Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
xdPdkPMD8u.exe

Overview

General Information

Sample Name:xdPdkPMD8u.exe
Original Sample Name:1f4b7d2f534977627fa2a529013a5b58.exe
Analysis ID:1347485
MD5:1f4b7d2f534977627fa2a529013a5b58
SHA1:88077cc48814bc2743ab721f4ae6a5a09724e6ee
SHA256:dfe9486e22f4ff0d0c02ec2b0db5c50ee4e3b1c5309f0a39043640e19bada517
Tags:exenjratRAT
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Njrat
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Uses netsh to modify the Windows network and firewall settings
Connects to many ports of the same IP (likely port scanning)
Protects its processes via BreakOnTermination flag
.NET source code references suspicious native API functions
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Modifies the windows firewall
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
May infect USB drives
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
IP address seen in connection with other malware
Abnormal high CPU Usage
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Detected TCP or UDP traffic on non-standard ports

Classification

  • System is w10x64
  • xdPdkPMD8u.exe (PID: 5712 cmdline: C:\Users\user\Desktop\xdPdkPMD8u.exe MD5: 1F4B7D2F534977627FA2A529013A5B58)
    • netsh.exe (PID: 1488 cmdline: netsh firewall add allowedprogram "C:\Users\user\Desktop\xdPdkPMD8u.exe" "xdPdkPMD8u.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
      • conhost.exe (PID: 2960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Host": "2.tcp.eu.ngrok.io", "Port": "10759", "Version": "im523", "Campaign ID": "HacKed", "Install Name": "server.exe", "Install Dir": "TEMP"}
SourceRuleDescriptionAuthorStrings
xdPdkPMD8u.exeJoeSecurity_NjratYara detected NjratJoe Security
    xdPdkPMD8u.exeWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0x64c1:$a1: get_Registry
    • 0x7efa:$a3: Download ERROR
    • 0x81ec:$a5: netsh firewall delete allowedprogram "
    xdPdkPMD8u.exenjrat1Identify njRatBrian Wallace @botnet_hunter
    • 0x80e2:$a1: netsh firewall add allowedprogram
    • 0x82dc:$b1: [TAP]
    • 0x8282:$b2: & exit
    • 0x824e:$c1: md.exe /k ping 0 & del
    xdPdkPMD8u.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
    • 0x81ec:$s1: netsh firewall delete allowedprogram
    • 0x80e2:$s2: netsh firewall add allowedprogram
    • 0x824c:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
    • 0x7ed6:$s4: Execute ERROR
    • 0x7f36:$s4: Execute ERROR
    • 0x7efa:$s5: Download ERROR
    • 0x8292:$s6: [kl]
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.2078917135.0000000000D22000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
      00000000.00000000.2078917135.0000000000D22000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
      • 0x62c1:$a1: get_Registry
      • 0x7cfa:$a3: Download ERROR
      • 0x7fec:$a5: netsh firewall delete allowedprogram "
      00000000.00000000.2078917135.0000000000D22000.00000002.00000001.01000000.00000003.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
      • 0x7ee2:$a1: netsh firewall add allowedprogram
      • 0x80dc:$b1: [TAP]
      • 0x8082:$b2: & exit
      • 0x804e:$c1: md.exe /k ping 0 & del
      00000000.00000002.4525404561.0000000003401000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
        Process Memory Space: xdPdkPMD8u.exe PID: 5712JoeSecurity_NjratYara detected NjratJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.xdPdkPMD8u.exe.d20000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
            0.0.xdPdkPMD8u.exe.d20000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
            • 0x64c1:$a1: get_Registry
            • 0x7efa:$a3: Download ERROR
            • 0x81ec:$a5: netsh firewall delete allowedprogram "
            0.0.xdPdkPMD8u.exe.d20000.0.unpacknjrat1Identify njRatBrian Wallace @botnet_hunter
            • 0x80e2:$a1: netsh firewall add allowedprogram
            • 0x82dc:$b1: [TAP]
            • 0x8282:$b2: & exit
            • 0x824e:$c1: md.exe /k ping 0 & del
            0.0.xdPdkPMD8u.exe.d20000.0.unpackMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
            • 0x81ec:$s1: netsh firewall delete allowedprogram
            • 0x80e2:$s2: netsh firewall add allowedprogram
            • 0x824c:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
            • 0x7ed6:$s4: Execute ERROR
            • 0x7f36:$s4: Execute ERROR
            • 0x7efa:$s5: Download ERROR
            • 0x8292:$s6: [kl]
            No Sigma rule has matched
            Timestamp:192.168.2.63.126.37.1849718107592033132 11/24/23-16:13:05.300630
            SID:2033132
            Source Port:49718
            Destination Port:10759
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.63.126.37.1849722107592814856 11/24/23-16:15:13.194642
            SID:2814856
            Source Port:49722
            Destination Port:10759
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.63.126.37.1849718107592825564 11/24/23-16:13:56.460259
            SID:2825564
            Source Port:49718
            Destination Port:10759
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.618.197.239.549721107592825564 11/24/23-16:14:49.393658
            SID:2825564
            Source Port:49721
            Destination Port:10759
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.618.192.93.8649709107592814860 11/24/23-16:13:00.582714
            SID:2814860
            Source Port:49709
            Destination Port:10759
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.618.197.239.549721107592825563 11/24/23-16:14:09.436462
            SID:2825563
            Source Port:49721
            Destination Port:10759
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.618.197.239.549721107592033132 11/24/23-16:14:09.256486
            SID:2033132
            Source Port:49721
            Destination Port:10759
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.618.197.239.549721107592814860 11/24/23-16:14:51.164181
            SID:2814860
            Source Port:49721
            Destination Port:10759
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.63.126.37.1849722107592825564 11/24/23-16:15:56.549651
            SID:2825564
            Source Port:49722
            Destination Port:10759
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.618.192.93.8649709107592814856 11/24/23-16:12:01.760226
            SID:2814856
            Source Port:49709
            Destination Port:10759
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.63.126.37.1849722107592825563 11/24/23-16:15:13.194642
            SID:2825563
            Source Port:49722
            Destination Port:10759
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.618.197.239.549721107592814856 11/24/23-16:14:09.436462
            SID:2814856
            Source Port:49721
            Destination Port:10759
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.63.126.37.1849718107592814856 11/24/23-16:13:05.487198
            SID:2814856
            Source Port:49718
            Destination Port:10759
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.618.192.93.8649709107592825564 11/24/23-16:13:00.582714
            SID:2825564
            Source Port:49709
            Destination Port:10759
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.618.192.93.8649709107592033132 11/24/23-16:12:01.576847
            SID:2033132
            Source Port:49709
            Destination Port:10759
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.618.192.93.8649709107592825563 11/24/23-16:12:01.760226
            SID:2825563
            Source Port:49709
            Destination Port:10759
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.63.126.37.1849722107592814860 11/24/23-16:15:57.286440
            SID:2814860
            Source Port:49722
            Destination Port:10759
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.63.126.37.1849718107592814860 11/24/23-16:13:56.460259
            SID:2814860
            Source Port:49718
            Destination Port:10759
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.63.126.37.1849722107592033132 11/24/23-16:15:13.011312
            SID:2033132
            Source Port:49722
            Destination Port:10759
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000000.00000000.2078917135.0000000000D22000.00000002.00000001.01000000.00000003.sdmpMalware Configuration Extractor: Njrat {"Host": "2.tcp.eu.ngrok.io", "Port": "10759", "Version": "im523", "Campaign ID": "HacKed", "Install Name": "server.exe", "Install Dir": "TEMP"}
            Source: xdPdkPMD8u.exeReversingLabs: Detection: 94%
            Source: xdPdkPMD8u.exeVirustotal: Detection: 88%Perma Link
            Source: Yara matchFile source: xdPdkPMD8u.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.xdPdkPMD8u.exe.d20000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.2078917135.0000000000D22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.4525404561.0000000003401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: xdPdkPMD8u.exe PID: 5712, type: MEMORYSTR
            Source: xdPdkPMD8u.exeAvira: detected
            Source: 2.tcp.eu.ngrok.ioAvira URL Cloud: Label: malware
            Source: 2.tcp.eu.ngrok.ioVirustotal: Detection: 15%Perma Link
            Source: 2.tcp.eu.ngrok.ioVirustotal: Detection: 15%Perma Link
            Source: xdPdkPMD8u.exeJoe Sandbox ML: detected
            Source: xdPdkPMD8u.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
            Source: xdPdkPMD8u.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: xdPdkPMD8u.exe, 00000000.00000000.2078917135.0000000000D22000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: autorun.inf
            Source: xdPdkPMD8u.exe, 00000000.00000000.2078917135.0000000000D22000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: [autorun]
            Source: xdPdkPMD8u.exe, 00000000.00000002.4525404561.0000000003401000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
            Source: xdPdkPMD8u.exe, 00000000.00000002.4525404561.0000000003401000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
            Source: xdPdkPMD8u.exeBinary or memory string: autorun.inf
            Source: xdPdkPMD8u.exeBinary or memory string: [autorun]

            Networking

            barindex
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.6:49709 -> 18.192.93.86:10759
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.6:49709 -> 18.192.93.86:10759
            Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.6:49709 -> 18.192.93.86:10759
            Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.6:49709 -> 18.192.93.86:10759
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.6:49709 -> 18.192.93.86:10759
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.6:49718 -> 3.126.37.18:10759
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.6:49718 -> 3.126.37.18:10759
            Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.6:49718 -> 3.126.37.18:10759
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.6:49718 -> 3.126.37.18:10759
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.6:49721 -> 18.197.239.5:10759
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.6:49721 -> 18.197.239.5:10759
            Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.6:49721 -> 18.197.239.5:10759
            Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.6:49721 -> 18.197.239.5:10759
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.6:49721 -> 18.197.239.5:10759
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.6:49722 -> 3.126.37.18:10759
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.6:49722 -> 3.126.37.18:10759
            Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.6:49722 -> 3.126.37.18:10759
            Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.6:49722 -> 3.126.37.18:10759
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.6:49722 -> 3.126.37.18:10759
            Source: global trafficTCP traffic: 18.192.93.86 ports 0,1,5,10759,7,9
            Source: global trafficTCP traffic: 3.126.37.18 ports 0,1,5,10759,7,9
            Source: global trafficTCP traffic: 18.197.239.5 ports 0,1,5,10759,7,9
            Source: Malware configuration extractorURLs: 2.tcp.eu.ngrok.io
            Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
            Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
            Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
            Source: Joe Sandbox ViewIP Address: 18.192.93.86 18.192.93.86
            Source: Joe Sandbox ViewIP Address: 3.126.37.18 3.126.37.18
            Source: Joe Sandbox ViewIP Address: 18.197.239.5 18.197.239.5
            Source: global trafficTCP traffic: 192.168.2.6:49709 -> 18.192.93.86:10759
            Source: global trafficTCP traffic: 192.168.2.6:49718 -> 3.126.37.18:10759
            Source: global trafficTCP traffic: 192.168.2.6:49721 -> 18.197.239.5:10759
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: xdPdkPMD8u.exeString found in binary or memory: https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0
            Source: unknownDNS traffic detected: queries for: 2.tcp.eu.ngrok.io

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: xdPdkPMD8u.exe, kl.cs.Net Code: VKCodeToUnicode

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: xdPdkPMD8u.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.xdPdkPMD8u.exe.d20000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.2078917135.0000000000D22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.4525404561.0000000003401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: xdPdkPMD8u.exe PID: 5712, type: MEMORYSTR

            Operating System Destruction

            barindex
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: 01 00 00 00 Jump to behavior

            System Summary

            barindex
            Source: xdPdkPMD8u.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: xdPdkPMD8u.exe, type: SAMPLEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: xdPdkPMD8u.exe, type: SAMPLEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 0.0.xdPdkPMD8u.exe.d20000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 0.0.xdPdkPMD8u.exe.d20000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.0.xdPdkPMD8u.exe.d20000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 00000000.00000000.2078917135.0000000000D22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 00000000.00000000.2078917135.0000000000D22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: xdPdkPMD8u.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: xdPdkPMD8u.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: xdPdkPMD8u.exe, type: SAMPLEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: xdPdkPMD8u.exe, type: SAMPLEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 0.0.xdPdkPMD8u.exe.d20000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 0.0.xdPdkPMD8u.exe.d20000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.0.xdPdkPMD8u.exe.d20000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 00000000.00000000.2078917135.0000000000D22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 00000000.00000000.2078917135.0000000000D22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeCode function: 0_2_0163169F0_2_0163169F
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeCode function: 0_2_0151B74A NtSetInformationProcess,0_2_0151B74A
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeCode function: 0_2_0151BB66 NtQuerySystemInformation,0_2_0151BB66
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeCode function: 0_2_0151B728 NtSetInformationProcess,0_2_0151B728
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeCode function: 0_2_0151BB2B NtQuerySystemInformation,0_2_0151BB2B
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess Stats: CPU usage > 49%
            Source: xdPdkPMD8u.exe, 00000000.00000002.4524433667.000000000118E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs xdPdkPMD8u.exe
            Source: xdPdkPMD8u.exeReversingLabs: Detection: 94%
            Source: xdPdkPMD8u.exeVirustotal: Detection: 88%
            Source: xdPdkPMD8u.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\xdPdkPMD8u.exe C:\Users\user\Desktop\xdPdkPMD8u.exe
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\Desktop\xdPdkPMD8u.exe" "xdPdkPMD8u.exe" ENABLE
            Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\Desktop\xdPdkPMD8u.exe" "xdPdkPMD8u.exe" ENABLEJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeCode function: 0_2_0151B3FA AdjustTokenPrivileges,0_2_0151B3FA
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeCode function: 0_2_0151B3C3 AdjustTokenPrivileges,0_2_0151B3C3
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/1@4/3
            Source: xdPdkPMD8u.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeMutant created: \Sessions\1\BaseNamedObjects\661b6ea41f1ed0c4de944947a67f44a1
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2960:120:WilError_03
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
            Source: xdPdkPMD8u.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: xdPdkPMD8u.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: xdPdkPMD8u.exe, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exe TID: 2056Thread sleep time: -570000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exe TID: 2056Thread sleep time: -4714000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeWindow / User API: threadDelayed 570Jump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeWindow / User API: threadDelayed 3332Jump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeWindow / User API: threadDelayed 4714Jump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeWindow / User API: foregroundWindowGot 404Jump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeWindow / User API: foregroundWindowGot 1351Jump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess information queried: ProcessInformationJump to behavior
            Source: xdPdkPMD8u.exe, 00000000.00000002.4524433667.0000000001216000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllt
            Source: netsh.exe, 00000002.00000003.2146103829.00000000031D2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: xdPdkPMD8u.exe, kl.csReference to suspicious API methods: MapVirtualKey(a, 0u)
            Source: xdPdkPMD8u.exe, kl.csReference to suspicious API methods: GetAsyncKeyState(num2)
            Source: xdPdkPMD8u.exe, OK.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, 100, ref lpszVer, 100)
            Source: xdPdkPMD8u.exe, 00000000.00000002.4525404561.00000000036D9000.00000004.00000800.00020000.00000000.sdmp, xdPdkPMD8u.exe, 00000000.00000002.4525404561.0000000003751000.00000004.00000800.00020000.00000000.sdmp, xdPdkPMD8u.exe, 00000000.00000002.4525404561.0000000003614000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: xdPdkPMD8u.exe, 00000000.00000002.4525404561.00000000036D9000.00000004.00000800.00020000.00000000.sdmp, xdPdkPMD8u.exe, 00000000.00000002.4525404561.0000000003751000.00000004.00000800.00020000.00000000.sdmp, xdPdkPMD8u.exe, 00000000.00000002.4525404561.0000000003614000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@9Ll
            Source: xdPdkPMD8u.exe, 00000000.00000002.4525404561.0000000003401000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.Llt
            Source: xdPdkPMD8u.exe, 00000000.00000002.4525404561.0000000003546000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.Ll-Z
            Source: xdPdkPMD8u.exe, 00000000.00000002.4525404561.00000000036D9000.00000004.00000800.00020000.00000000.sdmp, xdPdkPMD8u.exe, 00000000.00000002.4525404561.0000000003664000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.LlTg
            Source: xdPdkPMD8u.exe, 00000000.00000002.4524433667.00000000011BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .EXEProgram Manager
            Source: xdPdkPMD8u.exe, 00000000.00000002.4525404561.0000000003401000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.Llx
            Source: xdPdkPMD8u.exe, 00000000.00000002.4525404561.0000000003546000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program manager
            Source: xdPdkPMD8u.exe, 00000000.00000002.4525404561.00000000036D9000.00000004.00000800.00020000.00000000.sdmp, xdPdkPMD8u.exe, 00000000.00000002.4525404561.0000000003614000.00000004.00000800.00020000.00000000.sdmp, xdPdkPMD8u.exe, 00000000.00000002.4525404561.000000000375D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.Ll
            Source: xdPdkPMD8u.exe, 00000000.00000002.4525404561.0000000003401000.00000004.00000800.00020000.00000000.sdmp, xdPdkPMD8u.exe, 00000000.00000002.4525404561.0000000003546000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.Ll<
            Source: xdPdkPMD8u.exe, 00000000.00000002.4525404561.00000000037D7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.Ll,y.
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\Desktop\xdPdkPMD8u.exe" "xdPdkPMD8u.exe" ENABLE
            Source: C:\Users\user\Desktop\xdPdkPMD8u.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\Desktop\xdPdkPMD8u.exe" "xdPdkPMD8u.exe" ENABLE

