                                                  • Opcode Fuzzy Hash: 73dc6e371936fe4562a05e9eaa3dafbc7a5c77af665b6e1ab207b28e402920c9
                                                                                                  • Instruction Fuzzy Hash: 6D11B176600208AFEB209F25DD45F76FBACEF18714F04856AED499B252D364E808CA72
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetProcessTimes.KERNELBASE(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 02890F51
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ProcessTimes
                                                                                                  • String ID:
                                                                                                  • API String ID: 1995159646-0
                                                                                                  • Opcode ID: 76f78566547d6d9c1d7037f058b7c4dc8a86f2f2d82c13cc8455188b8b17728f
                                                                                                  • Instruction ID: 6bda98fb66cf528b47564ae5649eefc7382637e974c28e3c9785d3401e91259b
                                                                                                  • Opcode Fuzzy Hash: 76f78566547d6d9c1d7037f058b7c4dc8a86f2f2d82c13cc8455188b8b17728f
                                                                                                  • Instruction Fuzzy Hash: 6411E676500205AFEB21DF64DC85F6AF7A8EF08314F08886AED49CB551D374A508CB71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetComputerNameW.KERNEL32(?,00000E2C,?,?), ref: 028906A2
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ComputerName
                                                                                                  • String ID:
                                                                                                  • API String ID: 3545744682-0
                                                                                                  • Opcode ID: 2142997953fcab8c30190b476d1685dc0a204c8347957c4688a8a72d603d3c51
                                                                                                  • Instruction ID: 6145dec1bbd96291813d4f9a71bf35a1b7a76cc049d166480fbaebd7923f24a3
                                                                                                  • Opcode Fuzzy Hash: 2142997953fcab8c30190b476d1685dc0a204c8347957c4688a8a72d603d3c51
                                                                                                  • Instruction Fuzzy Hash: 9D11C871405380AFD7118B16DC41F36FFB8EF86720F05819BED449B652D225B915CBB2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetProcessWorkingSetSize.KERNEL32(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 02892B93
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ProcessSizeWorking
                                                                                                  • String ID:
                                                                                                  • API String ID: 3584180929-0
                                                                                                  • Opcode ID: b44d35fd1f98431636d905175329cb1b8315b19a634bb35017e87ca8572c5207
                                                                                                  • Instruction ID: 4542a52b1af82dd3b83fd4ec1e15e17083d919fa370da16f034e2d479b0e1bd3
                                                                                                  • Opcode Fuzzy Hash: b44d35fd1f98431636d905175329cb1b8315b19a634bb35017e87ca8572c5207
                                                                                                  • Instruction Fuzzy Hash: 6011C47A500205AFEB21DF74DC85BAAF7E8EF05324F0884AAED09DB255D774A504CB71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetProcessWorkingSetSize.KERNEL32(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 02892AAF
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ProcessSizeWorking
                                                                                                  • String ID:
                                                                                                  • API String ID: 3584180929-0
                                                                                                  • Opcode ID: b44d35fd1f98431636d905175329cb1b8315b19a634bb35017e87ca8572c5207
                                                                                                  • Instruction ID: 9ee7e364a1756f33e3c7f4895535bef10ba416b2c21ba45b94376582767284df
                                                                                                  • Opcode Fuzzy Hash: b44d35fd1f98431636d905175329cb1b8315b19a634bb35017e87ca8572c5207
                                                                                                  • Instruction Fuzzy Hash: E411C876500205AFEB21DF65DC85B66FBD8DF04214F08C86AED49CB155D774A414CB71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetExitCodeProcess.KERNELBASE(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 028929D0
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CodeExitProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 3861947596-0
                                                                                                  • Opcode ID: 6c85a2c226d2bc9c17f03cdce6a528c4f09dd7541573d763abe2c028c7f21a4c
                                                                                                  • Instruction ID: 5e2824742d774fa565f4fa176214537427e24975c747e71a4145db8f0ac5ecc7
                                                                                                  • Opcode Fuzzy Hash: 6c85a2c226d2bc9c17f03cdce6a528c4f09dd7541573d763abe2c028c7f21a4c
                                                                                                  • Instruction Fuzzy Hash: 7411E37A500205AFEB20DF25DC86B6AF798DF04224F0884AAED08DB256D778A404CBB1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00ACB252
