Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
QsKtlzYaKF.exe

Overview

General Information

Sample Name:QsKtlzYaKF.exe
Original Sample Name:85AA59199316A48AE26E32A9A674D2AE.exe
Analysis ID:1352747
MD5:85aa59199316a48ae26e32a9a674d2ae
SHA1:e7ebf981bc84c76fdb0f7b77f4067212ff70421d
SHA256:04009681685f9366286233d718166ff7de75c6149aba12fb4e913daa52ffb445
Tags:exenjratRAT
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: Drops fake system file at system root drive
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Njrat
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Uses netsh to modify the Windows network and firewall settings
Drops PE files to the startup folder
Protects its processes via BreakOnTermination flag
.NET source code references suspicious native API functions
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
.NET source code contains potential unpacker
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates autostart registry keys with suspicious names
Modifies the windows firewall
Creates autorun.inf (USB autostart)
Drops PE files with benign system names
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
May infect USB drives
Internet Provider seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Contains functionality to call native functions
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a start menu entry (Start Menu\Programs\Startup)

Classification

  • System is w10x64
  • QsKtlzYaKF.exe (PID: 6856 cmdline: C:\Users\user\Desktop\QsKtlzYaKF.exe MD5: 85AA59199316A48AE26E32A9A674D2AE)
    • netsh.exe (PID: 7044 cmdline: netsh firewall add allowedprogram "C:\Users\user\Desktop\QsKtlzYaKF.exe" "QsKtlzYaKF.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
      • conhost.exe (PID: 7072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • QsKtlzYaKF.exe (PID: 4284 cmdline: "C:\Users\user\Desktop\QsKtlzYaKF.exe" .. MD5: 85AA59199316A48AE26E32A9A674D2AE)
  • QsKtlzYaKF.exe (PID: 6184 cmdline: "C:\Users\user\Desktop\QsKtlzYaKF.exe" .. MD5: 85AA59199316A48AE26E32A9A674D2AE)
  • QsKtlzYaKF.exe (PID: 1608 cmdline: "C:\Users\user\Desktop\QsKtlzYaKF.exe" .. MD5: 85AA59199316A48AE26E32A9A674D2AE)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Host": "6.tcp.eu.ngrok.io", "Port": "19220", "Version": "im523", "Campaign ID": "mark", "Install Name": "server.exe", "Install Dir": "TEMP"}
SourceRuleDescriptionAuthorStrings
QsKtlzYaKF.exeJoeSecurity_NjratYara detected NjratJoe Security
    QsKtlzYaKF.exeWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0x64c1:$a1: get_Registry
    • 0x7efc:$a3: Download ERROR
    • 0x81ee:$a5: netsh firewall delete allowedprogram "
    QsKtlzYaKF.exenjrat1Identify njRatBrian Wallace @botnet_hunter
    • 0x80e4:$a1: netsh firewall add allowedprogram
    • 0x82de:$b1: [TAP]
    • 0x8284:$b2: & exit
    • 0x8250:$c1: md.exe /k ping 0 & del
    QsKtlzYaKF.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
    • 0x81ee:$s1: netsh firewall delete allowedprogram
    • 0x80e4:$s2: netsh firewall add allowedprogram
    • 0x824e:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
    • 0x7ed8:$s4: Execute ERROR
    • 0x7f38:$s4: Execute ERROR