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: xdPdkPMD8u.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.xdPdkPMD8u.exe.d20000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.2078917135.0000000000D22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.4525404561.0000000003401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: xdPdkPMD8u.exe PID: 5712, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: xdPdkPMD8u.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.xdPdkPMD8u.exe.d20000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.2078917135.0000000000D22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.4525404561.0000000003401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: xdPdkPMD8u.exe PID: 5712, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
            1
            Replication Through Removable Media
            1
            Native API
            Path Interception1
            Access Token Manipulation
            1
            Virtualization/Sandbox Evasion
            1
            Input Capture
            1
            Security Software Discovery
            1
            Replication Through Removable Media
            1
            Input Capture
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
            Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts2
            Process Injection
            21
            Disable or Modify Tools
            LSASS Memory1
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            Exfiltration Over Bluetooth1
            Non-Standard Port
            SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
            Domain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            Access Token Manipulation
            Security Account Manager2
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
            Non-Application Layer Protocol
            Data Encrypted for ImpactDNS ServerEmail Addresses
            Local AccountsCronLogin HookLogin Hook2
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput CaptureTraffic Duplication11
            Application Layer Protocol
            Data DestructionVirtual Private ServerEmployee Names
            Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Software Packing
            LSA Secrets1
            Peripheral Device Discovery
            SSHKeyloggingScheduled TransferFallback ChannelsData Encrypted for ImpactServerGather Victim Network Information
            Replication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials12
            System Information Discovery
            VNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            xdPdkPMD8u.exe95%ReversingLabsByteCode-MSIL.Backdoor.Ratenjay
            xdPdkPMD8u.exe89%VirustotalBrowse
            xdPdkPMD8u.exe100%AviraTR/ATRAPS.Gen
            xdPdkPMD8u.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            2.tcp.eu.ngrok.io16%VirustotalBrowse
            SourceDetectionScannerLabelLink
            2.tcp.eu.ngrok.io100%Avira URL Cloudmalware
            2.tcp.eu.ngrok.io16%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            2.tcp.eu.ngrok.io
            18.192.93.86
            truetrueunknown
            NameMaliciousAntivirus DetectionReputation
            2.tcp.eu.ngrok.iotrue
            • 16%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0xdPdkPMD8u.exefalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              18.192.93.86
              2.tcp.eu.ngrok.ioUnited States
              16509AMAZON-02UStrue
              3.126.37.18
              unknownUnited States
              16509AMAZON-02UStrue
              18.197.239.5
              unknownUnited States
              16509AMAZON-02UStrue
              Joe Sandbox Version:38.0.0 Ammolite
              Analysis ID:1347485
              Start date and time:2023-11-24 16:11:05 +01:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 6m 37s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:8
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:xdPdkPMD8u.exe
              renamed because original name is a hash value
              Original Sample Name:1f4b7d2f534977627fa2a529013a5b58.exe
              Detection:MAL
              Classification:mal100.troj.spyw.evad.winEXE@4/1@4/3
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 89
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
              • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              16:12:33API Interceptor239089x Sleep call for process: xdPdkPMD8u.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              18.192.93.86P90GT_Invoice_Related_Property_Tax_P800.exeGet hashmaliciousRedLineBrowse
              • 2.tcp.eu.ngrok.io:17685/
              http://www.sdrclm.cn/vendor/phpdocumentor/P800/P90GT_Invoice_Related_Property_Tax_P800.exeGet hashmaliciousRedLineBrowse
              • 2.tcp.eu.ngrok.io:17685/
              3.126.37.18VBUXm77rfL.exeGet hashmaliciousNjratBrowse
                gEuhLHV0.posh.ps1Get hashmaliciousMetasploitBrowse
                  MibKbjH4.posh.ps1Get hashmaliciousUnknownBrowse
                    kXghM8bJcm.exeGet hashmaliciousNjratBrowse
                      OUXkIxeP6k.exeGet hashmaliciousNjratBrowse
                        eI43OwXSvq.exeGet hashmaliciousNjratBrowse
                          p0zYXkMETE.exeGet hashmaliciousNjratBrowse
                            i9z1c1OtFb.exeGet hashmaliciousNjratBrowse
                              7XyFhq6BDj.exeGet hashmaliciousNjratBrowse
                                JYGc3o49WE.exeGet hashmaliciousNjratBrowse
                                  J6VIiRgq3w.exeGet hashmaliciousNjratBrowse
                                    cTUu5Po5Hy.exeGet hashmaliciousNjratBrowse
                                      KcWQQO3nZP.exeGet hashmaliciousNjratBrowse
                                        zep8vTa4sg.exeGet hashmaliciousNjratBrowse
                                          u1LwUkKDIF.exeGet hashmaliciousNjratBrowse
                                            QBEgLAO40T.exeGet hashmaliciousNjratBrowse
                                              yPGBUzqVE3.exeGet hashmaliciousNjratBrowse
                                                LMva1J8Xkv.exeGet hashmaliciousNjratBrowse
                                                  XlNjZS4E8x.exeGet hashmaliciousNjratBrowse
                                                    YQAqWBVnuI.exeGet hashmaliciousNjratBrowse
                                                      18.197.239.5P90GT_Invoice_Related_Property_Tax_P800.exeGet hashmaliciousRedLineBrowse
                                                      • 2.tcp.eu.ngrok.io:17685/
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      2.tcp.eu.ngrok.ioVBUXm77rfL.exeGet hashmaliciousNjratBrowse
                                                      • 18.192.93.86
                                                      1UGdjTlX5v.exeGet hashmaliciousNjratBrowse
                                                      • 18.157.68.73
                                                      kXghM8bJcm.exeGet hashmaliciousNjratBrowse
                                                      • 18.192.93.86
                                                      OUXkIxeP6k.exeGet hashmaliciousNjratBrowse
                                                      • 3.126.37.18
                                                      QzzmZiGinp.exeGet hashmaliciousNjratBrowse
                                                      • 18.156.13.209
                                                      eI43OwXSvq.exeGet hashmaliciousNjratBrowse
                                                      • 18.197.239.5
                                                      p0zYXkMETE.exeGet hashmaliciousNjratBrowse
                                                      • 18.157.68.73
                                                      i9z1c1OtFb.exeGet hashmaliciousNjratBrowse
                                                      • 18.157.68.73
                                                      aF73k2XwGj.exeGet hashmaliciousNjratBrowse
                                                      • 18.192.93.86
                                                      7XyFhq6BDj.exeGet hashmaliciousNjratBrowse
                                                      • 3.126.37.18
                                                      JYGc3o49WE.exeGet hashmaliciousNjratBrowse
                                                      • 18.157.68.73
                                                      J6VIiRgq3w.exeGet hashmaliciousNjratBrowse
                                                      • 3.126.37.18
                                                      cTUu5Po5Hy.exeGet hashmaliciousNjratBrowse
                                                      • 3.126.37.18
                                                      7JdbeSrZ6s.exeGet hashmaliciousNjratBrowse
                                                      • 3.127.138.57
                                                      KcWQQO3nZP.exeGet hashmaliciousNjratBrowse
                                                      • 3.126.37.18
                                                      zep8vTa4sg.exeGet hashmaliciousNjratBrowse
                                                      • 18.156.13.209
                                                      umyExrpkSF.exeGet hashmaliciousNjratBrowse
                                                      • 18.192.93.86
                                                      u1LwUkKDIF.exeGet hashmaliciousNjratBrowse
                                                      • 18.192.93.86
                                                      QBEgLAO40T.exeGet hashmaliciousNjratBrowse
                                                      • 3.126.37.18
                                                      ps2ZmIdNTG.exeGet hashmaliciousNjratBrowse
                                                      • 18.157.68.73
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      AMAZON-02UShttps://events.bizzabo.com/auth/emailAssociatedLogin/verify=%20TokenAndRedirect?token=3DS9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-=%20dklFn2bExx7385&eventGroupId=3D26969&redirectUrl=3Dhttps://elladobue=%20nodecadadia.com/...hummm/606prime/dave.cox11/24/2023/dave.cox@midlandcomput=%20ers.com/Get hashmaliciousUnknownBrowse
                                                      • 52.85.132.103
                                                      https://login-rnicrosotfonline-serviceportal-servercommon-oauth2.necfc.com/?document=ZWRpbmJ1cmdoLm1vdGlvbnNAc2xhdGVyZ29yZG9uLmNvLnVrGet hashmaliciousUnknownBrowse
                                                      • 99.84.191.44
                                                      xpKemuNsr6Zc.exeGet hashmaliciousRemcosBrowse
                                                      • 3.16.65.63
                                                      https://edwinvierhout.us9.list-manage.com/track/click?u=41b8e69db17efd4828bbb0f5c&id=ce66fc9a35&e=46b299a450Get hashmaliciousHTMLPhisherBrowse
                                                      • 44.233.8.190
                                                      https://docsend.com/view/cetxcrfsj2p6kdnzGet hashmaliciousHTMLPhisherBrowse
                                                      • 99.84.191.24
                                                      https://theperfectgifts.info/check_balance.phpGet hashmaliciousUnknownBrowse
                                                      • 52.85.151.65
                                                      skid.x86.elfGet hashmaliciousMoobotBrowse
                                                      • 44.239.110.214
                                                      skid.arm.elfGet hashmaliciousMoobotBrowse
                                                      • 52.41.52.85
                                                      Factura_F464F.htmlGet hashmaliciousHTMLPhisherBrowse
                                                      • 108.138.119.56
                                                      nf.msiGet hashmaliciousUnknownBrowse
                                                      • 108.138.85.22
                                                      https://app.permislib.fr/inscription-stagiaire/Get hashmaliciousUnknownBrowse
                                                      • 52.85.132.25
                                                      arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                                      • 35.181.243.47
                                                      http://url9956.onlineregistration.cc/ls/click?upn=CfbsCNqJa51AuutfvOpXE1Mq9MsGPmr8ThwF84QBOrGXQjp8ceUkDNekhgCQgkLy6yTE1rOL915x-2BjR2KMmk7tOOpDG5j9A2oWmKaFjNX7c-3DSl2A_zf6F8qk8KC9gvavchGXMu6UDLZaxClTGKSUc238Tq3vZMMm4rIacYYjuryPerleP5V7USSofg6mi6MEqMENHbXZjIsMTXjEC6Hw16MaI4uvq9DjJCCVxDvRFdVJPWki7oUCjYiuA7TxghQxHYMs-2Bww-2Fm1Fprl-2FKP2BazwhjoRuprsgKUthZ2QNdXfNkgO5nmR-2FcLAj7HLetpaqF5q7a78Q-3D-3DGet hashmaliciousHTMLPhisherBrowse
                                                      • 52.85.151.98
                                                      https://publuu.com/flip-book/307907/720507Get hashmaliciousHTMLPhisherBrowse
                                                      • 99.84.216.16
                                                      SecuriteInfo.com.Linux.Siggen.9999.23998.17519.elfGet hashmaliciousMiraiBrowse
                                                      • 52.32.127.121
                                                      bWZQRQVOya.elfGet hashmaliciousMirai, MoobotBrowse
                                                      • 18.181.13.127
                                                      XiXfibRqWs.elfGet hashmaliciousMiraiBrowse
                                                      • 54.247.62.1
                                                      NNzDMQ4j.posh.ps1Get hashmaliciousMetasploitBrowse
                                                      • 18.176.183.3
                                                      WiwGPyCg.posh.ps1Get hashmaliciousMetasploitBrowse
                                                      • 18.177.60.68
                                                      pRTxEBSE.posh.ps1Get hashmaliciousMetasploitBrowse
                                                      • 18.177.76.42
                                                      AMAZON-02UShttps://events.bizzabo.com/auth/emailAssociatedLogin/verify=%20TokenAndRedirect?token=3DS9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-=%20dklFn2bExx7385&eventGroupId=3D26969&redirectUrl=3Dhttps://elladobue=%20nodecadadia.com/...hummm/606prime/dave.cox11/24/2023/dave.cox@midlandcomput=%20ers.com/Get hashmaliciousUnknownBrowse
                                                      • 52.85.132.103
                                                      https://login-rnicrosotfonline-serviceportal-servercommon-oauth2.necfc.com/?document=ZWRpbmJ1cmdoLm1vdGlvbnNAc2xhdGVyZ29yZG9uLmNvLnVrGet hashmaliciousUnknownBrowse
                                                      • 99.84.191.44
                                                      xpKemuNsr6Zc.exeGet hashmaliciousRemcosBrowse
                                                      • 3.16.65.63
                                                      https://edwinvierhout.us9.list-manage.com/track/click?u=41b8e69db17efd4828bbb0f5c&id=ce66fc9a35&e=46b299a450Get hashmaliciousHTMLPhisherBrowse
                                                      • 44.233.8.190
                                                      https://docsend.com/view/cetxcrfsj2p6kdnzGet hashmaliciousHTMLPhisherBrowse
                                                      • 99.84.191.24
                                                      https://theperfectgifts.info/check_balance.phpGet hashmaliciousUnknownBrowse
                                                      • 52.85.151.65
                                                      skid.x86.elfGet hashmaliciousMoobotBrowse
                                                      • 44.239.110.214
                                                      skid.arm.elfGet hashmaliciousMoobotBrowse
                                                      • 52.41.52.85
                                                      Factura_F464F.htmlGet hashmaliciousHTMLPhisherBrowse
                                                      • 108.138.119.56
                                                      nf.msiGet hashmaliciousUnknownBrowse
                                                      • 108.138.85.22
                                                      https://app.permislib.fr/inscription-stagiaire/Get hashmaliciousUnknownBrowse
                                                      • 52.85.132.25
                                                      arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                                      • 35.181.243.47
                                                      http://url9956.onlineregistration.cc/ls/click?upn=CfbsCNqJa51AuutfvOpXE1Mq9MsGPmr8ThwF84QBOrGXQjp8ceUkDNekhgCQgkLy6yTE1rOL915x-2BjR2KMmk7tOOpDG5j9A2oWmKaFjNX7c-3DSl2A_zf6F8qk8KC9gvavchGXMu6UDLZaxClTGKSUc238Tq3vZMMm4rIacYYjuryPerleP5V7USSofg6mi6MEqMENHbXZjIsMTXjEC6Hw16MaI4uvq9DjJCCVxDvRFdVJPWki7oUCjYiuA7TxghQxHYMs-2Bww-2Fm1Fprl-2FKP2BazwhjoRuprsgKUthZ2QNdXfNkgO5nmR-2FcLAj7HLetpaqF5q7a78Q-3D-3DGet hashmaliciousHTMLPhisherBrowse
                                                      • 52.85.151.98
                                                      https://publuu.com/flip-book/307907/720507Get hashmaliciousHTMLPhisherBrowse
                                                      • 99.84.216.16
                                                      SecuriteInfo.com.Linux.Siggen.9999.23998.17519.elfGet hashmaliciousMiraiBrowse
                                                      • 52.32.127.121
                                                      bWZQRQVOya.elfGet hashmaliciousMirai, MoobotBrowse
                                                      • 18.181.13.127
                                                      XiXfibRqWs.elfGet hashmaliciousMiraiBrowse
                                                      • 54.247.62.1
                                                      NNzDMQ4j.posh.ps1Get hashmaliciousMetasploitBrowse
                                                      • 18.176.183.3
                                                      WiwGPyCg.posh.ps1Get hashmaliciousMetasploitBrowse
                                                      • 18.177.60.68
                                                      pRTxEBSE.posh.ps1Get hashmaliciousMetasploitBrowse
                                                      • 18.177.76.42
                                                      AMAZON-02UShttps://events.bizzabo.com/auth/emailAssociatedLogin/verify=%20TokenAndRedirect?token=3DS9NcmjZghhHTu-K8Bn2uA9CkNhbMdZVLD_YG9HzIwMWMvvRTd-=%20dklFn2bExx7385&eventGroupId=3D26969&redirectUrl=3Dhttps://elladobue=%20nodecadadia.com/...hummm/606prime/dave.cox11/24/2023/dave.cox@midlandcomput=%20ers.com/Get hashmaliciousUnknownBrowse
                                                      • 52.85.132.103
                                                      https://login-rnicrosotfonline-serviceportal-servercommon-oauth2.necfc.com/?document=ZWRpbmJ1cmdoLm1vdGlvbnNAc2xhdGVyZ29yZG9uLmNvLnVrGet hashmaliciousUnknownBrowse
                                                      • 99.84.191.44
                                                      xpKemuNsr6Zc.exeGet hashmaliciousRemcosBrowse
                                                      • 3.16.65.63
                                                      https://edwinvierhout.us9.list-manage.com/track/click?u=41b8e69db17efd4828bbb0f5c&id=ce66fc9a35&e=46b299a450Get hashmaliciousHTMLPhisherBrowse
                                                      • 44.233.8.190
                                                      https://docsend.com/view/cetxcrfsj2p6kdnzGet hashmaliciousHTMLPhisherBrowse
                                                      • 99.84.191.24
                                                      https://theperfectgifts.info/check_balance.phpGet hashmaliciousUnknownBrowse
                                                      • 52.85.151.65
                                                      skid.x86.elfGet hashmaliciousMoobotBrowse
                                                      • 44.239.110.214
                                                      skid.arm.elfGet hashmaliciousMoobotBrowse
                                                      • 52.41.52.85
                                                      Factura_F464F.htmlGet hashmaliciousHTMLPhisherBrowse
                                                      • 108.138.119.56
                                                      nf.msiGet hashmaliciousUnknownBrowse
                                                      • 108.138.85.22
                                                      https://app.permislib.fr/inscription-stagiaire/Get hashmaliciousUnknownBrowse
                                                      • 52.85.132.25
                                                      arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                                      • 35.181.243.47
                                                      http://url9956.onlineregistration.cc/ls/click?upn=CfbsCNqJa51AuutfvOpXE1Mq9MsGPmr8ThwF84QBOrGXQjp8ceUkDNekhgCQgkLy6yTE1rOL915x-2BjR2KMmk7tOOpDG5j9A2oWmKaFjNX7c-3DSl2A_zf6F8qk8KC9gvavchGXMu6UDLZaxClTGKSUc238Tq3vZMMm4rIacYYjuryPerleP5V7USSofg6mi6MEqMENHbXZjIsMTXjEC6Hw16MaI4uvq9DjJCCVxDvRFdVJPWki7oUCjYiuA7TxghQxHYMs-2Bww-2Fm1Fprl-2FKP2BazwhjoRuprsgKUthZ2QNdXfNkgO5nmR-2FcLAj7HLetpaqF5q7a78Q-3D-3DGet hashmaliciousHTMLPhisherBrowse
                                                      • 52.85.151.98
                                                      https://publuu.com/flip-book/307907/720507Get hashmaliciousHTMLPhisherBrowse
                                                      • 99.84.216.16
                                                      SecuriteInfo.com.Linux.Siggen.9999.23998.17519.elfGet hashmaliciousMiraiBrowse
                                                      • 52.32.127.121
                                                      bWZQRQVOya.elfGet hashmaliciousMirai, MoobotBrowse
                                                      • 18.181.13.127
                                                      XiXfibRqWs.elfGet hashmaliciousMiraiBrowse
                                                      • 54.247.62.1
                                                      NNzDMQ4j.posh.ps1Get hashmaliciousMetasploitBrowse
                                                      • 18.176.183.3
                                                      WiwGPyCg.posh.ps1Get hashmaliciousMetasploitBrowse
                                                      • 18.177.60.68
                                                      pRTxEBSE.posh.ps1Get hashmaliciousMetasploitBrowse
                                                      • 18.177.76.42
                                                      No context
                                                      No context
                                                      Process:C:\Windows\SysWOW64\netsh.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):313
                                                      Entropy (8bit):4.971939296804078
                                                      Encrypted:false
                                                      SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
                                                      MD5:689E2126A85BF55121488295EE068FA1
                                                      SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
                                                      SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
                                                      SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
                                                      Malicious:false
                                                      Reputation:high, very likely benign file
                                                      Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):5.577235591194959
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                      • Windows Screen Saver (13104/52) 0.07%
                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                      File name:xdPdkPMD8u.exe
                                                      File size:37'888 bytes
                                                      MD5:1f4b7d2f534977627fa2a529013a5b58
                                                      SHA1:88077cc48814bc2743ab721f4ae6a5a09724e6ee
                                                      SHA256:dfe9486e22f4ff0d0c02ec2b0db5c50ee4e3b1c5309f0a39043640e19bada517
                                                      SHA512:739d25226f323c141fbda2dbf5cf7f98787487be36621186b6815f147bd1e8c04dfc0cbc057a3f5bf83aa676f1c939a3e571f324142528dbc5e0a9ceeb207186
                                                      SSDEEP:384:FuSvEiTbTvpWNcZ0y8fvCv3v3cLkacpjrAF+rMRTyN/0L+EcoinblneHQM3epzXz:4S7TZ38fvCv3E1c1rM+rMRa8NuUet
                                                      TLSH:59032A4D7FE18168D5FD067B05B2D412077AE04B6E23D90E8EF664AA37636C18B50EF2
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...9.Ze................................. ........@.. ....................................@................................
                                                      Icon Hash:00928e8e8686b000
                                                      Entrypoint:0x40abbe
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x655A1439 [Sun Nov 19 13:57:13 2023 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xab6c0x4f.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x240.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xe0000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000x8bc40x8c00False0.4635602678571429data5.608984899605422IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rsrc0xc0000x2400x400False0.3134765625data4.968771659524424IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0xe0000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_MANIFEST0xc0580x1e7XML 1.0 document, ASCII text, with CRLF line terminators0.5338809034907598
                                                      DLLImport
                                                      mscoree.dll_CorExeMain
                                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                      192.168.2.63.126.37.1849718107592033132 11/24/23-16:13:05.300630TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4971810759192.168.2.63.126.37.18
                                                      192.168.2.63.126.37.1849722107592814856 11/24/23-16:15:13.194642TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4972210759192.168.2.63.126.37.18
                                                      192.168.2.63.126.37.1849718107592825564 11/24/23-16:13:56.460259TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4971810759192.168.2.63.126.37.18
                                                      192.168.2.618.197.239.549721107592825564 11/24/23-16:14:49.393658TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4972110759192.168.2.618.197.239.5
                                                      192.168.2.618.192.93.8649709107592814860 11/24/23-16:13:00.582714TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4970910759192.168.2.618.192.93.86
                                                      192.168.2.618.197.239.549721107592825563 11/24/23-16:14:09.436462TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4972110759192.168.2.618.197.239.5
                                                      192.168.2.618.197.239.549721107592033132 11/24/23-16:14:09.256486TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4972110759192.168.2.618.197.239.5
                                                      192.168.2.618.197.239.549721107592814860 11/24/23-16:14:51.164181TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4972110759192.168.2.618.197.239.5
                                                      192.168.2.63.126.37.1849722107592825564 11/24/23-16:15:56.549651TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4972210759192.168.2.63.126.37.18
                                                      192.168.2.618.192.93.8649709107592814856 11/24/23-16:12:01.760226TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4970910759192.168.2.618.192.93.86
                                                      192.168.2.63.126.37.1849722107592825563 11/24/23-16:15:13.194642TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4972210759192.168.2.63.126.37.18
                                                      192.168.2.618.197.239.549721107592814856 11/24/23-16:14:09.436462TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4972110759192.168.2.618.197.239.5
                                                      192.168.2.63.126.37.1849718107592814856 11/24/23-16:13:05.487198TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4971810759192.168.2.63.126.37.18
                                                      192.168.2.618.192.93.8649709107592825564 11/24/23-16:13:00.582714TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4970910759192.168.2.618.192.93.86
                                                      192.168.2.618.192.93.8649709107592033132 11/24/23-16:12:01.576847TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4970910759192.168.2.618.192.93.86
                                                      192.168.2.618.192.93.8649709107592825563 11/24/23-16:12:01.760226TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4970910759192.168.2.618.192.93.86
                                                      192.168.2.63.126.37.1849722107592814860 11/24/23-16:15:57.286440TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4972210759192.168.2.63.126.37.18
                                                      192.168.2.63.126.37.1849718107592814860 11/24/23-16:13:56.460259TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4971810759192.168.2.63.126.37.18
                                                      192.168.2.63.126.37.1849722107592033132 11/24/23-16:15:13.011312TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4972210759192.168.2.63.126.37.18
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Nov 24, 2023 16:12:01.291573048 CET4970910759192.168.2.618.192.93.86
                                                      Nov 24, 2023 16:12:01.476730108 CET107594970918.192.93.86192.168.2.6
                                                      Nov 24, 2023 16:12:01.476804018 CET4970910759192.168.2.618.192.93.86
                                                      Nov 24, 2023 16:12:01.576847076 CET4970910759192.168.2.618.192.93.86
                                                      Nov 24, 2023 16:12:01.760145903 CET107594970918.192.93.86192.168.2.6
                                                      Nov 24, 2023 16:12:01.760226011 CET4970910759192.168.2.618.192.93.86
                                                      Nov 24, 2023 16:12:01.943500996 CET107594970918.192.93.86192.168.2.6
                                                      Nov 24, 2023 16:12:07.431555986 CET4970910759192.168.2.618.192.93.86
                                                      Nov 24, 2023 16:12:07.614938974 CET107594970918.192.93.86192.168.2.6
                                                      Nov 24, 2023 16:12:22.708616018 CET107594970918.192.93.86192.168.2.6
                                                      Nov 24, 2023 16:12:22.708726883 CET4970910759192.168.2.618.192.93.86
                                                      Nov 24, 2023 16:12:37.892636061 CET107594970918.192.93.86192.168.2.6
                                                      Nov 24, 2023 16:12:37.892791033 CET4970910759192.168.2.618.192.93.86
                                                      Nov 24, 2023 16:12:53.080646038 CET107594970918.192.93.86192.168.2.6
                                                      Nov 24, 2023 16:12:53.080806971 CET4970910759192.168.2.618.192.93.86
                                                      Nov 24, 2023 16:12:59.161017895 CET4970910759192.168.2.618.192.93.86
                                                      Nov 24, 2023 16:12:59.344480991 CET107594970918.192.93.86192.168.2.6
                                                      Nov 24, 2023 16:13:00.582714081 CET4970910759192.168.2.618.192.93.86
                                                      Nov 24, 2023 16:13:00.766163111 CET107594970918.192.93.86192.168.2.6
                                                      Nov 24, 2023 16:13:02.676112890 CET107594970918.192.93.86192.168.2.6
                                                      Nov 24, 2023 16:13:02.676204920 CET4970910759192.168.2.618.192.93.86
                                                      Nov 24, 2023 16:13:04.958550930 CET4970910759192.168.2.618.192.93.86
                                                      Nov 24, 2023 16:13:05.107918978 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:05.142328978 CET107594970918.192.93.86192.168.2.6