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DuplicateHandle
                                                                                                  • String ID:
                                                                                                  • API String ID: 3793708945-0
                                                                                                  • Opcode ID: 69ab9571dd1e91ce9b76763036ed5cef238398afacdd0ace9e8d401a2a8a3128
                                                                                                  • Instruction ID: 9db21039fb946ff47c2f47515335472e9a7667e9022b613db2b3d8967c7919af
                                                                                                  • Opcode Fuzzy Hash: 69ab9571dd1e91ce9b76763036ed5cef238398afacdd0ace9e8d401a2a8a3128
                                                                                                  • Instruction Fuzzy Hash: D0117572409380AFDB228F50DC44A62FFF4EF4A310F0884DEED858B552C276A418DB71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ReadFile.KERNELBASE(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 02890091
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileRead
                                                                                                  • String ID:
                                                                                                  • API String ID: 2738559852-0
                                                                                                  • Opcode ID: 3a00557c60a524333080e6cf3d25717f95da0f1bc8d2d365c19da215a69daea8
                                                                                                  • Instruction ID: 1cb38cd1bf753982eadefe8418d7eb2a65e6f15df10d3b73c9ce8ed1756446d4
                                                                                                  • Opcode Fuzzy Hash: 3a00557c60a524333080e6cf3d25717f95da0f1bc8d2d365c19da215a69daea8
                                                                                                  • Instruction Fuzzy Hash: F511C476400304AFEB21DF64DD45F66FBA8EF08314F08886AED499B151C375A408CBB1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ioctlsocket.WS2_32(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 02892527
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ioctlsocket
                                                                                                  • String ID:
                                                                                                  • API String ID: 3577187118-0
                                                                                                  • Opcode ID: 7c9ab16507f103b219af3e3584ba75476e65f93c20461ba85433b1c333bc55fc
                                                                                                  • Instruction ID: 19ca448392bad202e0c09d56c13a6cce52f3ff04731443ee0bfd989c5059fcd3
                                                                                                  • Opcode Fuzzy Hash: 7c9ab16507f103b219af3e3584ba75476e65f93c20461ba85433b1c333bc55fc
                                                                                                  • Instruction Fuzzy Hash: DA11E376400204BFEB21DF64DC95B66F7A8EF08724F08C4AAED08DB256C374A508CBB1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • shutdown.WS2_32(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 02890C80
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: shutdown
                                                                                                  • String ID:
                                                                                                  • API String ID: 2510479042-0
                                                                                                  • Opcode ID: ac8774527772cfde9724c80151faed6a56a6d684f43326f2e9672ae62e583c10
                                                                                                  • Instruction ID: 13c2e08d030c98e3f49571eff2eb4e57c92bd3925033393dacc7e579ece47987
                                                                                                  • Opcode Fuzzy Hash: ac8774527772cfde9724c80151faed6a56a6d684f43326f2e9672ae62e583c10
                                                                                                  • Instruction Fuzzy Hash: CA11C675500204AEEB21DF25DD85B6AF798DF45324F08C4A6ED48DB252D378A509CBB1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 00ACAAE0
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ChangeCloseFindNotification
                                                                                                  • String ID:
                                                                                                  • API String ID: 2591292051-0
                                                                                                  • Opcode ID: 81d7ce62b618d940e337fca935e312e6b34e07ae16f819d8257883d671b20ea0
                                                                                                  • Instruction ID: 950da4c39794d624718624e68ba37ab0316917a8880e6cbccd4288165c54d7a1
                                                                                                  • Opcode Fuzzy Hash: 81d7ce62b618d940e337fca935e312e6b34e07ae16f819d8257883d671b20ea0
                                                                                                  • Instruction Fuzzy Hash: A1115E714093C46FDB128B25DC44AA2BFB4DF47210F0984DAED888F153C265A948DBA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LoadLibraryA.KERNELBASE(?,00000E2C), ref: 028915AF
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LibraryLoad
                                                                                                  • String ID:
                                                                                                  • API String ID: 1029625771-0