    • 0x7efc:$s5: Download ERROR
    • 0x8294:$s6: [kl]
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exeJoeSecurity_NjratYara detected NjratJoe Security
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exeWindows_Trojan_Njrat_30f3c220unknownunknown
      • 0x64c1:$a1: get_Registry
      • 0x7efc:$a3: Download ERROR
      • 0x81ee:$a5: netsh firewall delete allowedprogram "
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exenjrat1Identify njRatBrian Wallace @botnet_hunter
      • 0x80e4:$a1: netsh firewall add allowedprogram
      • 0x82de:$b1: [TAP]
      • 0x8284:$b2: & exit
      • 0x8250:$c1: md.exe /k ping 0 & del
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
      • 0x81ee:$s1: netsh firewall delete allowedprogram
      • 0x80e4:$s2: netsh firewall add allowedprogram
      • 0x824e:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
      • 0x7ed8:$s4: Execute ERROR
      • 0x7f38:$s4: Execute ERROR
      • 0x7efc:$s5: Download ERROR
      • 0x8294:$s6: [kl]
      C:\svchost.exeJoeSecurity_NjratYara detected NjratJoe Security
        Click to see the 3 entries
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.1657947199.0000000000E32000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
          00000000.00000000.1657947199.0000000000E32000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
          • 0x62c1:$a1: get_Registry
          • 0x7cfc:$a3: Download ERROR
          • 0x7fee:$a5: netsh firewall delete allowedprogram "
          00000000.00000000.1657947199.0000000000E32000.00000002.00000001.01000000.00000003.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
          • 0x7ee4:$a1: netsh firewall add allowedprogram
          • 0x80de:$b1: [TAP]
          • 0x8084:$b2: & exit
          • 0x8050:$c1: md.exe /k ping 0 & del
          00000000.00000002.4110826869.00000000033F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
            Process Memory Space: QsKtlzYaKF.exe PID: 6856JoeSecurity_NjratYara detected NjratJoe Security
              SourceRuleDescriptionAuthorStrings
              0.0.QsKtlzYaKF.exe.e30000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
                0.0.QsKtlzYaKF.exe.e30000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
                • 0x64c1:$a1: get_Registry
                • 0x7efc:$a3: Download ERROR
                • 0x81ee:$a5: netsh firewall delete allowedprogram "
                0.0.QsKtlzYaKF.exe.e30000.0.unpacknjrat1Identify njRatBrian Wallace @botnet_hunter
                • 0x80e4:$a1: netsh firewall add allowedprogram
                • 0x82de:$b1: [TAP]
                • 0x8284:$b2: & exit
                • 0x8250:$c1: md.exe /k ping 0 & del
                0.0.QsKtlzYaKF.exe.e30000.0.unpackMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
                • 0x81ee:$s1: netsh firewall delete allowedprogram
                • 0x80e4:$s2: netsh firewall add allowedprogram
                • 0x824e:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
                • 0x7ed8:$s4: Execute ERROR
                • 0x7f38:$s4: Execute ERROR
                • 0x7efc:$s5: Download ERROR
                • 0x8294:$s6: [kl]