                                                      Nov 24, 2023 16:13:05.294492006 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:05.294614077 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:05.300630093 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:05.487104893 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:05.487198114 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:05.673639059 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:06.723203897 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:06.909702063 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:06.909859896 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:07.096249104 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:07.770040035 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:07.956500053 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:07.956566095 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:08.143142939 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:08.326354027 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:08.512862921 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:08.512974977 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:08.699595928 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:08.699722052 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:08.886147976 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:08.886241913 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:09.072802067 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:09.072887897 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:09.259371996 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:09.259485006 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:09.446831942 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:09.446994066 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:09.633495092 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:09.633673906 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:09.823419094 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:09.823580980 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:10.010212898 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:10.010348082 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:10.197004080 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:10.197249889 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:10.383733988 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:10.383857012 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:10.570379019 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:10.570602894 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:10.757055998 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:10.757265091 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:10.943730116 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:10.943867922 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:11.130964041 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:11.131135941 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:11.318819046 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:11.318933964 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:11.505637884 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:11.505744934 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:11.692279100 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:11.692437887 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:11.878906012 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:11.879273891 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:12.066077948 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:12.066173077 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:12.254960060 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:12.255114079 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:12.441931009 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:12.442203045 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:12.628755093 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:12.628958941 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:12.815498114 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:12.815702915 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:13.002147913 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:13.002341032 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:13.230673075 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:13.230837107 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:13.466697931 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:13.498670101 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:13.498766899 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:13.654079914 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:13.654186010 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:13.685127974 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:13.685189962 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:13.840631008 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:13.840810061 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:13.871546984 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:13.871653080 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:14.027285099 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:14.027416945 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:14.058027029 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:14.058119059 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:14.213844061 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:14.213994026 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:14.244630098 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:14.244685888 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:14.400392056 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:14.400505066 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:14.431113958 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:14.431181908 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:14.587078094 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:14.587176085 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:14.617816925 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:14.617903948 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:14.773761034 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:14.773957968 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:14.805587053 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:14.805641890 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:14.960659027 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:14.960858107 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:14.992070913 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:14.992211103 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:15.147403955 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:15.147525072 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:15.178809881 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:15.179085016 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:15.334084988 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:15.334297895 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:15.365602970 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:15.365700006 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:15.520831108 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:15.521069050 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:15.552145004 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:15.552314997 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:15.707575083 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:15.707688093 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:15.739594936 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:15.739666939 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:15.894399881 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:15.894498110 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:15.926160097 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:15.926223993 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:16.081013918 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:16.081120014 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:16.112723112 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:16.112891912 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:16.267744064 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:16.267910957 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:16.299379110 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:16.299601078 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:16.454473972 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:16.454607010 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:16.486043930 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:16.486134052 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:16.641169071 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:16.641388893 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:16.672522068 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:16.672630072 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:16.827867985 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:16.828017950 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:16.859034061 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:16.859123945 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:17.014501095 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:17.014616966 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:17.045567989 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:17.045864105 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:17.201172113 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:17.201376915 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:17.232212067 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:17.232302904 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:17.387856960 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:17.387989998 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:17.418831110 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:17.418941021 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:17.574454069 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:17.574635029 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:17.605485916 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:17.605679989 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:17.761153936 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:17.761384010 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:17.792159081 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:17.792376995 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:17.948224068 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:17.948385954 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:17.978879929 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:17.979047060 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:18.134918928 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:18.135075092 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:18.165472031 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:18.165539980 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:18.321508884 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:18.321609020 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:18.351963997 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:18.510951996 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:18.511153936 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:18.699048996 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:18.699162006 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:18.887418985 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:18.887484074 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:19.076417923 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:19.076533079 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:19.263138056 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:19.263338089 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:19.449990034 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:20.632078886 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:20.818567038 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:20.818661928 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:21.005095005 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:21.005213022 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:21.191757917 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:21.191952944 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:21.378382921 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:21.378520012 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:21.565045118 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:21.565356970 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:21.751946926 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:21.752171040 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:21.938884974 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:21.939024925 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:22.125641108 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:22.125788927 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:22.312333107 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:22.312578917 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:22.499074936 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:22.499196053 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:22.686475992 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:22.686749935 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:22.874443054 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:22.874631882 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:23.061368942 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:23.061562061 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:23.248218060 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:23.248527050 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:23.434968948 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:23.435077906 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:23.621520042 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:23.621663094 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:23.808301926 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:23.808387041 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:23.994821072 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:23.994991064 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:24.181514025 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:24.181736946 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:24.368206978 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:24.368366957 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:24.554970980 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:24.555140018 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:24.741677999 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:24.741815090 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:24.928291082 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:24.928504944 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:25.114967108 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:25.115056992 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:25.301543951 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:25.301726103 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:25.488234043 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:25.488415956 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:25.675049067 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:25.675199986 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:25.861745119 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:25.861857891 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:26.048377991 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:26.048505068 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:26.234983921 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:26.235081911 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:26.421564102 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:26.421648979 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:26.608252048 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:26.608403921 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:26.795088053 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:26.795228958 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:26.981714010 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:26.981794119 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:27.169836998 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:27.170011044 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:27.356571913 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:27.356667042 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:27.543126106 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:27.543225050 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:27.731117010 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:27.731220961 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:27.921464920 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:27.921571016 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:28.111444950 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:28.111519098 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:28.297962904 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:28.298120022 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:28.485375881 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:28.485505104 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:28.671960115 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:28.672035933 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:28.859452963 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:28.859591961 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:29.046010017 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:29.046235085 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:29.232865095 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:29.232935905 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:29.419595003 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:29.419743061 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:29.606364965 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:29.606473923 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:29.792989016 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:29.793093920 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:29.979799986 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:29.979964972 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:30.166639090 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:30.166790009 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:30.353338003 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:30.353439093 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:30.540524960 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:30.540914059 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:30.727466106 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:30.727633953 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:30.915438890 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:30.915555000 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:31.102052927 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:31.102174997 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:31.288702011 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:31.288831949 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:31.475878954 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:31.475960970 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:31.664494991 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:31.664726973 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:31.851640940 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:31.851763964 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:32.038676023 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:32.038775921 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:32.225353003 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:32.225512981 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:32.411998987 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:32.412085056 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:32.598599911 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:32.598694086 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:32.786984921 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:32.787060976 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:32.973527908 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:32.973664999 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:33.160167933 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:33.160280943 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:33.346867085 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:33.347029924 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:33.533574104 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:33.533734083 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:33.720413923 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:33.720552921 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:33.908970118 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:33.909126043 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:34.095592976 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:34.095706940 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:34.282191038 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:34.282272100 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:34.469674110 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:34.469795942 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:34.656332970 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:34.656430960 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:34.842945099 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:34.843039036 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:35.029692888 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:35.029819012 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:35.258840084 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:35.258980036 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:35.526763916 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:35.526864052 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:35.713793039 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:47.723784924 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:47.910219908 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:13:56.460258961 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:13:56.646872997 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:14:06.685956001 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:14:06.686022043 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:14:08.698332071 CET4971810759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:14:08.839617968 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:08.885643959 CET10759497183.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:14:09.019901037 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:09.020006895 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:09.256485939 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:09.436296940 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:09.436461926 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:09.619472980 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:13.785722971 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:13.965447903 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:29.165889025 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:29.165963888 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:34.519962072 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:34.699728966 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:35.770215988 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:35.950679064 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:39.832438946 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:40.012125969 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:40.012243986 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:40.191957951 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:40.832525015 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:41.012186050 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:41.012242079 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:41.191807032 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:41.215214968 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:41.397747040 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:41.397830009 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:41.577528000 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:41.589725018 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:41.769323111 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:41.769397974 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:41.949026108 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:41.970452070 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:42.150019884 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:42.150080919 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:42.329746008 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:43.502747059 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:43.682446957 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:43.714786053 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:43.894462109 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:43.894612074 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:44.074210882 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:44.074384928 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:44.253981113 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:44.254084110 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:44.433999062 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:44.434149981 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:44.613723993 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:44.613867044 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:44.793544054 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:44.793694973 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:44.973310947 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:44.973417044 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:45.153064013 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:45.153160095 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:45.333014965 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:45.333228111 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:45.513056040 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:45.513212919 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:45.692873955 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:45.693026066 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:45.874181986 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:45.874360085 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:46.053936958 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:46.054013014 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:46.233639956 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:46.233792067 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:46.413578987 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:46.413681030 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:46.593317986 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:46.593409061 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:46.773422956 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:46.773504972 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:46.953169107 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:46.953267097 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:47.132950068 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:47.133090973 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:47.312740088 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:47.312855005 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:47.533947945 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:47.534066916 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:47.794045925 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:47.794193029 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:47.973948002 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:47.974050999 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:48.153753042 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:48.153970003 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:48.333722115 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:48.333916903 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:48.513650894 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:48.513839960 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:48.693496943 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:48.693603992 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:48.873331070 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:48.873462915 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:49.173993111 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:49.213956118 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:49.214068890 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:49.353755951 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:49.353862047 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:49.393606901 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:49.393657923 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:49.533478022 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:49.533600092 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:49.573313951 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:49.573424101 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:49.713212967 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:49.713329077 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:49.753133059 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:49.753226995 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:49.892982006 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:49.893100977 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:49.932828903 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:49.932879925 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:50.072784901 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:50.072880030 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:50.112462997 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:50.252561092 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:50.252724886 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:50.432324886 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:50.432420015 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:50.612059116 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:50.612158060 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:50.791790009 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:50.791893005 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:51.160543919 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:51.164006948 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:14:51.164180994 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:14:51.343780994 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:15:06.538047075 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:15:06.538108110 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:15:10.674084902 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:15:10.674289942 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:15:12.676276922 CET4972110759192.168.2.618.197.239.5
                                                      Nov 24, 2023 16:15:12.818769932 CET4972210759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:15:12.855918884 CET107594972118.197.239.5192.168.2.6
                                                      Nov 24, 2023 16:15:13.002007008 CET10759497223.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:15:13.002221107 CET4972210759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:15:13.011312008 CET4972210759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:15:13.194571972 CET10759497223.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:15:13.194642067 CET4972210759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:15:13.378468037 CET10759497223.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:15:28.377998114 CET10759497223.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:15:28.378060102 CET4972210759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:15:28.879525900 CET4972210759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:15:29.062827110 CET10759497223.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:15:34.789910078 CET4972210759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:15:34.973201036 CET10759497223.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:15:50.090080976 CET10759497223.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:15:50.090176105 CET4972210759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:15:53.411487103 CET4972210759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:15:53.595354080 CET10759497223.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:15:53.879502058 CET4972210759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:15:54.062731981 CET10759497223.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:15:55.489115953 CET4972210759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:15:55.672398090 CET10759497223.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:15:55.672535896 CET4972210759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:15:55.857778072 CET10759497223.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:15:56.549650908 CET4972210759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:15:56.733010054 CET10759497223.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:15:56.733092070 CET4972210759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:15:56.916524887 CET10759497223.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:15:56.916788101 CET4972210759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:15:57.100435972 CET10759497223.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:15:57.100749969 CET4972210759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:15:57.286329985 CET10759497223.126.37.18192.168.2.6
                                                      Nov 24, 2023 16:15:57.286439896 CET4972210759192.168.2.63.126.37.18
                                                      Nov 24, 2023 16:15:57.471527100 CET10759497223.126.37.18192.168.2.6
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Nov 24, 2023 16:12:01.152734995 CET5043053192.168.2.61.1.1.1
                                                      Nov 24, 2023 16:12:01.288690090 CET53504301.1.1.1192.168.2.6
                                                      Nov 24, 2023 16:13:04.960685968 CET5855253192.168.2.61.1.1.1
                                                      Nov 24, 2023 16:13:05.098140001 CET53585521.1.1.1192.168.2.6
                                                      Nov 24, 2023 16:14:08.702658892 CET5795853192.168.2.61.1.1.1
                                                      Nov 24, 2023 16:14:08.835743904 CET53579581.1.1.1192.168.2.6
                                                      Nov 24, 2023 16:15:12.678206921 CET5786953192.168.2.61.1.1.1
                                                      Nov 24, 2023 16:15:12.817239046 CET53578691.1.1.1192.168.2.6
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Nov 24, 2023 16:12:01.152734995 CET192.168.2.61.1.1.10xe13bStandard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                      Nov 24, 2023 16:13:04.960685968 CET192.168.2.61.1.1.10x8babStandard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                      Nov 24, 2023 16:14:08.702658892 CET192.168.2.61.1.1.10x6232Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                      Nov 24, 2023 16:15:12.678206921 CET192.168.2.61.1.1.10x4d68Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Nov 24, 2023 16:12:01.288690090 CET1.1.1.1192.168.2.60xe13bNo error (0)2.tcp.eu.ngrok.io18.192.93.86A (IP address)IN (0x0001)false
                                                      Nov 24, 2023 16:13:05.098140001 CET1.1.1.1192.168.2.60x8babNo error (0)2.tcp.eu.ngrok.io3.126.37.18A (IP address)IN (0x0001)false
                                                      Nov 24, 2023 16:14:08.835743904 CET1.1.1.1192.168.2.60x6232No error (0)2.tcp.eu.ngrok.io18.197.239.5A (IP address)IN (0x0001)false
                                                      Nov 24, 2023 16:15:12.817239046 CET1.1.1.1192.168.2.60x4d68No error (0)2.tcp.eu.ngrok.io3.126.37.18A (IP address)IN (0x0001)false