                                                                                                  • Opcode ID: 1bd9cf8180153ebf113df460027263bf9fb02ef80da67991209d089a3765942a
                                                                                                  • Instruction ID: 0eaef0bbdc1626a31531a5e6ba83c242cec4fb3c5e4b3c269a0c03bb3be44e5f
                                                                                                  • Opcode Fuzzy Hash: 1bd9cf8180153ebf113df460027263bf9fb02ef80da67991209d089a3765942a
                                                                                                  • Instruction Fuzzy Hash: FC112579504205AFFB20DB25DC46BB6F798DF04724F18C49AED099B282D3B8A509CB65
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetErrorMode.KERNELBASE(?), ref: 00ACA330
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorMode
                                                                                                  • String ID:
                                                                                                  • API String ID: 2340568224-0
                                                                                                  • Opcode ID: 429ac5d3b71c7ab9f8db3a554ea294d55920cb78b0c3b45a2d2afab30fd2f321
                                                                                                  • Instruction ID: c94eb859ae9bf9e8e6a02c86ecbcb73a179c9fc79869c9d715a91cead9035cee
                                                                                                  • Opcode Fuzzy Hash: 429ac5d3b71c7ab9f8db3a554ea294d55920cb78b0c3b45a2d2afab30fd2f321
                                                                                                  • Instruction Fuzzy Hash: 2A116D754093C46FDB228B25DC54B62BFB49F57224F0980DBED848F263C265A908D772
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: select
                                                                                                  • String ID:
                                                                                                  • API String ID: 1274211008-0
                                                                                                  • Opcode ID: 146c0df5060c32d999963c4d2d8572dd1216afd687f95006b3dbcf410666a743
                                                                                                  • Instruction ID: be0d41b7b2d62703193aebc33148face3720b2c7995cc5a9487a432638312769
                                                                                                  • Opcode Fuzzy Hash: 146c0df5060c32d999963c4d2d8572dd1216afd687f95006b3dbcf410666a743
                                                                                                  • Instruction Fuzzy Hash: B2118C79600204AFDB20CF65D895B66FBE8EF08214F08C5AADD49CB616D334E848CF61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: send
                                                                                                  • String ID:
                                                                                                  • API String ID: 2809346765-0
                                                                                                  • Opcode ID: f703aabd1a19fe59c3e066d3f56f0bcf763a80afa57cab1a7d280bf672d04dbe
                                                                                                  • Instruction ID: d3c2c35f48832747ad680193b7d910335c59438c2e92cf997320f0cfff462190
                                                                                                  • Opcode Fuzzy Hash: f703aabd1a19fe59c3e066d3f56f0bcf763a80afa57cab1a7d280bf672d04dbe
                                                                                                  • Instruction Fuzzy Hash: 4F118275409384AFDB22CF15DD44F62FFB4EF56214F09849EED888B552C275A818CB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 028926C6
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LookupPrivilegeValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3899507212-0
                                                                                                  • Opcode ID: 89771e9a8ca5a6866fcde2810a57bcf291d4d3d2926215e7a96d9339e32db7f9
                                                                                                  • Instruction ID: b72a0b683921b9b136458ea18bd6074cce7a473b32cadac73479e55462e4c6bc
                                                                                                  • Opcode Fuzzy Hash: 89771e9a8ca5a6866fcde2810a57bcf291d4d3d2926215e7a96d9339e32db7f9
                                                                                                  • Instruction Fuzzy Hash: D5118279600240AFDB21DF25DC45766FBE8EF04224F0CC4AADD09CB656D375E808CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetFileType.KERNELBASE(?,00000E2C,CDC1C499,00000000,00000000,00000000,00000000), ref: 00ACBCED
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileType
                                                                                                  • String ID:
                                                                                                  • API String ID: 3081899298-0
                                                                                                  • Opcode ID: ea15b6771d436ed66a881f76c4b19ccbe2df4e20454135feb032ebe2347b4e89
                                                                                                  • Instruction ID: b77dfec4ed9a191799c148f41deced8fe68ecc454529ffbef160bb14b933712e
                                                                                                  • Opcode Fuzzy Hash: ea15b6771d436ed66a881f76c4b19ccbe2df4e20454135feb032ebe2347b4e89
                                                                                                  • Instruction Fuzzy Hash: 0D012672504204AEE720DF25DC86F66F7A8DF08324F14C4AAED059B252C778A9088A71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: IdleInputWait