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:16:11:51
                                                      Start date:24/11/2023
                                                      Path:C:\Users\user\Desktop\xdPdkPMD8u.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\Desktop\xdPdkPMD8u.exe
                                                      Imagebase:0xd20000
                                                      File size:37'888 bytes
                                                      MD5 hash:1F4B7D2F534977627FA2A529013A5B58
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.2078917135.0000000000D22000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                      • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000000.2078917135.0000000000D22000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                      • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000000.2078917135.0000000000D22000.00000002.00000001.01000000.00000003.sdmp, Author: Brian Wallace @botnet_hunter
                                                      • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.4525404561.0000000003401000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:false

                                                      Target ID:2
                                                      Start time:16:11:58
                                                      Start date:24/11/2023
                                                      Path:C:\Windows\SysWOW64\netsh.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:netsh firewall add allowedprogram "C:\Users\user\Desktop\xdPdkPMD8u.exe" "xdPdkPMD8u.exe" ENABLE
                                                      Imagebase:0xa60000
                                                      File size:82'432 bytes
                                                      MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:moderate
                                                      Has exited:true

                                                      Target ID:3
                                                      Start time:16:11:58
                                                      Start date:24/11/2023
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff66e660000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:16.6%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:13.6%
                                                        Total number of Nodes:169
                                                        Total number of Limit Nodes:7
                                                        execution_graph 6780 151a392 6782 151a3c7 RegQueryValueExW 6780->6782 6783 151a41b 6782->6783 6720 56a08ee 6723 56a0923 ReadFile 6720->6723 6722 56a0955 6723->6722 6784 56a062e 6785 56a0663 GetFileType 6784->6785 6787 56a0690 6785->6787 6788 151a09a 6789 151a107 6788->6789 6790 151a0cf send 6788->6790 6789->6790 6791 151a0dd 6790->6791 6792 56a2ba6 6793 56a2bdb ioctlsocket 6792->6793 6795 56a2c07 6793->6795 6796 56a15a6 6798 56a15db GetProcessTimes 6796->6798 6799 56a160d 6798->6799 6724 151b1de 6725 151b207 LookupPrivilegeValueW 6724->6725 6727 151b22e 6725->6727 6800 56a2e3a 6802 56a2e6f SetProcessWorkingSetSize 6800->6802 6803 56a2e9b 6802->6803 6728 151a646 6729 151a67e CreateMutexW 6728->6729 6731 151a6c1 6729->6731 6807 151aa86 6808 151aaaf SetFileAttributesW 6807->6808 6810 151aacb 6808->6810 6811 151a486 6813 151a4bb RegSetValueExW 6811->6813 6814 151a507 6813->6814 6732 56a1872 6733 56a18a7 WSAConnect 6732->6733 6735 56a18c6 6733->6735 6815 56a1132 6816 56a116a MapViewOfFile 6815->6816 6818 56a11b9 6816->6818 6819 1631638 6820 1631282 6819->6820 6825 1631bb7 6820->6825 6834 163169f 6820->6834 6843 1631b99 6820->6843 6852 1631bca 6820->6852 6826 1631bbe 6825->6826 6861 1630310 6826->6861 6828 1631c85 6829 1630310 2 API calls 6828->6829 6830 1631cee 6829->6830 6831 1631d14 6830->6831 6865 1632120 6830->6865 6869 1632130 6830->6869 6835 16316a5 6834->6835 6836 1630310 2 API calls 6835->6836 6837 1631c85 6836->6837 6838 1630310 2 API calls 6837->6838 6839 1631cee 6838->6839 6840 1631d14 6839->6840 6841 1632120 2 API calls 6839->6841 6842 1632130 2 API calls 6839->6842 6841->6840 6842->6840 6844 1631ba0 6843->6844 6845 1630310 2 API calls 6844->6845 6846 1631c85 6845->6846 6847 1630310 2 API calls 6846->6847 6848 1631cee 6847->6848 6849 1631d14 6848->6849 6850 1632120 2 API calls 6848->6850 6851 1632130 2 API calls 6848->6851 6850->6849 6851->6849 6853 1631bd1 6852->6853 6854 1630310 2 API calls 6853->6854 6855 1631c85 6854->6855 6856 1630310 2 API calls 6855->6856 6857 1631cee 6856->6857 6858 1631d14 6857->6858 6859 1632120 2 API calls 6857->6859 6860 1632130 2 API calls 6857->6860 6859->6858 6860->6858 6862 1630322 6861->6862 6863 1630348 6862->6863 6873 16320b1 6862->6873 6863->6828 6866 163215b 6865->6866 6867 16321a3 6866->6867 6886 1632748 6866->6886 6867->6831 6870 163215b 6869->6870 6871 16321a3 6870->6871 6872 1632748 2 API calls 6870->6872 6871->6831 6872->6871 6874 16320e4 6873->6874 6875 1632101 6874->6875 6878 151b728 6874->6878 6882 151b74a 6874->6882 6875->6863 6881 151b74a NtSetInformationProcess 6878->6881 6880 151b794 6880->6875 6881->6880 6883 151b7aa 6882->6883 6884 151b77f NtSetInformationProcess 6882->6884 6883->6884 6885 151b794 6884->6885 6885->6875 6887 163277d 6886->6887 6891 56a18fe 6887->6891 6895 56a1992 6887->6895 6888 16327b8 6888->6867 6892 56a1938 GetVolumeInformationA 6891->6892 6894 56a19ea 6892->6894 6894->6888 6896 56a19e2 GetVolumeInformationA 6895->6896 6897 56a19ea 6896->6897 6897->6888 6898 16303bd 6899 16303c4 6898->6899 6900 16305bf 6899->6900 6901 16320b1 2 API calls 6899->6901 6901->6900 6740 151a74e 6741 151a7b9 6740->6741 6742 151a77a FindCloseChangeNotification 6740->6742 6741->6742 6743 151a788 6742->6743 6902 151bc0e 6903 151bc84 6902->6903 6904 151bc4c DuplicateHandle 6902->6904 6903->6904 6905 151bc5a 6904->6905 6906 56a0f82 6908 56a0fba ConvertStringSecurityDescriptorToSecurityDescriptorW 6906->6908 6909 56a0ffb 6908->6909 6910 56a2c82 6912 56a2cab select 6910->6912 6913 56a2ce0 6912->6913 6744 151b3fa 6746 151b429 AdjustTokenPrivileges 6744->6746 6747 151b44b 6746->6747 6918 151a93a 6919 151a969 WaitForInputIdle 6918->6919 6920 151a99f 6918->6920 6921 151a977 6919->6921 6920->6919 6748 151a2fe 6749 151a353 6748->6749 6750 151a32a SetErrorMode 6748->6750 6749->6750 6751 151a33f 6750->6751 6922 151ab3e 6925 151ab76 RegOpenKeyExW 6922->6925 6924 151abcc 6925->6924 6926 1630f90 KiUserExceptionDispatcher 6927 1630fc4 6926->6927 6928 151baa2 6929 151bace K32EnumProcesses 6928->6929 6931 151baea 6929->6931 6932 56a1c1e 6934 56a1c59 LoadLibraryA 6932->6934 6935 56a1c96 6934->6935 6756 151bb66 6757 151bbc6 6756->6757 6758 151bb9b NtQuerySystemInformation 6756->6758 6757->6758 6759 151bbb0 6758->6759 6936 56a1692 6937 56a16cd getaddrinfo 6936->6937 6939 56a173f 6937->6939 6760 56a0b56 6762 56a0b8e WSASocketW 6760->6762 6763 56a0bca 6762->6763 6764 56a2d56 6766 56a2d8b GetProcessWorkingSetSize 6764->6766 6767 56a2db7 6766->6767 6768 56a29d6 6769 56a2a0e RegCreateKeyExW 6768->6769 6771 56a2a80 6769->6771 6772 56a13d6 6775 56a140b shutdown 6772->6775 6774 56a1434 6775->6774 6940 56a0516 6943 56a054e CreateFileW 6940->6943 6942 56a059d 6943->6942 6776 151b66e 6777 151b6a3 GetExitCodeProcess 6776->6777 6779 151b6cc 6777->6779

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 163169f-16316aa 2 16316ac-16316b6 0->2 218 16316b6 call 151b281 2->218 219 16316b6 call 151b2a6 2->219 4 16316bb-16316c7 5 1631b16 4->5 6 16316cd-16316e8 4->6 5->2 6->5 8 16316ee-1631701 6->8 10 1631703-1631709 8->10 11 163170b-163171a 8->11 12 163176c-1631779 10->12 15 1631720-163172a 11->15 16 1631b1b 11->16 21 1631780-163179a 12->21 17 1631730 15->17 18 163172c-163172e 15->18 20 1631b20-1631b80 16->20 19 1631733-1631759 17->19 18->19 30 1631763-163176a 19->30 31 163175b-1631761 19->31 35 1631b82-1631b88 20->35 36 1631baa-1631d07 call 1630310 * 2 20->36 28 16317a1-16317ef 21->28 29 163179c 21->29 49 16317f1 28->49 50 16317f6-1631847 28->50 29->28 30->12 31->12 38 1631b8f-1631b97 35->38 220 1631d0e call 1640606 36->220 221 1631d0e call 1632120 36->221 222 1631d0e call 1632130 36->222 223 1631d0e call 16322c7 36->223 224 1631d0e call 1632235 36->224 225 1631d0e call 1632285 36->225 226 1631d0e call 163233b 36->226 227 1631d0e call 16405df 36->227 228 1631d0e call 1632538 36->228 229 1631d0e call 163241d 36->229 38->36 49->50 63 1631849 50->63 64 163184e-1631894 50->64 63->64 77 1631896 64->77 78 163189b-16318cb 64->78 77->78 78->5 85 16318d1-1631901 78->85 94 1631a90-1631a9e 85->94 95 1631906-163190c 94->95 96 1631aa4-1631ac6 94->96 95->20 99 1631912-1631941 95->99 96->5 97 1631ac8-1631acc 96->97 100 1631ad3-1631ada 97->100 101 1631ace 97->101 99->16 108 1631947-1631970 99->108 100->20 104 1631adc-1631aea 100->104 101->100 103 1631d14-1631d45 call 16329a8 call 1631110 118 1631d47-1631d68 103->118 119 1631d6a-1631da7 call 1631110 103->119 110 1631af1-1631af8 104->110 111 1631aec 104->111 122 1631972 108->122 123 1631977-16319a2 108->123 110->20 112 1631afa-1631b0c 110->112 111->110 112->5 130 1631daa-1631e82 118->130 119->130 122->123 134 16319a4-16319ad 123->134 135 16319da-16319f5 123->135 169 1631e84-1631e89 130->169 170 1631e8b 130->170 137 16319bb-16319ca 134->137 138 16319af-16319b3 134->138 146 16319f7 135->146 147 16319fc-1631a43 135->147 137->20 140 16319d0-16319d7 137->140 138->137 140->135 146->147 158 1631a45 147->158 159 1631a4a-1631a7b 147->159 158->159 167 1631a87-1631a8a 159->167 168 1631a7d-1631a81 159->168 167->16 167->94 168->16 168->167 171 1631e90-1631eb8 169->171 170->171 174 1631ec1 171->174 175 1631eba-1631ebf 171->175 176 1631ec6-1631eee 174->176 175->176 179 1631ef0-1631ef5 176->179 180 1631ef7 176->180 181 1631efc-1631f24 179->181 180->181 184 1631f26-1631f2b 181->184 185 1631f2d 181->185 186 1631f32-1631f5a 184->186 185->186 189 1631f63 186->189 190 1631f5c-1631f61 186->190 191 1631f68-1631f90 189->191 190->191 194 1631f92-1631f97 191->194 195 1631f99 191->195 196 1631f9e-1631fc6 194->196 195->196 199 1631fc8-1631fcd 196->199 200 1631fcf 196->200 201 1631fd4-1631ffc 199->201 200->201 204 1632005 201->204 205 1631ffe-1632003 201->205 206 163200a-1632042 call 16329a8 204->206 205->206 211 1632048-1632092 206->211 215 1632093 211->215 215->215 218->4 219->4 220->103 221->103 222->103 223->103 224->103 225->103 226->103 227->103 228->103 229->103
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4525196835.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1630000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: :@%l$:@%l$L.Ll$\OLl
                                                        • API String ID: 0-3360997018
                                                        • Opcode ID: 3848356400dc5ba1032b63bd2919e5793a89b5536f6b2e7ff0b379f5b238a884
                                                        • Instruction ID: 528fc4060bcecf76a099786c6b81a9003865103e1d75023fc5b38885ef0e34e6
                                                        • Opcode Fuzzy Hash: 3848356400dc5ba1032b63bd2919e5793a89b5536f6b2e7ff0b379f5b238a884
                                                        • Instruction Fuzzy Hash: 6C32AC707002118BEB19DB78D950BAE77E6EBC9308F108029D506DB7D4DB79DC9ACBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 0151B443
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: AdjustPrivilegesToken
                                                        • String ID:
                                                        • API String ID: 2874748243-0
                                                        • Opcode ID: c7b36953c34c30a4f088b10a8bda3afa0cfbd3e39e1139c4c8b788de6b64952b
                                                        • Instruction ID: 6979ea6d8082346e3ac81e4124625f95ef328aa73016bf28d98d84d7d066c1ca
                                                        • Opcode Fuzzy Hash: c7b36953c34c30a4f088b10a8bda3afa0cfbd3e39e1139c4c8b788de6b64952b
                                                        • Instruction Fuzzy Hash: 5021D176509380AFEB238F25DC44B52BFF4EF06310F0884DAE9848F563D2709908DB62
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • NtQuerySystemInformation.NTDLL ref: 0151BBA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: InformationQuerySystem
                                                        • String ID:
                                                        • API String ID: 3562636166-0
                                                        • Opcode ID: 5d0990ec5855338ccb8a5b4426350383efb95607efa48cb0abad72e2e72cc0ac
                                                        • Instruction ID: d4019376270d6af5ed93ae4ce950232561fc11fe20a53f7321a2a4440bda59c6
                                                        • Opcode Fuzzy Hash: 5d0990ec5855338ccb8a5b4426350383efb95607efa48cb0abad72e2e72cc0ac
                                                        • Instruction Fuzzy Hash: 8621AC764097C0AFDB238B20DC45A52FFB4FF16214F0984CBE9848F5A3D265A909CB62
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 0151B443
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: AdjustPrivilegesToken
                                                        • String ID:
                                                        • API String ID: 2874748243-0
                                                        • Opcode ID: 50a1201d5d25728f7febc6739e9b8046c23ec70fb20cde2413620742a8fe6f39
                                                        • Instruction ID: 7640cb02c8d25038554ee4818f21fdd584b1ad984c9fe014a983d9a86b0a859b
                                                        • Opcode Fuzzy Hash: 50a1201d5d25728f7febc6739e9b8046c23ec70fb20cde2413620742a8fe6f39
                                                        • Instruction Fuzzy Hash: 4011A0765002009FEB22CF55D885B66FBF4FF04220F08C8AAED858F666D3B1E418DB61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • NtSetInformationProcess.NTDLL ref: 0151B785
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: InformationProcess
                                                        • String ID:
                                                        • API String ID: 1801817001-0
                                                        • Opcode ID: 643d4387eaa944dd5f05f120338e9aa242b7b32da741f2b11c967ddec9bb2a54
                                                        • Instruction ID: 45453a3733dda8493b5287bc47ea66038d36d4062c9f96e4df373266de4cffbf
                                                        • Opcode Fuzzy Hash: 643d4387eaa944dd5f05f120338e9aa242b7b32da741f2b11c967ddec9bb2a54
                                                        • Instruction Fuzzy Hash: 1111A075408380AFDB228F15DC45A62FFB4EF46220F0C849AED844B663C275A918CB62
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • NtSetInformationProcess.NTDLL ref: 0151B785
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: InformationProcess
                                                        • String ID:
                                                        • API String ID: 1801817001-0
                                                        • Opcode ID: 2b2ac7a49070a9e4099eb437dd701ae2978913da85284e7d6bb723f4dbffde37
                                                        • Instruction ID: afdbfdbc4ab798a005fe2adca3ed29d903a31fd694c179463c714d3703757d66
                                                        • Opcode Fuzzy Hash: 2b2ac7a49070a9e4099eb437dd701ae2978913da85284e7d6bb723f4dbffde37
                                                        • Instruction Fuzzy Hash: 3401783A4002409FEB229F15D985B65FBF0FF48220F0CC49ADD494F666C375A418CBA2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • NtQuerySystemInformation.NTDLL ref: 0151BBA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: InformationQuerySystem
                                                        • String ID:
                                                        • API String ID: 3562636166-0
                                                        • Opcode ID: 2b2ac7a49070a9e4099eb437dd701ae2978913da85284e7d6bb723f4dbffde37
                                                        • Instruction ID: 9ab9aca54638ac78fee3174b151514d75a6de6cdd81882173d7cc5bc9cdec80c
                                                        • Opcode Fuzzy Hash: 2b2ac7a49070a9e4099eb437dd701ae2978913da85284e7d6bb723f4dbffde37
                                                        • Instruction Fuzzy Hash: F0017C394002449FEB228F05D985B65FBF0FF08220F08C89AED454BA6AD375A418CBA2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 853 1630f90-1630fcb KiUserExceptionDispatcher 856 1630fd3 853->856 857 1630fd5-163100e 856->857 861 1631010-1631012 857->861 862 163105d-1631060 857->862 886 1631014 call 1640606 861->886 887 1631014 call 1632b98 861->887 888 1631014 call 16405df 861->888 863 1631062-1631070 862->863 864 16310dd-16310fa 862->864 863->857 866 1631076-163107a 863->866 865 163101a-1631029 869 163102b-1631052 865->869 870 163105a 865->870 867 16310ce-16310d8 866->867 868 163107c-163108d 866->868 867->856 868->864 876 163108f-163109f 868->876 869->870 870->862 877 16310a1-16310ac 876->877 878 16310c0-16310c6 876->878 877->864 881 16310ae-16310b8 877->881 878->867 881->878 886->865 887->865 888->865
                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 01630FB7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4525196835.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1630000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: a44fb810e1170a1eae9f875af7c7bdcb1179c258b80976633428f6a100df2aec
                                                        • Instruction ID: d9a9516e534926b25e6804b4c78d6f4f9148838382e4295966a1d8927cf559b2
                                                        • Opcode Fuzzy Hash: a44fb810e1170a1eae9f875af7c7bdcb1179c258b80976633428f6a100df2aec
                                                        • Instruction Fuzzy Hash: F241BF31B002018FDB14DF39C8946AEB7E6EF89208B448479D909DB399DF39DD49CBA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 925 56a18fe-56a19e4 GetVolumeInformationA 929 56a19ea-56a1a13 925->929
                                                        APIs
                                                        • GetVolumeInformationA.KERNEL32(?,00000E24,?,?), ref: 056A19E2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: InformationVolume
                                                        • String ID:
                                                        • API String ID: 2039140958-0
                                                        • Opcode ID: e4159e1380f46ec38fe107b1c1bbc0e25d0713961891ec302838ac8b677d3402
                                                        • Instruction ID: 84aac77d7e79ad6b8d18ae52809b653cd204ddc065b0938621c7cc3f71cc4694
                                                        • Opcode Fuzzy Hash: e4159e1380f46ec38fe107b1c1bbc0e25d0713961891ec302838ac8b677d3402
                                                        • Instruction Fuzzy Hash: 01416B6150E3C06FD7038B358C61AA2BFB8AF47210F0E84CBD8C4CF5A3D6246959C7A2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 889 1630f7f-1630fbd KiUserExceptionDispatcher 890 1630fc4-1630fcb 889->890 892 1630fd3 890->892 893 1630fd5-163100e 892->893 897 1631010-1631012 893->897 898 163105d-1631060 893->898 922 1631014 call 1640606 897->922 923 1631014 call 1632b98 897->923 924 1631014 call 16405df 897->924 899 1631062-1631070 898->899 900 16310dd-16310fa 898->900 899->893 902 1631076-163107a 899->902 901 163101a-1631029 905 163102b-1631052 901->905 906 163105a 901->906 903 16310ce-16310d8 902->903 904 163107c-163108d 902->904 903->892 904->900 912 163108f-163109f 904->912 905->906 906->898 913 16310a1-16310ac 912->913 914 16310c0-16310c6 912->914 913->900 917 16310ae-16310b8 913->917 914->903 917->914 922->901 923->901 924->901
                                                        APIs
                                                        • KiUserExceptionDispatcher.NTDLL ref: 01630FB7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4525196835.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1630000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: DispatcherExceptionUser
                                                        • String ID:
                                                        • API String ID: 6842923-0
                                                        • Opcode ID: 92ee80fe9cb686f8f1cd8ec7e7c45db85a634fd6ff623d47560bbe903ed0cca1
                                                        • Instruction ID: 5a33d24dba58bb1b7728fdde3c84729e5442f76f9d4a264138637a3d77958e3c
                                                        • Opcode Fuzzy Hash: 92ee80fe9cb686f8f1cd8ec7e7c45db85a634fd6ff623d47560bbe903ed0cca1
                                                        • Instruction Fuzzy Hash: BD418231B002018FDB14DF39C8946AEBBE6AF85214B548479D809DF399DF39DD46CBA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 931 56a04d6-56a056e 935 56a0573-56a057f 931->935 936 56a0570 931->936 937 56a0581 935->937 938 56a0584-56a058d 935->938 936->935 937->938 939 56a05de-56a05e3 938->939 940 56a058f-56a05b3 CreateFileW 938->940 939->940 943 56a05e5-56a05ea 940->943 944 56a05b5-56a05db 940->944 943->944
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,?,?,?,?,?), ref: 056A0595
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: CreateFile
                                                        • String ID:
                                                        • API String ID: 823142352-0
                                                        • Opcode ID: a8f17c93d7b536905c021cf93eeed730f74030bac856b183dfe908074f5ed234
                                                        • Instruction ID: 8268cccc7f6cd7309160e823bfde832d4d1fb8ff4af34591aeb4b9557d95ab08
                                                        • Opcode Fuzzy Hash: a8f17c93d7b536905c021cf93eeed730f74030bac856b183dfe908074f5ed234
                                                        • Instruction Fuzzy Hash: 2C31A571504380AFE722CF65DC45FA2BFE8EF06314F08489AE9858B662D375E909DB71
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 947 56a29aa-56a2a2e 951 56a2a33-56a2a3f 947->951 952 56a2a30 947->952 953 56a2a41 951->953 954 56a2a44-56a2a4d 951->954 952->951 953->954 955 56a2a4f 954->955 956 56a2a52-56a2a69 954->956 955->956 958 56a2aab-56a2ab0 956->958 959 56a2a6b-56a2a7e RegCreateKeyExW 956->959 958->959 960 56a2ab2-56a2ab7 959->960 961 56a2a80-56a2aa8 959->961 960->961
                                                        APIs
                                                        • RegCreateKeyExW.KERNEL32(?,00000E24), ref: 056A2A71
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 6e59233f62af04a2a1ee8fbbb16c087c6867f35730ec4e43c5ddc319627b92d0
                                                        • Instruction ID: 0e8f6aa338e328f251cf24359003f9401da28d64a8ab31300450e969d9e356a3
                                                        • Opcode Fuzzy Hash: 6e59233f62af04a2a1ee8fbbb16c087c6867f35730ec4e43c5ddc319627b92d0
                                                        • Instruction Fuzzy Hash: 5F318D76504344AFEB21CF21CC44FA7BFFCEF05210F08859AE9858B662E324E908CB61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 966 56a0a43-56a0a63 967 56a0a85-56a0ab7 966->967 968 56a0a65-56a0a84 966->968 972 56a0aba-56a0b12 RegQueryValueExW 967->972 968->967 974 56a0b18-56a0b2e 972->974
                                                        APIs
                                                        • RegQueryValueExW.KERNEL32(?,00000E24,?,?), ref: 056A0B0A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: QueryValue
                                                        • String ID:
                                                        • API String ID: 3660427363-0
                                                        • Opcode ID: 884640c6b5a0e98276c5a795741649e80986139b813738033b283883fcddb8a5
                                                        • Instruction ID: b77ed2051fb7fb7f05d53ed33bd43b9ed22340a5d177b68988d179619cf2d468
                                                        • Opcode Fuzzy Hash: 884640c6b5a0e98276c5a795741649e80986139b813738033b283883fcddb8a5
                                                        • Instruction Fuzzy Hash: D3319C6510E7C06FD3138B258C65A61BFB4EF47610F0E45CBD8C48F6A3D229A919C7B2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 975 56a1670-56a172f 981 56a1781-56a1786 975->981 982 56a1731-56a1739 getaddrinfo 975->982 981->982 984 56a173f-56a1751 982->984 985 56a1788-56a178d 984->985 986 56a1753-56a177e 984->986 985->986
                                                        APIs
                                                        • getaddrinfo.WS2_32(?,00000E24), ref: 056A1737
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: getaddrinfo
                                                        • String ID:
                                                        • API String ID: 300660673-0
                                                        • Opcode ID: ebbbc94fb48333f27e93a299e944f9135c717621d5ba2742cad78c74745898c0
                                                        • Instruction ID: ba7b44c383e2979f1080f05a5f2ec65dff9a6e43a75cb1e7113a840fcdf1c3a2
                                                        • Opcode Fuzzy Hash: ebbbc94fb48333f27e93a299e944f9135c717621d5ba2742cad78c74745898c0
                                                        • Instruction Fuzzy Hash: DF31BFB2504340AFEB21CB50CC85FA6FBBCEB04314F14499AFA489B692D375A949CB71
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 990 56a1568-56a15fd 995 56a164a-56a164f 990->995 996 56a15ff-56a1607 GetProcessTimes 990->996 995->996 998 56a160d-56a161f 996->998 999 56a1651-56a1656 998->999 1000 56a1621-56a1647 998->1000 999->1000
                                                        APIs
                                                        • GetProcessTimes.KERNEL32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 056A1605
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: ProcessTimes
                                                        • String ID:
                                                        • API String ID: 1995159646-0
                                                        • Opcode ID: a24f7b52bd9594ab37ddc0fdbcb22597db0c7988a56ae74a8ccb399253046739
                                                        • Instruction ID: 2e56ec471ec3420fa4f9c0a5e9fad11a8ed9da26311723542efe4cfe5a6ecd8d
                                                        • Opcode Fuzzy Hash: a24f7b52bd9594ab37ddc0fdbcb22597db0c7988a56ae74a8ccb399253046739
                                                        • Instruction Fuzzy Hash: 5831E8725057806FDB128F60DC45F96BFB8EF06310F08849AE985CB163D3259909DB71
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • RegOpenKeyExW.KERNEL32(?,00000E24), ref: 0151ABBD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: Open
                                                        • String ID:
                                                        • API String ID: 71445658-0
                                                        • Opcode ID: ca594617447c9dcb2ce9bd987029265da5e2583b2da82435b91d288019090ddd
                                                        • Instruction ID: b39a57ae6f1c72fa85bb041696a91d6306d59b4fea1218c36aa5416d71e45672
                                                        • Opcode Fuzzy Hash: ca594617447c9dcb2ce9bd987029265da5e2583b2da82435b91d288019090ddd
                                                        • Instruction Fuzzy Hash: B631B1B2544384AFE722CF15CC45FA7BFBCEF05210F08899AE9458B652D364E549CB71
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • CreateMutexW.KERNEL32(?,?), ref: 0151A6B9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: CreateMutex
                                                        • String ID:
                                                        • API String ID: 1964310414-0
                                                        • Opcode ID: 06b28745be54b97e688fe8c4a0cf5edd3a366067dee31c520d305fe829ee06d5
                                                        • Instruction ID: 7e79803285da91dc94fefdac53d8d1428b8f7938b1e67ca129f149425f8a6895
                                                        • Opcode Fuzzy Hash: 06b28745be54b97e688fe8c4a0cf5edd3a366067dee31c520d305fe829ee06d5
                                                        • Instruction Fuzzy Hash: 853181B55093806FE712CB25CC45B96BFF8EF06210F08849AE984CF292D375A909C762
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 056A0FF3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: DescriptorSecurity$ConvertString
                                                        • String ID:
                                                        • API String ID: 3907675253-0
                                                        • Opcode ID: 835c97caa885d4328d764e1bb854f1a05be8d944b024a97e135d2924c9329bca
                                                        • Instruction ID: a55a62a2c4c8b4338e212c46506c5070be6b4085eb560d3ef225137c983b4386
                                                        • Opcode Fuzzy Hash: 835c97caa885d4328d764e1bb854f1a05be8d944b024a97e135d2924c9329bca
                                                        • Instruction Fuzzy Hash: B4318E72504384AFEB218F64DC45FA6BFB8EF06210F08849AE945DB662D365A909CB61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • RegCreateKeyExW.KERNEL32(?,00000E24), ref: 056A2A71
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 5f0f3f1234fae4ddd7330e6b9d3379e594d995ef6aec0c79194b62915a5fa145
                                                        • Instruction ID: e5d007905ac982cf290b546e34570d73eb92a0fe34ab90425ee58b5187aec95c
                                                        • Opcode Fuzzy Hash: 5f0f3f1234fae4ddd7330e6b9d3379e594d995ef6aec0c79194b62915a5fa145
                                                        • Instruction Fuzzy Hash: 0D219E76600604AEEB31CF15CC80FA7BBECEF08214F04895AEA46D7A51E724E909CF71
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • RegQueryValueExW.KERNEL32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 0151A40C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: QueryValue
                                                        • String ID:
                                                        • API String ID: 3660427363-0
                                                        • Opcode ID: 625348af461b46107a194382913b4d2dd62feda1944448cfeb45432e7db7e793
                                                        • Instruction ID: 8ea1f886082dc2f531bbfb8a467195730deea872d8ad7103856c68ee32266031
                                                        • Opcode Fuzzy Hash: 625348af461b46107a194382913b4d2dd62feda1944448cfeb45432e7db7e793
                                                        • Instruction Fuzzy Hash: 71314C75505780AFE722CF15CC84F96BFB8EF06610F08849AE9458B2A2D364E949CB71
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetExitCodeProcess.KERNEL32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 0151B6C4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: CodeExitProcess
                                                        • String ID:
                                                        • API String ID: 3861947596-0
                                                        • Opcode ID: 938ce88deb92fdf33164074e59f1823353f7bf8e39c0690c13179d0b89841d01
                                                        • Instruction ID: 54acf49bc5a6a9f039382d97e8b84c05c23f00dfe6b7aebd07df006be19c143c
                                                        • Opcode Fuzzy Hash: 938ce88deb92fdf33164074e59f1823353f7bf8e39c0690c13179d0b89841d01
                                                        • Instruction Fuzzy Hash: 6E21E7725057806FE7128B20DC45B96BFB8EF06324F0884DBE984DF193D2649909C761
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetProcessWorkingSetSize.KERNEL32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 056A2DAF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: ProcessSizeWorking
                                                        • String ID:
                                                        • API String ID: 3584180929-0
                                                        • Opcode ID: d9c85617a861910ded42e33311c5d2175d438841391a78b65c73aea83f5655c9
                                                        • Instruction ID: f8eb8138060f75a13178f32b6e6dd012cb46444568a13a579ba0e9a26015fa0e
                                                        • Opcode Fuzzy Hash: d9c85617a861910ded42e33311c5d2175d438841391a78b65c73aea83f5655c9
                                                        • Instruction Fuzzy Hash: C721D7765097C06FD713CB20CC55B96BFB8AF46214F0884DAE9448F153D2259909CB72
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • getaddrinfo.WS2_32(?,00000E24), ref: 056A1737
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: getaddrinfo
                                                        • String ID:
                                                        • API String ID: 300660673-0
                                                        • Opcode ID: 6ff74cfbc8f41bfe028bdaeb5ea2a3f427bbcb479d624a9a35bc929d176f13c7
                                                        • Instruction ID: ca73f37a507c43337a79bda042aa42b9fbe43ccbbdbac30447a448a2d4a300aa
                                                        • Opcode Fuzzy Hash: 6ff74cfbc8f41bfe028bdaeb5ea2a3f427bbcb479d624a9a35bc929d176f13c7
                                                        • Instruction Fuzzy Hash: 8B21D1B2100200AEFB21DF10CC85FAAF7ACEF04314F14885AFA489B691D775E949CBB1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: select
                                                        • String ID:
                                                        • API String ID: 1274211008-0
                                                        • Opcode ID: d12fdaa5bdf0434dc27dcb68cc6eb9aa7d1ead447499e6a17c17b060f7ebda29
                                                        • Instruction ID: 41649ded8fec0f3a9ffff223967b063d7dfa1cf7cc88437a716721ae828a90cb
                                                        • Opcode Fuzzy Hash: d12fdaa5bdf0434dc27dcb68cc6eb9aa7d1ead447499e6a17c17b060f7ebda29
                                                        • Instruction Fuzzy Hash: BC216D755083809FDB22CF25DC54B62BFF8EF06210F0984DAE985CB663D225E909CB61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetFileType.KERNEL32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 056A0681
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: FileType
                                                        • String ID:
                                                        • API String ID: 3081899298-0
                                                        • Opcode ID: ca93621fdbe52dc30d515c6a25a216054143a7f63ee6779aeb86ae755254a82f
                                                        • Instruction ID: 68bdca8d1527aa931044b440415fa3a04c725e2226422d0ef8cb1989b07b12b8
                                                        • Opcode Fuzzy Hash: ca93621fdbe52dc30d515c6a25a216054143a7f63ee6779aeb86ae755254a82f
                                                        • Instruction Fuzzy Hash: 81212FB55097806FD7128F21DC45BA2BFBCEF47724F0984D6ED808B263D2645909C771
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • RegSetValueExW.KERNEL32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 0151A4F8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: Value
                                                        • String ID:
                                                        • API String ID: 3702945584-0
                                                        • Opcode ID: 07554375c7aadd586293f7c94109d801f2c6ef163b1b8ec269039b7331c067b9
                                                        • Instruction ID: 8d583cb7405c7d7a5887dd8ec6742f1ec6d295696a6caac47dee892961965ec7
                                                        • Opcode Fuzzy Hash: 07554375c7aadd586293f7c94109d801f2c6ef163b1b8ec269039b7331c067b9
                                                        • Instruction Fuzzy Hash: 2A2192B65053806FEB228F15DC44F67BFBCEF45210F08849AE945CB662D364E508C771
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • WSASocketW.WS2_32(?,?,?,?,?), ref: 056A0BC2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: Socket
                                                        • String ID:
                                                        • API String ID: 38366605-0
                                                        • Opcode ID: 53689136b1605defbf5c8e41211299ee8e07c8b35e420ba50e8f923098274647
                                                        • Instruction ID: 4184dad261717656f4b21440ff944e3100fa34c561585242d3c7e6c4adb3e0ea
                                                        • Opcode Fuzzy Hash: 53689136b1605defbf5c8e41211299ee8e07c8b35e420ba50e8f923098274647
                                                        • Instruction Fuzzy Hash: 04219E71409380AFE721CF51CC45F96FFF8EF05220F08889AE9858B662D375A818CB72
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: FileView
                                                        • String ID:
                                                        • API String ID: 3314676101-0
                                                        • Opcode ID: c0154a32fd4b4be49471319ce0bfca68a5c22926659eeb0dc4fb5455e20f589f
                                                        • Instruction ID: 0aed321697f65ff2361e1f287c9b2127436e5b29fd69c16937545a0f746e63f0
                                                        • Opcode Fuzzy Hash: c0154a32fd4b4be49471319ce0bfca68a5c22926659eeb0dc4fb5455e20f589f
                                                        • Instruction Fuzzy Hash: 8621A271504340AFE721CF55CC44F96FFF8EF09214F04449AE9848B652D375A908CB72
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • RegQueryValueExW.KERNEL32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 056A0F08
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: QueryValue
                                                        • String ID:
                                                        • API String ID: 3660427363-0
                                                        • Opcode ID: f7eb10cd27d13c5d870921228a9799a58f9e970c1d505fa8ef9e49ab570a91c2
                                                        • Instruction ID: 71505f841e0855c788613f5b9c1c02fabcc3d104ac361df9f8821939681c3779
                                                        • Opcode Fuzzy Hash: f7eb10cd27d13c5d870921228a9799a58f9e970c1d505fa8ef9e49ab570a91c2
                                                        • Instruction Fuzzy Hash: 5D217F76509784AFE721CF11CC44F67FFF8AF45220F08849AE9459B6A2D364E908CB72
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • CreateFileW.KERNEL32(?,?,?,?,?,?), ref: 056A0595
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: CreateFile
                                                        • String ID:
                                                        • API String ID: 823142352-0
                                                        • Opcode ID: 265619b9b5415e7e9a16e48d021a4890482a833cac9bffc2a6e6c5a184619533
                                                        • Instruction ID: e61418346b44a1e2693f464ad125aac44aff4c2f33857666fd71c5615357a689
                                                        • Opcode Fuzzy Hash: 265619b9b5415e7e9a16e48d021a4890482a833cac9bffc2a6e6c5a184619533
                                                        • Instruction Fuzzy Hash: A921A176500240AFEB21CF65CD85F66FBE8EF08224F088859ED458B751E771E809DB72
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 056A0FF3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: DescriptorSecurity$ConvertString
                                                        • String ID:
                                                        • API String ID: 3907675253-0
                                                        • Opcode ID: 699d07802cbc0d408ad6cccf2251f9f132d2d153837af9fc74f1627dd42b1f72
                                                        • Instruction ID: 9d5382c7556bbcd2b6d024382ee6bce4cf0b9ef745dbcf94db4ba338a3596579
                                                        • Opcode Fuzzy Hash: 699d07802cbc0d408ad6cccf2251f9f132d2d153837af9fc74f1627dd42b1f72
                                                        • Instruction Fuzzy Hash: 4B21F272500200AFEB20CF24CC85FAABBACEF04210F08845AED05DB751D774E909CA71
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • RegOpenKeyExW.KERNEL32(?,00000E24), ref: 0151ABBD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: Open
                                                        • String ID:
                                                        • API String ID: 71445658-0
                                                        • Opcode ID: b26c0aba1ec5c80ced96abd1eedba45e568ab8c740a90d9a8681112af3dd9836
                                                        • Instruction ID: 17f61905da622e6067e364c663e6a5c19b96aae0d5a59704c70e65ee46eca252
                                                        • Opcode Fuzzy Hash: b26c0aba1ec5c80ced96abd1eedba45e568ab8c740a90d9a8681112af3dd9836
                                                        • Instruction Fuzzy Hash: 1A21D4B2500244AEFB22DF15CC45FABFBECFF04214F08885AE9058B656D334E548CA72
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • SetProcessWorkingSetSize.KERNEL32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 056A2E93
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: ProcessSizeWorking
                                                        • String ID:
                                                        • API String ID: 3584180929-0
                                                        • Opcode ID: 605db306ae2499556ff47093b6c9960271e4c0ba9d72967c9586148f961b82bc
                                                        • Instruction ID: 8a686542f46cde57427bb595905102c7fad8532d327ffa4a4038a38e49df1c6a
                                                        • Opcode Fuzzy Hash: 605db306ae2499556ff47093b6c9960271e4c0ba9d72967c9586148f961b82bc
                                                        • Instruction Fuzzy Hash: ED21C2725053806FDB11CF11CC45FA6BFACEF45210F08849AE944DB252D374A948CB72
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • CreateMutexW.KERNEL32(?,?), ref: 0151A6B9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: CreateMutex
                                                        • String ID:
                                                        • API String ID: 1964310414-0
                                                        • Opcode ID: 7bed7e61ef0634153d396308c56c3904219e4f4109ea4ead7556865b569b3625
                                                        • Instruction ID: fa25e4960c19987b266a4492d88970649122b663718eb22b085b107cc2436b4c
                                                        • Opcode Fuzzy Hash: 7bed7e61ef0634153d396308c56c3904219e4f4109ea4ead7556865b569b3625
                                                        • Instruction Fuzzy Hash: C021C1756012409FF712CF25CD85B9AFBE8EF04210F048869E9448F655E771E509CA71
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • shutdown.WS2_32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 056A142C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: shutdown
                                                        • String ID:
                                                        • API String ID: 2510479042-0
                                                        • Opcode ID: 5aff1f670d07c82307bd8e5ba3491c23f3489a5d30d4c118441866782ff0f964
                                                        • Instruction ID: 9d5a7b29f85a6cc2a6fae8cfba31b61b7bb059ec71046145cff47e5a5d993d11
                                                        • Opcode Fuzzy Hash: 5aff1f670d07c82307bd8e5ba3491c23f3489a5d30d4c118441866782ff0f964
                                                        • Instruction Fuzzy Hash: 762183B15093846FDB128B14DC45F56BFB8EF46214F0885DAE9849F252D368A548CB72
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 0151B226
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: LookupPrivilegeValue
                                                        • String ID:
                                                        • API String ID: 3899507212-0
                                                        • Opcode ID: ce6d9aac4855014462acc7577d44df39a655031fa24fafedf17a797ef98e4cec
                                                        • Instruction ID: 51ebcdb7107c470857c1a78fae8341bb077929660a2af57d0c91eafdafefd514
                                                        • Opcode Fuzzy Hash: ce6d9aac4855014462acc7577d44df39a655031fa24fafedf17a797ef98e4cec
                                                        • Instruction Fuzzy Hash: 102181715093805FEB12CF29CC54BA6BFF8EF06610F0884DAED85DF252D265E808CB61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • ReadFile.KERNEL32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 056A094D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: FileRead
                                                        • String ID:
                                                        • API String ID: 2738559852-0
                                                        • Opcode ID: a9dc0be067c832be3410907512e98635d7c6c61fb7a90a8729a31f24c817c79b
                                                        • Instruction ID: c28fbb29421cf2758a46f5e8a38efbd8ccc6821cbba236580fdd8f42f160fa6d
                                                        • Opcode Fuzzy Hash: a9dc0be067c832be3410907512e98635d7c6c61fb7a90a8729a31f24c817c79b
                                                        • Instruction Fuzzy Hash: DC219272405340AFDB22CF51DC44F97FFB8EF45320F08849AE9449B662D275A508CBB2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • RegQueryValueExW.KERNEL32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 0151A40C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: QueryValue
                                                        • String ID:
                                                        • API String ID: 3660427363-0
                                                        • Opcode ID: bc642c3d4df1d1186a6a52ed0a7d3c49d3bb58b319b92e5a4cd25db0b0810210
                                                        • Instruction ID: dff8366c83577eb36f0d1a478b93b6b4d019a51073b1db5a67336209c3577127
                                                        • Opcode Fuzzy Hash: bc642c3d4df1d1186a6a52ed0a7d3c49d3bb58b319b92e5a4cd25db0b0810210
                                                        • Instruction Fuzzy Hash: 00219075601644AFFB22CF15CC84FA6FBECEF04610F08845AE945CB656D3B4E949CA71
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • ioctlsocket.WS2_32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 056A2BFF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: ioctlsocket
                                                        • String ID:
                                                        • API String ID: 3577187118-0
                                                        • Opcode ID: a0e19a7e384d28ba89419d84c3aaf631d47cb1b150caed9a45b86effebf36622
                                                        • Instruction ID: b891d1295cf4242ced32733da5de137c5af2a0df384a8a4e6be6a5f4bbd5e1be
                                                        • Opcode Fuzzy Hash: a0e19a7e384d28ba89419d84c3aaf631d47cb1b150caed9a45b86effebf36622
                                                        • Instruction Fuzzy Hash: 6621A4764093846FDB11CF10CC45F96FFB8EF45210F08849AE9459B652D374A508CB72
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • FindCloseChangeNotification.KERNEL32(?,6972C739,00000000,?,?,?,?,?,?,?,?,6CD53C58), ref: 0151A780
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: ChangeCloseFindNotification
                                                        • String ID:
                                                        • API String ID: 2591292051-0
                                                        • Opcode ID: 23cee5b1345a4758e99a9ecf18e6ee364761b638b8917db7ed897b593bd6fc04
                                                        • Instruction ID: fe88515c15eece3624f6457eb9c7b526a9e062cd09f00501787bc0d871cf5bf2