                                                                                                  • String ID:
                                                                                                  • API String ID: 2200289081-0
                                                                                                  • Opcode ID: c3612e68d7c484cdd96a6475b64bf7fff2ce226e9ae03face0fa8862d516b021
                                                                                                  • Instruction ID: e1155e9fe170b22889aa60284aec13a3f884a07c019ee2291df96761da294521
                                                                                                  • Opcode Fuzzy Hash: c3612e68d7c484cdd96a6475b64bf7fff2ce226e9ae03face0fa8862d516b021
                                                                                                  • Instruction Fuzzy Hash: 9611A7754093849FD711CF14DD44B66FFA4EF16220F0984DEDD498F153D275A809CB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 0289120A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Connect
                                                                                                  • String ID:
                                                                                                  • API String ID: 3144859779-0
                                                                                                  • Opcode ID: fd379ec3b8c2d3ff7af84f9ab5042f94f4102238a25a543d694e6d97c3fffdad
                                                                                                  • Instruction ID: a064374a7063fccfc18b45f8916daf05345c5858d2e71f12d0a9cfa50d46f1f3
                                                                                                  • Opcode Fuzzy Hash: fd379ec3b8c2d3ff7af84f9ab5042f94f4102238a25a543d694e6d97c3fffdad
                                                                                                  • Instruction Fuzzy Hash: E7117C795042459FDF21DFA5D888B66FBE4EF08610F08C5AAED49CB622D335E418CF61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetVolumeInformationA.KERNELBASE(?,00000E2C,?,?), ref: 0289130A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InformationVolume
                                                                                                  • String ID:
                                                                                                  • API String ID: 2039140958-0
                                                                                                  • Opcode ID: 3e7e298002be8db20742a53d7e043824efc7b984921d9cb15b978a1992db7f6e
                                                                                                  • Instruction ID: 591d9ff1fea3393564ffd91a9e37b2a99d8773f1bb4a422c6eb68453956a3e2d
                                                                                                  • Opcode Fuzzy Hash: 3e7e298002be8db20742a53d7e043824efc7b984921d9cb15b978a1992db7f6e
                                                                                                  • Instruction Fuzzy Hash: C701B171500200ABD710DF16DC82B76FBE8EB88A20F14C12AED089BB41E331B915CBE5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00ACB252
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DuplicateHandle
                                                                                                  • String ID:
                                                                                                  • API String ID: 3793708945-0
                                                                                                  • Opcode ID: 1c58e12ab17803ac83a8f069a8b7b3fb9fd1debe6f32b3ee80202f2832710727
                                                                                                  • Instruction ID: 8559ace56971d3447f25239d57da2487dde4572745bcdf57e38f99234f6f459b
                                                                                                  • Opcode Fuzzy Hash: 1c58e12ab17803ac83a8f069a8b7b3fb9fd1debe6f32b3ee80202f2832710727
                                                                                                  • Instruction Fuzzy Hash: 97015B364046409FDB219FA5D946B66FBE0EF08320F08C5AEED498A622C376A418DF61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 02892900
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ChangeCloseFindNotification
                                                                                                  • String ID:
                                                                                                  • API String ID: 2591292051-0
                                                                                                  • Opcode ID: 68bb183d62cacc995988c7e0f9aec9594a4c9de8085b50dd1d877995a82be90d
                                                                                                  • Instruction ID: 8799fe1a7ee49b0b1ef6d942a752dfea679497868ac01ae8417b1219ccec5603
                                                                                                  • Opcode Fuzzy Hash: 68bb183d62cacc995988c7e0f9aec9594a4c9de8085b50dd1d877995a82be90d
                                                                                                  • Instruction Fuzzy Hash: 8001DF79500344AFDB20DF25E885B66FBA4EF05221F08C0ABDC4ACF616C274E408CBA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E2C,?,?), ref: 0289024E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: 3ad90c00baeb35e7b45862df340d11b4a812f9f3da1d592a0d9ee546ba888eae
                                                                                                  • Instruction ID: 5605d9e6e3d9d3f9dddb964b5857283cf7ec68d871367273918c9d6f7be689f9
                                                                                                  • Opcode Fuzzy Hash: 3ad90c00baeb35e7b45862df340d11b4a812f9f3da1d592a0d9ee546ba888eae