                                                        • Opcode Fuzzy Hash: 23cee5b1345a4758e99a9ecf18e6ee364761b638b8917db7ed897b593bd6fc04
                                                        • Instruction Fuzzy Hash: F821D2B54093809FDB128F25DD85752BFB8EF02220F0984EBEC858F253D2359909DBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • FindCloseChangeNotification.KERNEL32(?,6972C739,00000000,?,?,?,?,?,?,?,?,6CD53C58), ref: 0151B4FC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: ChangeCloseFindNotification
                                                        • String ID:
                                                        • API String ID: 2591292051-0
                                                        • Opcode ID: 4b31ca80f16fe3b125b05c8c87b029bec9a1538d195642efd0ea53eb8ec3d23e
                                                        • Instruction ID: 54826ff9f7a2bc1f5105d2b514f725e9cc87b76839df58d33daa264dd080cb8c
                                                        • Opcode Fuzzy Hash: 4b31ca80f16fe3b125b05c8c87b029bec9a1538d195642efd0ea53eb8ec3d23e
                                                        • Instruction Fuzzy Hash: 6A21A1725093C05FDB038B25DC55B92BFB4AF07324F0984DAEC858F663D2649908CB61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • SetFileAttributesW.KERNEL32(?,?,6972C739,00000000,?,?,?,?,?,?,?,?,6CD53C58), ref: 0151AAC3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: AttributesFile
                                                        • String ID:
                                                        • API String ID: 3188754299-0
                                                        • Opcode ID: 85535d2ff3c15eeebe1af52ac1360fc01b1af42c6e496f90c7a52a8fa74e1ce4
                                                        • Instruction ID: 3793924b5bb5b03c8e893767f705aefeeafd8ee7c06aca4da1cb0e3c50c8482c
                                                        • Opcode Fuzzy Hash: 85535d2ff3c15eeebe1af52ac1360fc01b1af42c6e496f90c7a52a8fa74e1ce4
                                                        • Instruction Fuzzy Hash: F121A1755093C05FEB128B25DC95796BFF8AF07210F0984DAD884CF263D2659849CB61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 056A18BE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: Connect
                                                        • String ID:
                                                        • API String ID: 3144859779-0
                                                        • Opcode ID: 3c11dd5ecdc6d67c17fbe6024aeef9d7ed2ed9c45dd6325e6e0d3a47aaf68dd0
                                                        • Instruction ID: da93db29f9361d1935f0ad4958ffab372bd61d94fda6f78e392ff506c2e6c7bc
                                                        • Opcode Fuzzy Hash: 3c11dd5ecdc6d67c17fbe6024aeef9d7ed2ed9c45dd6325e6e0d3a47aaf68dd0
                                                        • Instruction Fuzzy Hash: FE216F76408380AFDB228F55DC44B62BFF8EF06310F0985DAED858B663D375A819DB61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • WSASocketW.WS2_32(?,?,?,?,?), ref: 056A0BC2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: Socket
                                                        • String ID:
                                                        • API String ID: 38366605-0
                                                        • Opcode ID: a53d03ee9f94522ca3a39de08c0c5b548a6d6f1495f936d8420fe3f86d7d59b3
                                                        • Instruction ID: b8bac8c778b59047fd9682980f4ca0b7df2d3526bf4159be7e418b84489ee540
                                                        • Opcode Fuzzy Hash: a53d03ee9f94522ca3a39de08c0c5b548a6d6f1495f936d8420fe3f86d7d59b3
                                                        • Instruction Fuzzy Hash: 2E21C276504200AFEB21CF51CD85F66FBE8EF08324F04889AE9458B652D376A419CB72
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: FileView
                                                        • String ID:
                                                        • API String ID: 3314676101-0
                                                        • Opcode ID: 78284f0b3e441c49552ede562e2dca66324eccf1997e7cb9d457b85a89d386d9
                                                        • Instruction ID: dfd762ddc9307c417f8ab43810cb90ebaee23f00c5ccbd3559a3d90b1f592551
                                                        • Opcode Fuzzy Hash: 78284f0b3e441c49552ede562e2dca66324eccf1997e7cb9d457b85a89d386d9
                                                        • Instruction Fuzzy Hash: 3C21D176500204AFEB21CF55CC85FA6FBECEF09224F048459E9458B751E375E909CBB2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • LoadLibraryA.KERNEL32(?,00000E24), ref: 056A1C87
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: b9da1054a33b76939809796e22c134e5e1497f5173831240871b5fa278977e2d
                                                        • Instruction ID: 1651349108c9ed4a47b79ac54a6d01edf87ed8afc1372228ee702f5813bf98ec
                                                        • Opcode Fuzzy Hash: b9da1054a33b76939809796e22c134e5e1497f5173831240871b5fa278977e2d
                                                        • Instruction Fuzzy Hash: F111E4715083406FE721CB11CC85FA6FFBCDF45320F08809AF9448B692D378A948CB62
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • RegSetValueExW.KERNEL32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 0151A4F8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: Value
                                                        • String ID:
                                                        • API String ID: 3702945584-0
                                                        • Opcode ID: 7fd3fc695226ba5a7ba7dd7882086a59ddd596f387d9ef19c0f32a132305b1a8
                                                        • Instruction ID: 9010c19ecc78ee69e1acdaef0daec3670061686d6fb06dd33f9ad061e0ccbc22
                                                        • Opcode Fuzzy Hash: 7fd3fc695226ba5a7ba7dd7882086a59ddd596f387d9ef19c0f32a132305b1a8
                                                        • Instruction Fuzzy Hash: 28118476500640AFFB228F15DC45F67BBECEF04614F04845AED458B655D374E508CA72
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • RegQueryValueExW.KERNEL32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 056A0F08
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: QueryValue
                                                        • String ID:
                                                        • API String ID: 3660427363-0
                                                        • Opcode ID: 09267498c6b375baabc8b19c5ee16fc67d0af167efc683cbea20b60f43441b71
                                                        • Instruction ID: f24fdee9c94074eeb1a89262c3e210c1e30d892d753299bb8c2277dcc28768ee
                                                        • Opcode Fuzzy Hash: 09267498c6b375baabc8b19c5ee16fc67d0af167efc683cbea20b60f43441b71
                                                        • Instruction Fuzzy Hash: EC11AF76500204AFEB21CF11CC85FA6F7ECEF08624F08845AED459BB52D360E908CAB2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetProcessTimes.KERNEL32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 056A1605
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: ProcessTimes
                                                        • String ID:
                                                        • API String ID: 1995159646-0
                                                        • Opcode ID: 3d8ae84b514f5ac4db335952b347f1ccce72e9895714076dbdb107bfdb61d08e
                                                        • Instruction ID: 9aa4d5f6ae955af7e500341bb7097f63ad3c7dce26d7c3de72b5272f2760cef0
                                                        • Opcode Fuzzy Hash: 3d8ae84b514f5ac4db335952b347f1ccce72e9895714076dbdb107bfdb61d08e
                                                        • Instruction Fuzzy Hash: F811D376500200AFEB21CF51DC85FA6BBA8EF44324F08845AE945CB651D374E859DBB2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetProcessWorkingSetSize.KERNEL32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 056A2DAF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: ProcessSizeWorking
                                                        • String ID:
                                                        • API String ID: 3584180929-0
                                                        • Opcode ID: e7507cf6c1eb26cd1e184ccf71d5b1fb944505662aabd0030b9f6755cc00bd84
                                                        • Instruction ID: 7a57908f4c69a359b6e22adcfbb86bc2fe73da2058cb6df2deb6825d9a13994e
                                                        • Opcode Fuzzy Hash: e7507cf6c1eb26cd1e184ccf71d5b1fb944505662aabd0030b9f6755cc00bd84
                                                        • Instruction Fuzzy Hash: 1B11C476500240AFEB11DF15DC85FA6BBACEF04324F08846AED45CB651D774E909CBB5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • SetProcessWorkingSetSize.KERNEL32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 056A2E93
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: ProcessSizeWorking
                                                        • String ID:
                                                        • API String ID: 3584180929-0
                                                        • Opcode ID: e7507cf6c1eb26cd1e184ccf71d5b1fb944505662aabd0030b9f6755cc00bd84
                                                        • Instruction ID: 69310b0479dabeb6d0f20d86d759705cc7500585b805fe7f654d9dcb469ea633
                                                        • Opcode Fuzzy Hash: e7507cf6c1eb26cd1e184ccf71d5b1fb944505662aabd0030b9f6755cc00bd84
                                                        • Instruction Fuzzy Hash: 1311E276500200AFEB11CF10CC85BAAB7ECEF44324F08846AED04CB651D374A949CAB1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0151BC52
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: 4d26088ea1fab4411c4d9a96286d4fa187f6e912929b6ae5b4895c594f54f65b
                                                        • Instruction ID: dbdd7f4091c661c555e9f0379d56e902205ff14b04a2d1f6e4d09b37ae9e05d8
                                                        • Opcode Fuzzy Hash: 4d26088ea1fab4411c4d9a96286d4fa187f6e912929b6ae5b4895c594f54f65b
                                                        • Instruction Fuzzy Hash: 61219371409380AFDB228F55DC44A56FFF4EF4A220F0988DAE9858F162C375A819CB61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetExitCodeProcess.KERNEL32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 0151B6C4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: CodeExitProcess
                                                        • String ID:
                                                        • API String ID: 3861947596-0
                                                        • Opcode ID: 727d82a3151fb5ffa8d1188f637d6144275b139863198a74ab5a834b63b44924
                                                        • Instruction ID: 87fbbccc6d61b787298b6459cb168e14007e35695ab678f8efb132a482dc21db
                                                        • Opcode Fuzzy Hash: 727d82a3151fb5ffa8d1188f637d6144275b139863198a74ab5a834b63b44924
                                                        • Instruction Fuzzy Hash: 5211A375600204AFEB12CF15DC85BAAB7ECEF44224F0888AAED05DF655D774E508CBB1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • K32EnumProcesses.KERNEL32(?,?,?,6972C739,00000000,?,?,?,?,?,?,?,?,6CD53C58), ref: 0151BAE2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: EnumProcesses
                                                        • String ID:
                                                        • API String ID: 84517404-0
                                                        • Opcode ID: 371def722d6c261d89b61102e7c65d723d5045714c90327aace065164b1cb727
                                                        • Instruction ID: 85d7d1501de86f287b3640ad368da50db3af414f116428944ab176c6ae3030a2
                                                        • Opcode Fuzzy Hash: 371def722d6c261d89b61102e7c65d723d5045714c90327aace065164b1cb727
                                                        • Instruction Fuzzy Hash: 8F117F755053809FDB22CF65DC85B56BFF8EF05220F0984AAE945CF662D274A808CB61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • ReadFile.KERNEL32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 056A094D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: FileRead
                                                        • String ID:
                                                        • API String ID: 2738559852-0
                                                        • Opcode ID: 14d5fd3cb2d9c5009f5b62c86d186403c2492bdf1305efaab70c545c7332fcc8
                                                        • Instruction ID: 4e78d4f05a07f5b26041c763f762847c67f53bb68b6ef6de05201479279fb2ea
                                                        • Opcode Fuzzy Hash: 14d5fd3cb2d9c5009f5b62c86d186403c2492bdf1305efaab70c545c7332fcc8
                                                        • Instruction Fuzzy Hash: 8311C176500200AFEB21CF51DC85FA6FBECEF48324F08885AED459B661D375A509CBB2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • ioctlsocket.WS2_32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 056A2BFF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: ioctlsocket
                                                        • String ID:
                                                        • API String ID: 3577187118-0
                                                        • Opcode ID: 5ce7cc061365125f0df5e991ad36d0038a6dc8437086be8daa01b841b8e648dc
                                                        • Instruction ID: dec305affde107eb954dcd809c794499d7bba80e26f2a44515e6997bcd96346b
                                                        • Opcode Fuzzy Hash: 5ce7cc061365125f0df5e991ad36d0038a6dc8437086be8daa01b841b8e648dc
                                                        • Instruction Fuzzy Hash: A211E37A500200AFEB21CF10CC85FA6FBACEF04324F08885AED059B651D374A909CBB6
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • FindCloseChangeNotification.KERNEL32(?,6972C739,00000000,?,?,?,?,?,?,?,?,6CD53C58), ref: 0151AA14
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: ChangeCloseFindNotification
                                                        • String ID:
                                                        • API String ID: 2591292051-0
                                                        • Opcode ID: 232e428b56d0566720bdf3d8c9eea81b896e92ce0f3523cda8ea4d7c9e3009cd
                                                        • Instruction ID: 6c1e4b5450802593449ec077256c6f580ca3c03ed0155583662fabe70f1a7bf8
                                                        • Opcode Fuzzy Hash: 232e428b56d0566720bdf3d8c9eea81b896e92ce0f3523cda8ea4d7c9e3009cd
                                                        • Instruction Fuzzy Hash: 2F1130714093C06FDB138F25DD45B96BFB4EF46220F0984DAED848F263D275A948DB61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • shutdown.WS2_32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 056A142C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: shutdown
                                                        • String ID:
                                                        • API String ID: 2510479042-0
                                                        • Opcode ID: e7a8465377c3da0224608964b0baf11b96eea33f23d21088413a6d615aa9fd8a
                                                        • Instruction ID: 09a0b5a60693e6eb49b2e2055c11f55b1912d97b163365c07475cd83a7a7df2e
                                                        • Opcode Fuzzy Hash: e7a8465377c3da0224608964b0baf11b96eea33f23d21088413a6d615aa9fd8a
                                                        • Instruction Fuzzy Hash: B411C276500204AFEB11CF15DC85FA6BBACEF45724F088496ED449F751D374A909CAB2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • SetErrorMode.KERNEL32(?,6972C739,00000000,?,?,?,?,?,?,?,?,6CD53C58), ref: 0151A330
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode
                                                        • String ID:
                                                        • API String ID: 2340568224-0
                                                        • Opcode ID: f45ea80f8aeff3d13c19eb4fe0042a68339841869fed3637c3995659a8c1cd61
                                                        • Instruction ID: caec3022185be0c2e0d4cbc208adf1c5f127ade1a9de934ecea7959d592cc1c1
                                                        • Opcode Fuzzy Hash: f45ea80f8aeff3d13c19eb4fe0042a68339841869fed3637c3995659a8c1cd61
                                                        • Instruction Fuzzy Hash: 77116D7540A3C06FEB138B159C54B62BFB4AF47220F0880CAED848F263C265A918D772
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • LoadLibraryA.KERNEL32(?,00000E24), ref: 056A1C87
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: 43c98e3e6623a5860354fde22f983971577fb1e22d862b09bb95c95d2e2490c0
                                                        • Instruction ID: 4ac01095a124ff27d05fbc6701fdaaa12c837472ccb45d6668e7354b2599381a
                                                        • Opcode Fuzzy Hash: 43c98e3e6623a5860354fde22f983971577fb1e22d862b09bb95c95d2e2490c0
                                                        • Instruction Fuzzy Hash: 2811E576504200AEFB20CF11DD85FB6F7ACDF05724F148499ED058B792D3B9A909CAB6
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: select
                                                        • String ID:
                                                        • API String ID: 1274211008-0
                                                        • Opcode ID: 7e2fbd33f41e315ed6e56e18367d0eb7ff81b75cee54816bbff0cfe41e011240
                                                        • Instruction ID: 983769583512bc0f7612e3b27f1ddd1ac19f4128ef4046f278ea6cf7d7609ed0
                                                        • Opcode Fuzzy Hash: 7e2fbd33f41e315ed6e56e18367d0eb7ff81b75cee54816bbff0cfe41e011240
                                                        • Instruction Fuzzy Hash: C711287A5442409FEB60CF55D884BA6FBE8EF04610F0884AADD4ACB762D335E949CF71
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: send
                                                        • String ID:
                                                        • API String ID: 2809346765-0
                                                        • Opcode ID: c74557831ebcd74893dacfddaf8011caad804ded8650a862714ca9cfd8579520
                                                        • Instruction ID: 0a26cf02a74ac2050900a1de7fc29737fc673ec269d10e21836187b81fbd3780
                                                        • Opcode Fuzzy Hash: c74557831ebcd74893dacfddaf8011caad804ded8650a862714ca9cfd8579520
                                                        • Instruction Fuzzy Hash: 33119175409380AFDB22CF15DD44B56FFB4EF46224F0888DAED848F663C275A918DB61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 0151B226
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: LookupPrivilegeValue
                                                        • String ID:
                                                        • API String ID: 3899507212-0
                                                        • Opcode ID: 3717ce79c0528c7ac76abce04f3db6ff5c59dc820897832789d9a6d82520ab99
                                                        • Instruction ID: bd5ef41c02cb6f6ffb6399a02a2076489e5c84b48c6707e6800a4cbb3d7cd453
                                                        • Opcode Fuzzy Hash: 3717ce79c0528c7ac76abce04f3db6ff5c59dc820897832789d9a6d82520ab99
                                                        • Instruction Fuzzy Hash: D51182755002409FEB11CF19D885B9AFBE8EF04710F0884AADD55CF756D274E408CA61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetFileType.KERNEL32(?,00000E24,6972C739,00000000,00000000,00000000,00000000), ref: 056A0681
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: FileType
                                                        • String ID:
                                                        • API String ID: 3081899298-0
                                                        • Opcode ID: 317fa0b3e6fdbbe8c898f14e30ea65a420e915a0e6a074156a067fc44b963b30