                                                                                                  • Instruction Fuzzy Hash: 5E018F75500201ABD610DF16DC82B36FBE8EB88A20F14C21AED085BB41E371B515CBA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetComputerNameW.KERNEL32(?,00000E2C,?,?), ref: 028906A2
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626335078.0000000002890000.00000040.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2890000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ComputerName
                                                                                                  • String ID:
                                                                                                  • API String ID: 3545744682-0
                                                                                                  • Opcode ID: e8243bac33eb09ae125eadbecdaf6687badaab41dc5cca21b6b02d0563ceae4e
                                                                                                  • Instruction ID: adde85de0a7fe9486ca9cbb237982232d235fd2f1b56326c1c840d992c5d1a35
                                                                                                  • Opcode Fuzzy Hash: e8243bac33eb09ae125eadbecdaf6687badaab41dc5cca21b6b02d0563ceae4e
                                                                                                  • Instruction Fuzzy Hash: EF01A275500201ABD610DF16DC82B36FBE8FB88A20F14C25AED085BB41E331F515CBE5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 00ACA780
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ChangeCloseFindNotification
                                                                                                  • String ID:
                                                                                                  • API String ID: 2591292051-0
                                                                                                  • Opcode ID: 2cb080047e1b3796ff6fcfd8301b65a512f38475fedcdaf4d9d53c6eb91059f0
                                                                                                  • Instruction ID: fa0d026d90ca41d5dccb891446ec5681d00ce5d2993a06677013d00df62b583d
                                                                                                  • Opcode Fuzzy Hash: 2cb080047e1b3796ff6fcfd8301b65a512f38475fedcdaf4d9d53c6eb91059f0
                                                                                                  • Instruction Fuzzy Hash: 7B01DF755002449FEB20DF25E985B66FBA4EF14324F08C0ABDC09CF212D278E808CEA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: send
                                                                                                  • String ID:
                                                                                                  • API String ID: 2809346765-0
                                                                                                  • Opcode ID: 660d3d8f3c1144ebbfa6d72dc2b7394a424d8c3d535f2527719aae40164aad78
                                                                                                  • Instruction ID: 4ba1447d5df672811c8bb68dc982f0091a4587945a5382c4e5edfc5ce0d51f23
                                                                                                  • Opcode Fuzzy Hash: 660d3d8f3c1144ebbfa6d72dc2b7394a424d8c3d535f2527719aae40164aad78
                                                                                                  • Instruction Fuzzy Hash: 7601BC755003449FDB20DF65E885B66FBA0EF18328F08C5AEED498B612D375E418CFA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: IdleInputWait
                                                                                                  • String ID:
                                                                                                  • API String ID: 2200289081-0
                                                                                                  • Opcode ID: 64c003c7040b3ab938a3c4eaef22482ca31c8fbe38d92843b9333bf494d43537
                                                                                                  • Instruction ID: 70639a3083385f09636f1a91d1b40393ea184a3e9bd61e8b60deb193495375f1
                                                                                                  • Opcode Fuzzy Hash: 64c003c7040b3ab938a3c4eaef22482ca31c8fbe38d92843b9333bf494d43537
                                                                                                  • Instruction Fuzzy Hash: 8301A2754046449FDB20DF25D985B76FBA4EF14324F08C4AEDD498F216D279E908CFA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 00ACAAE0
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ChangeCloseFindNotification
                                                                                                  • String ID:
                                                                                                  • API String ID: 2591292051-0
                                                                                                  • Opcode ID: e8c6661bad2ac7b9b89d0494b54142d03c5684c4617789bd5efcbe418e5d60e7
                                                                                                  • Instruction ID: 7559b74d1b4843e84d9aeea710d8cefedb8c41a0b3e5ba4f1fc190b415f4cc2c
                                                                                                  • Opcode Fuzzy Hash: e8c6661bad2ac7b9b89d0494b54142d03c5684c4617789bd5efcbe418e5d60e7
                                                                                                  • Instruction Fuzzy Hash: 7601A2759042449FDB20DF25D985B65FBA4DF14324F08C4AADD488F216D278A848CEA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetErrorMode.KERNELBASE(?), ref: 00ACA330
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624364482.0000000000ACA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ACA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_aca000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorMode
                                                                                                  • String ID:
                                                                                                  • API String ID: 2340568224-0
                                                                                                  • Opcode ID: aac2bac763cb6b498ee10c077f17a7fcdeae5dde6cbacc667d8395b2f2d66986
                                                                                                  • Instruction ID: 0cc4bfb46515b6c0f0eddc8f97713345a5b2196ca95554ff2e61675e73fdc36c
                                                                                                  • Opcode Fuzzy Hash: aac2bac763cb6b498ee10c077f17a7fcdeae5dde6cbacc667d8395b2f2d66986
                                                                                                  • Instruction Fuzzy Hash: EBF0A439904688DFDB20DF19D889B75FBA0EF14324F08C0AADD494F316D279A508DAA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626296833.0000000002750000.00000040.00000020.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2750000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: af816d02be3f1baebedc7e85954232219859aa8875c87509c445d4ba4794fafe
                                                                                                  • Instruction ID: 67926cfe3927d7c23e5d13260302002d783bcf00ef5a3fc743415e74e182903a
                                                                                                  • Opcode Fuzzy Hash: af816d02be3f1baebedc7e85954232219859aa8875c87509c445d4ba4794fafe
                                                                                                  • Instruction Fuzzy Hash: FD21607550D3C19FD7178B20C850B55BFB1AF4B318F2989DED8854B6A3C37A9806CB92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626705219.0000000005380000.00000040.00000800.00020000.00000000.sdmp, Offset: 05380000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5380000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8f8a4f02ebfa3e406589d42b911907a84240226fb72e92bc7bed66c232d1f62f
                                                                                                  • Instruction ID: 73964567b510edd28dc233e334922df9ca8b15f93e9643387605383bcf64487d
                                                                                                  • Opcode Fuzzy Hash: 8f8a4f02ebfa3e406589d42b911907a84240226fb72e92bc7bed66c232d1f62f
                                                                                                  • Instruction Fuzzy Hash: 2C11BAB5508341AFD350CF59D881A5BFBE4FB8C664F04896EF998D7311D235E9048FA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626296833.0000000002750000.00000040.00000020.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2750000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3c301c407d22de86ec5c845cf46fb9aa4c4aa4731158ceeaaed7ee849423054e
                                                                                                  • Instruction ID: e4add8a0593bc1e9a325d051bef537de56b9fd3cc56843453c83cdc00793ab3c
                                                                                                  • Opcode Fuzzy Hash: 3c301c407d22de86ec5c845cf46fb9aa4c4aa4731158ceeaaed7ee849423054e
                                                                                                  • Instruction Fuzzy Hash: 9321493550D3C19FD707CB20C850B55BFA1AF4B308F2989EED8894B6A3C37A9806CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626296833.0000000002750000.00000040.00000020.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2750000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6c47396d5ab42dcfed5dc9472971bad8cdb41347ba93ff5170704b1e4941e597
                                                                                                  • Instruction ID: 95bc21b0718e949d6f48e29f70b7b322a53d060948a463df46402eae4e73f537
                                                                                                  • Opcode Fuzzy Hash: 6c47396d5ab42dcfed5dc9472971bad8cdb41347ba93ff5170704b1e4941e597
                                                                                                  • Instruction Fuzzy Hash: 4D11CD312042809FD715DB20C946F26FBA1AB88708F24C9ADE9491B652C7BBE813CA81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624385485.0000000000ADA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_ada000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: accfb3977936dfdba6bd780a7677a232a09436ad30325b984097a264d7f2f3f7
                                                                                                  • Instruction ID: c50c2107fcfa3abe77cc33e0e6b4d45875f458bcdc372abf498184146313bc44
                                                                                                  • Opcode Fuzzy Hash: accfb3977936dfdba6bd780a7677a232a09436ad30325b984097a264d7f2f3f7
                                                                                                  • Instruction Fuzzy Hash: 3411FAB5508301AFD350CF59DC81A5BFBE8EB88660F04C96EFD5897311D235E9088FA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626296833.0000000002750000.00000040.00000020.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2750000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7df52d352fb5fbd65cbfc79201d54bf1a9296dd7ff4658ed89b4569ca6afbf25
                                                                                                  • Instruction ID: b337959581cc70ee0c07cb3dcaae3779b2d3956488e76e134f68b55479b2bb41
                                                                                                  • Opcode Fuzzy Hash: 7df52d352fb5fbd65cbfc79201d54bf1a9296dd7ff4658ed89b4569ca6afbf25
                                                                                                  • Instruction Fuzzy Hash: 3DF0D6B64097806FD7118F16EC40862FFB8DE86620708C09FEC498B612D129A808CB72