                                                        • Instruction ID: bec272832489989e4a9b9ecfd4d05ca9ff09231e0421c397d85933c4886faa64
                                                        • Opcode Fuzzy Hash: 317fa0b3e6fdbbe8c898f14e30ea65a420e915a0e6a074156a067fc44b963b30
                                                        • Instruction Fuzzy Hash: AC01D676500200AEEB20CF12DC89FA6F7ACDF84728F088096ED048B751D374E948CEB6
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • WaitForInputIdle.USER32(?,?), ref: 0151A96F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: IdleInputWait
                                                        • String ID:
                                                        • API String ID: 2200289081-0
                                                        • Opcode ID: 494d340ae0045f90614ac945cefa204762a1888b50c60dfb4f593e7640f9fa61
                                                        • Instruction ID: 1ea8fa6ae5fd0b83010a00da1b21dcebb20bed50e91da88bde66ef8705a9d3b9
                                                        • Opcode Fuzzy Hash: 494d340ae0045f90614ac945cefa204762a1888b50c60dfb4f593e7640f9fa61
                                                        • Instruction Fuzzy Hash: 1211A075409380AFDB12CF15DC85B56FFB4EF46220F0984DAED848F263D275A848CB62
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • K32EnumProcesses.KERNEL32(?,?,?,6972C739,00000000,?,?,?,?,?,?,?,?,6CD53C58), ref: 0151BAE2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: EnumProcesses
                                                        • String ID:
                                                        • API String ID: 84517404-0
                                                        • Opcode ID: 5a4875138c4c85690c11c6b03ee9960d8a06ee4bcc9d1b773843d395a5742dc5
                                                        • Instruction ID: c0d02a34460f494476f58cb60904133e3d500dc09b4d2106654b25bc68c86b56
                                                        • Opcode Fuzzy Hash: 5a4875138c4c85690c11c6b03ee9960d8a06ee4bcc9d1b773843d395a5742dc5
                                                        • Instruction Fuzzy Hash: 821161765002449FEB21CF19D885B6AFBE4FF04221F0884AADD49CF656D375E458CF61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 056A18BE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: Connect
                                                        • String ID:
                                                        • API String ID: 3144859779-0
                                                        • Opcode ID: ebbf64e5d1b43fc3a0dcf9a50cf41f2d15945bc552f91598bca8d449b34dd05d
                                                        • Instruction ID: 0a060973f74c47d017dc7d5827ebb5bc5abaa80f82293038076113e7734870d9
                                                        • Opcode Fuzzy Hash: ebbf64e5d1b43fc3a0dcf9a50cf41f2d15945bc552f91598bca8d449b34dd05d
                                                        • Instruction Fuzzy Hash: 55118E365003409FEB61CF55D884B66FBE5FF09310F0889AAED858BA62D371E819DF61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • SetFileAttributesW.KERNEL32(?,?,6972C739,00000000,?,?,?,?,?,?,?,?,6CD53C58), ref: 0151AAC3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: AttributesFile
                                                        • String ID:
                                                        • API String ID: 3188754299-0
                                                        • Opcode ID: 50be6a5db49ef940693af169b8d4da690aa11aa649dd0b1265dd547aa5bbafd5
                                                        • Instruction ID: 0717f905d147e6015928e9a4ff6272818c8f75cdc66706eddc0f555fe1f0cf5a
                                                        • Opcode Fuzzy Hash: 50be6a5db49ef940693af169b8d4da690aa11aa649dd0b1265dd547aa5bbafd5
                                                        • Instruction Fuzzy Hash: 770192765012809FEB12CF19D98576AFBE8EF04220F0888AADD45CF756D374E848CBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetVolumeInformationA.KERNEL32(?,00000E24,?,?), ref: 056A19E2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: InformationVolume
                                                        • String ID:
                                                        • API String ID: 2039140958-0
                                                        • Opcode ID: ca87c4ae47a227109d8cc0518740ff43a31dfa493326bafdad1df3c2a674ab83
                                                        • Instruction ID: ebff6ea6a2dfe464bee4bcb35dd427f1ec777b53c7807c916d8481afce54a5a6
                                                        • Opcode Fuzzy Hash: ca87c4ae47a227109d8cc0518740ff43a31dfa493326bafdad1df3c2a674ab83
                                                        • Instruction Fuzzy Hash: 1A01B171600200AFD310DF16CC46B76FBE8EB88A20F14816AEC089B741D731F916CBE2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0151BC52
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: 6dd031cd4f20b68f2bba2da2ff0636f70f8c6c4bf7861e6cb8c13b2eb0fb272d
                                                        • Instruction ID: 857425fb32871ca047bdde5b474d5fe590aafb0dddaf4ec5b89a305110f1c63c
                                                        • Opcode Fuzzy Hash: 6dd031cd4f20b68f2bba2da2ff0636f70f8c6c4bf7861e6cb8c13b2eb0fb272d
                                                        • Instruction Fuzzy Hash: C501A1364002409FEB228F55D885B56FBF0FF08314F08889ADD454F666C331E418DF61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • FindCloseChangeNotification.KERNEL32(?,6972C739,00000000,?,?,?,?,?,?,?,?,6CD53C58), ref: 0151B4FC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: ChangeCloseFindNotification
                                                        • String ID:
                                                        • API String ID: 2591292051-0
                                                        • Opcode ID: 2543dfee97ee24ef2f1ff2dad25ce5e7a063237abeb0dede6bfc72e4f059dadc
                                                        • Instruction ID: 779a53e3375dfa3940c4346576b2efb557d93c467d02dd8b8bea17be0b5e34b3
                                                        • Opcode Fuzzy Hash: 2543dfee97ee24ef2f1ff2dad25ce5e7a063237abeb0dede6bfc72e4f059dadc
                                                        • Instruction Fuzzy Hash: BF01DF765002408FEB11CF19E885B56FBE4EF04320F08C4AADC498F766D274E408CAB2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • FindCloseChangeNotification.KERNEL32(?,6972C739,00000000,?,?,?,?,?,?,?,?,6CD53C58), ref: 0151A780
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: ChangeCloseFindNotification
                                                        • String ID:
                                                        • API String ID: 2591292051-0
                                                        • Opcode ID: bde4d0934cbfd1999335abd81aaa0511bb7894777370dbaff5066f4fa8f5082e
                                                        • Instruction ID: 6ab705c9d1e6b48c1d0334d63c3bec105b1743e23dbdd9461880a7b3fc43f00f
                                                        • Opcode Fuzzy Hash: bde4d0934cbfd1999335abd81aaa0511bb7894777370dbaff5066f4fa8f5082e
                                                        • Instruction Fuzzy Hash: 0F018F755012809FEB128F59D985766FBE4EF04220F08C8ABDD4A8F756D375E508CAA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • RegQueryValueExW.KERNEL32(?,00000E24,?,?), ref: 056A0B0A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4526953476.00000000056A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056A0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_56a0000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: QueryValue
                                                        • String ID:
                                                        • API String ID: 3660427363-0
                                                        • Opcode ID: 5d18b110b103aa19b440080848da6782f850ca278988ee6d360d34cdb97c317e
                                                        • Instruction ID: 1e8c672a94cdd38ff7faac5997372b384d431e08bfe3af11d72b89d666a102fe
                                                        • Opcode Fuzzy Hash: 5d18b110b103aa19b440080848da6782f850ca278988ee6d360d34cdb97c317e
                                                        • Instruction Fuzzy Hash: F8016271600600ABD210DF16DD46B76FBE8FB88A20F14815AED089BB41D775F916CBE6
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: send
                                                        • String ID:
                                                        • API String ID: 2809346765-0
                                                        • Opcode ID: fe6d5e08d3a65d88167739d711b9f4c571fb27354e6d862e0dfd1f59c417117b
                                                        • Instruction ID: bf248b2e1edbbb2472427e364708434b7c5e763a1e2c53482ccf15ea3f56712a
                                                        • Opcode Fuzzy Hash: fe6d5e08d3a65d88167739d711b9f4c571fb27354e6d862e0dfd1f59c417117b
                                                        • Instruction Fuzzy Hash: 11019E754002809FEB22CF55D985B55FBE4FF04224F08889ADD498F656D375E418CBA2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • WaitForInputIdle.USER32(?,?), ref: 0151A96F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: IdleInputWait
                                                        • String ID:
                                                        • API String ID: 2200289081-0
                                                        • Opcode ID: 49adde1f0f6ba94c63c1ab1bc4a95cf1c6345fdd23757cba4a6d64f41ade7e3f
                                                        • Instruction ID: 4fc08fae76b0247ed6a3439fefc2d8fcbce099e261f8bbe6a692dd6515dd7735
                                                        • Opcode Fuzzy Hash: 49adde1f0f6ba94c63c1ab1bc4a95cf1c6345fdd23757cba4a6d64f41ade7e3f
                                                        • Instruction Fuzzy Hash: BF01A2798052809FEB12CF15D885B65FBE4EF44220F0CC8AADD488F356D375E448CBA2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • FindCloseChangeNotification.KERNEL32(?,6972C739,00000000,?,?,?,?,?,?,?,?,6CD53C58), ref: 0151AA14
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: ChangeCloseFindNotification
                                                        • String ID:
                                                        • API String ID: 2591292051-0
                                                        • Opcode ID: 04ff1ec308193b24de5f5eb996a5d55ec79b1d62782696662db7a7f3438160b0
                                                        • Instruction ID: 99b3522993debd289e152aad3ca97da0b3d9e16ca7a611b9276dd7d28d3c11e7
                                                        • Opcode Fuzzy Hash: 04ff1ec308193b24de5f5eb996a5d55ec79b1d62782696662db7a7f3438160b0
                                                        • Instruction Fuzzy Hash: 3201D6764012809FEB12CF15D985755FBE4EF04220F0CC8AADD498F756D3B5E408CAA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • SetErrorMode.KERNEL32(?,6972C739,00000000,?,?,?,?,?,?,?,?,6CD53C58), ref: 0151A330
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524895985.000000000151A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode
                                                        • String ID:
                                                        • API String ID: 2340568224-0
                                                        • Opcode ID: e3cc9458cbf51fc78e6addb1e78ca7c45e9b55569c2fa7f76e4e4f4aebc09e79
                                                        • Instruction ID: 973082cf5afa451d4dc687bf51ec9f73006ded17c8ee6bf9bff0d07dc5ed0836
                                                        • Opcode Fuzzy Hash: e3cc9458cbf51fc78e6addb1e78ca7c45e9b55569c2fa7f76e4e4f4aebc09e79
                                                        • Instruction Fuzzy Hash: 99F0AF39805280DFEB128F09D885765FBE4EF04325F4CC49ADD494F756D3B5E408CAA2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4525212653.0000000001640000.00000040.00000020.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1640000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2ab14678e59a43247b8fd1afdd1e79c34719a6bab38792fa826a11a8648d0a34
                                                        • Instruction ID: 3c8c0f1add7d2bad32409f4f4c494251521c6c0e7ba72422a3a23954ef4a533f
                                                        • Opcode Fuzzy Hash: 2ab14678e59a43247b8fd1afdd1e79c34719a6bab38792fa826a11a8648d0a34
                                                        • Instruction Fuzzy Hash: 3021B0351093C0DFD717CB10C950B95BFB1EB4A618F1989EEE5858B793C73A9806CB51
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4527377932.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5d20000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f203abe215e2d4beec14ca57d55ced2fed0afdbd38d7a0c12767bff8f9b571cf
                                                        • Instruction ID: 73ebb3fffd98df1f8708beff87a65c79948cef7ea7b69ed2342abb718322c356
                                                        • Opcode Fuzzy Hash: f203abe215e2d4beec14ca57d55ced2fed0afdbd38d7a0c12767bff8f9b571cf
                                                        • Instruction Fuzzy Hash: 8B11B8B5908341AFD740CF19D880A5BFBE4FB98664F04895EF99897311D335EA188FA2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4525212653.0000000001640000.00000040.00000020.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1640000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5bfdb5ba8c559f0e3b905397c6d7f00c2dc542037f84e76155d8691e592a2f92
                                                        • Instruction ID: 7bcaafc765e617530e73aff869341482ab41587a98d21f5c14888576c1e7c029
                                                        • Opcode Fuzzy Hash: 5bfdb5ba8c559f0e3b905397c6d7f00c2dc542037f84e76155d8691e592a2f92
                                                        • Instruction Fuzzy Hash: 2911B435208240EFE715CB14C940B66FBA5AB89718F28D99CFA494B753C777D813C651
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524939498.000000000152A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_152a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: adc5255b00129aaab63a45a11d3a57d11f2b4ec8850158cb4972e8151644fa14
                                                        • Instruction ID: 2497431bba32497591968cc790ee3d80ee256e37234395b0b83253d2a8e58687
                                                        • Opcode Fuzzy Hash: adc5255b00129aaab63a45a11d3a57d11f2b4ec8850158cb4972e8151644fa14
                                                        • Instruction Fuzzy Hash: 3811FAB5908301AFD750CF09DC80E5BFBE8EB98660F04891EF95897311D335E9188FA2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4525212653.0000000001640000.00000040.00000020.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1640000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 78170675cefd216a03f7d10eb5833fb4d511e3ce818b63b4c60826651dc0eb69
                                                        • Instruction ID: 27e69b41b22c7fcc0236e67f9dafe02b0dc4d0c98257f3e8e802f9802123ac91
                                                        • Opcode Fuzzy Hash: 78170675cefd216a03f7d10eb5833fb4d511e3ce818b63b4c60826651dc0eb69
                                                        • Instruction Fuzzy Hash: 5301A2B550D3806FD7128F06AC44862FFB8DF8622070984EFEC498B652D235A908CBB6
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4525212653.0000000001640000.00000040.00000020.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1640000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8bf77a17c3e8da0c4cb46b30df8c31357310a763e4aa26229cc1396c023fce79
                                                        • Instruction ID: 1130535ff7f0fd778c4c9a13f8f81313522d15793614a37ee293e0479fb5dac5
                                                        • Opcode Fuzzy Hash: 8bf77a17c3e8da0c4cb46b30df8c31357310a763e4aa26229cc1396c023fce79
                                                        • Instruction Fuzzy Hash: 10F01D35108645DFC306CF04D940B55FBA2FB89718F24CAADE94907B52C737E813DA81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4525212653.0000000001640000.00000040.00000020.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1640000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cfd3955506a10960d0500d7b159067190ab7a4f7bda7f8b73e9f51c681b47a56
                                                        • Instruction ID: 81bbaff1c1a1440213f7813bf32229b22e82b08b78fadda689f3b357c3191daa
                                                        • Opcode Fuzzy Hash: cfd3955506a10960d0500d7b159067190ab7a4f7bda7f8b73e9f51c681b47a56
                                                        • Instruction Fuzzy Hash: A1E092B66006004B9650CF0BEC81452F7E8EB88630B08C07FDC0D8BB11D235B508CAA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4527377932.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5d20000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 14ca3e45e37cc48bbf5066a1fe9b98ea4d0ad20989e1ed9ae340bf2e97ee344e
                                                        • Instruction ID: c61faf69b18b62a33f43ac6d7589bbf3199c47b57e29b5fd015cdfc619101f55
                                                        • Opcode Fuzzy Hash: 14ca3e45e37cc48bbf5066a1fe9b98ea4d0ad20989e1ed9ae340bf2e97ee344e
                                                        • Instruction Fuzzy Hash: 69E0D8B255020067D6109F069C45F52FB98DB94931F08C467ED081B741E275B51489F1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4527377932.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_5d20000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 818f9acf12254fcf91cc09f7b4af3dca8bff998489b8eec3bbef1199e4ec5a9e
                                                        • Instruction ID: 8b16e4607eceddc6d75e5d5a81447fe9446cf4678a9518e9c7af6782a2f592e5
                                                        • Opcode Fuzzy Hash: 818f9acf12254fcf91cc09f7b4af3dca8bff998489b8eec3bbef1199e4ec5a9e
                                                        • Instruction Fuzzy Hash: 0FE0D8B251020067D6109F069C45F53FB98DB94931F08C457ED081B701E276B514C9F1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524939498.000000000152A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_152a000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d1d7b135d76e514a84cb5ed9a6d4df0c0e81eed2e5c0365d45dc1fb267666155
                                                        • Instruction ID: feca9d76d2d9e8514444880e5815c95e80fdf6ca83cc7d1b7f3cf4c338430511
                                                        • Opcode Fuzzy Hash: d1d7b135d76e514a84cb5ed9a6d4df0c0e81eed2e5c0365d45dc1fb267666155
                                                        • Instruction Fuzzy Hash: 32E020B254020467D6109F06AC45F53F79CDB54931F08C557ED081F711E275B514CAF1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524880250.0000000001512000.00000040.00000800.00020000.00000000.sdmp, Offset: 01512000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1512000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4205279257610a071ed83d4e415bfd2803fc22e41fe2bd873c433a538709fb5a
                                                        • Instruction ID: 3e45bda907b4766363a085b0cfa2401b46551a7cc3fad310c3c7fe4b28f2c43f
                                                        • Opcode Fuzzy Hash: 4205279257610a071ed83d4e415bfd2803fc22e41fe2bd873c433a538709fb5a
                                                        • Instruction Fuzzy Hash: E3D02E792426C04FF3139B0CC1A4B893BE4BB40704F4A00F9A8008F777C7A8E4C0C200
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.4524880250.0000000001512000.00000040.00000800.00020000.00000000.sdmp, Offset: 01512000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1512000_xdPdkPMD8u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2e33f493df87d8eddb4c13e57fa428c914ffba81cccf337283d5e18b2ff347e3
                                                        • Instruction ID: 41363d08cfac8dac04a171a109a6e3f5f44ed5fe5fb61512a192ff925b67e79a
                                                        • Opcode Fuzzy Hash: 2e33f493df87d8eddb4c13e57fa428c914ffba81cccf337283d5e18b2ff347e3
                                                        • Instruction Fuzzy Hash: C0D05E342012814FEB16DB0CC6D4F9D3BD4BB44715F1644E8AC108F766C7A4E8C0DA00
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%