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626296833.0000000002750000.00000040.00000020.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2750000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7ab38dfbd6ac62e32cc74cdc18d25f125103682e2e349cf7a93ad11eec8fac1f
                                                                                                  • Instruction ID: dfdec2cf1459c37bfac4a5bf50e85fc79d3c25e3ff31b12331718a311ff5f07f
                                                                                                  • Opcode Fuzzy Hash: 7ab38dfbd6ac62e32cc74cdc18d25f125103682e2e349cf7a93ad11eec8fac1f
                                                                                                  • Instruction Fuzzy Hash: E6F0F635108644DFC206CF00D941F25FBA2EB89718F24CAA9E9491BB62C77BA813DA81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626296833.0000000002750000.00000040.00000020.00020000.00000000.sdmp, Offset: 02750000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_2750000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 74c52820fd9ac8236846d02b50a78361522ef38160a4ecfecb8aa06b4628e90a
                                                                                                  • Instruction ID: 20fd2b9ce4f0ab157627b031a366f4c1b9c69fc43b7c087e6f31f272af43d747
                                                                                                  • Opcode Fuzzy Hash: 74c52820fd9ac8236846d02b50a78361522ef38160a4ecfecb8aa06b4628e90a
                                                                                                  • Instruction Fuzzy Hash: 28E092B66046145BD650CF0AEC41462F7E8EB88630718C07FDC0D8B711D279B504CEA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626705219.0000000005380000.00000040.00000800.00020000.00000000.sdmp, Offset: 05380000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5380000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f6df49a885b34c029873072f6f79b1bdf3257c8cec80f1e69beb90c0b76daf27
                                                                                                  • Instruction ID: 7f5c108e944138fd2b0c56adc663ec6d71626c34a19cb0c14eac0bff026b9e0e
                                                                                                  • Opcode Fuzzy Hash: f6df49a885b34c029873072f6f79b1bdf3257c8cec80f1e69beb90c0b76daf27
                                                                                                  • Instruction Fuzzy Hash: 89E0D8B650021467D2109E46AC46B63FB98DB44930F08C567ED0C5F702D176B514CEE5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.626705219.0000000005380000.00000040.00000800.00020000.00000000.sdmp, Offset: 05380000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5380000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: be5ac1f952a410d1b0f55c5143ae838ececdaace2f3fb10664562fff5215b10c
                                                                                                  • Instruction ID: 37cf0c6b92be5e7af5ba7f643cc7a7d18616079ffee2ed7ddc9141bd52316205
                                                                                                  • Opcode Fuzzy Hash: be5ac1f952a410d1b0f55c5143ae838ececdaace2f3fb10664562fff5215b10c
                                                                                                  • Instruction Fuzzy Hash: 99E0D8B654031467D2109E46AC46B63FB98DB54930F08C567ED0C6F702D175B5188AE5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624385485.0000000000ADA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_ada000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 020a2eb7e90002eb368be0c7796a506c342b80c5fe122adb47ce6889f1d8ba96
                                                                                                  • Instruction ID: 6b2fdfd166b3e84faec2bf7ba5ef27ce94d99cfd812297cb7b123cb931fa61ce
                                                                                                  • Opcode Fuzzy Hash: 020a2eb7e90002eb368be0c7796a506c342b80c5fe122adb47ce6889f1d8ba96
                                                                                                  • Instruction Fuzzy Hash: D6E0D8B65403146BD2109F46EC46B63F758DB54A30F08C567ED0C5F702D175B5048AF5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624357193.0000000000AC2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AC2000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_ac2000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 213b0ce0469ee5d9e6af3cbbbf69201ea39840de4f773fa1476e18ceecc54cd7
                                                                                                  • Instruction ID: f0b9f71adc6208d957ca04aaa5f39a0374e1d77b3e56e93d28e68fbb85641aff
                                                                                                  • Opcode Fuzzy Hash: 213b0ce0469ee5d9e6af3cbbbf69201ea39840de4f773fa1476e18ceecc54cd7
                                                                                                  • Instruction Fuzzy Hash: 89D05E7A245A814FE32A9B2CD2A9F953BA4AB51B04F4744FDE8008B673C368D981D200
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.624357193.0000000000AC2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AC2000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_ac2000_server.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: db3b6fd9fbd2f6a6155e594c3ee270f7762ca69ff9bd6ba3cddfef799419392d
                                                                                                  • Instruction ID: c9eb83d5a8cdf1b623ecf457b9ddfcd5d486ee125bc2009ff420570e4901dd96
                                                                                                  • Opcode Fuzzy Hash: db3b6fd9fbd2f6a6155e594c3ee270f7762ca69ff9bd6ba3cddfef799419392d
                                                                                                  • Instruction Fuzzy Hash: CBD05E343002814FD715DB1CC194F5937E4AB41B04F0644ECAC008F362C3B8DC81C600
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%