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\QsKtlzYaKF.exe, ProcessId: 6856, TargetFilename: C:\svchost.exe
                Timestamp:192.168.2.452.28.247.25549739192202814860 12/03/23-20:22:51.251780
                SID:2814860
                Source Port:49739
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.66.38.11749746192202033132 12/03/23-20:24:22.591862
                SID:2033132
                Source Port:49746
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.157.22049730192202825563 12/03/23-20:21:23.688164
                SID:2825563
                Source Port:49730
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.157.22049729192202814856 12/03/23-20:21:17.448214
                SID:2814856
                Source Port:49729
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.66.38.11749748192202825564 12/03/23-20:25:13.193068
                SID:2825564
                Source Port:49748
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.66.38.11749748192202825563 12/03/23-20:24:57.283768
                SID:2825563
                Source Port:49748
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549739192202033132 12/03/23-20:22:42.761128
                SID:2033132
                Source Port:49739
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.66.38.11749747192202825563 12/03/23-20:24:37.860433
                SID:2825563
                Source Port:49747
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.66.38.11749746192202825563 12/03/23-20:24:22.776536
                SID:2825563
                Source Port:49746
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.66.38.11749746192202825564 12/03/23-20:24:29.426575
                SID:2825564
                Source Port:49746
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.157.22049737192202033132 12/03/23-20:22:05.018671
                SID:2033132
                Source Port:49737
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549741192202825563 12/03/23-20:23:14.946007
                SID:2825563
                Source Port:49741
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549740192202825563 12/03/23-20:22:53.706955
                SID:2825563
                Source Port:49740
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549742192202825563 12/03/23-20:23:26.344895
                SID:2825563
                Source Port:49742
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549740192202825564 12/03/23-20:22:59.051727
                SID:2825564
                Source Port:49740
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549742192202825564 12/03/23-20:23:30.911166
                SID:2825564
                Source Port:49742
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.157.22049729192202033132 12/03/23-20:21:17.262929
                SID:2033132
                Source Port:49729
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549743192202825563 12/03/23-20:23:37.605690
                SID:2825563
                Source Port:49743
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.115.17849744192202825564 12/03/23-20:24:02.368608
                SID:2825564
                Source Port:49744
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.115.17849744192202825563 12/03/23-20:23:48.158065
                SID:2825563
                Source Port:49744
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.157.22049729192202825563 12/03/23-20:21:17.448214
                SID:2825563
                Source Port:49729
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549743192202825564 12/03/23-20:23:40.973464
                SID:2825564
                Source Port:49743
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.115.17849745192202825563 12/03/23-20:24:12.746923
                SID:2825563
                Source Port:49745
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.157.22049737192202825564 12/03/23-20:22:34.323672
                SID:2825564
                Source Port:49737
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.115.17849745192202825564 12/03/23-20:24:13.178120
                SID:2825564
                Source Port:49745
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.157.22049737192202825563 12/03/23-20:22:05.210462
                SID:2825563
                Source Port:49737
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549741192202825564 12/03/23-20:23:15.348399
                SID:2825564
                Source Port:49741
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.157.22049737192202814856 12/03/23-20:22:05.210462
                SID:2814856
                Source Port:49737
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.66.38.11749748192202814856 12/03/23-20:24:57.283768
                SID:2814856
                Source Port:49748
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549743192202814856 12/03/23-20:23:37.605690
                SID:2814856
                Source Port:49743
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549742192202814856 12/03/23-20:23:26.344895
                SID:2814856
                Source Port:49742
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.157.22049730192202814856 12/03/23-20:21:23.688164
                SID:2814856
                Source Port:49730
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549741192202814856 12/03/23-20:23:14.946007
                SID:2814856
                Source Port:49741
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549740192202814856 12/03/23-20:22:53.706955
                SID:2814856
                Source Port:49740
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.66.38.11749747192202814856 12/03/23-20:24:37.860433
                SID:2814856
                Source Port:49747
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.115.17849744192202814860 12/03/23-20:24:03.120602
                SID:2814860
                Source Port:49744
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.115.17849745192202814860 12/03/23-20:24:13.178120
                SID:2814860
                Source Port:49745
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.115.17849745192202033132 12/03/23-20:24:12.557531
                SID:2033132
                Source Port:49745
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.157.22049737192202814860 12/03/23-20:22:39.270213
                SID:2814860
                Source Port:49737
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.66.38.11749746192202814856 12/03/23-20:24:22.776536
                SID:2814856
                Source Port:49746
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549742192202033132 12/03/23-20:23:26.153978
                SID:2033132
                Source Port:49742
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549743192202033132 12/03/23-20:23:37.416476
                SID:2033132
                Source Port:49743
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549739192202814856 12/03/23-20:22:43.464095
                SID:2814856
                Source Port:49739
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549740192202033132 12/03/23-20:22:53.517449
                SID:2033132
                Source Port:49740
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.115.17849744192202033132 12/03/23-20:23:47.970103
                SID:2033132
                Source Port:49744
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.66.38.11749746192202814860 12/03/23-20:24:29.426575
                SID:2814860
                Source Port:49746
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.115.17849744192202814856 12/03/23-20:23:48.158065
                SID:2814856
                Source Port:49744
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.115.17849745192202814856 12/03/23-20:24:12.746923
                SID:2814856
                Source Port:49745
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549740192202814860 12/03/23-20:22:59.051727
                SID:2814860
                Source Port:49740
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549742192202814860 12/03/23-20:23:30.911166
                SID:2814860
                Source Port:49742
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.66.38.11749747192202033132 12/03/23-20:24:37.669337
                SID:2033132
                Source Port:49747
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549743192202814860 12/03/23-20:23:40.973464
                SID:2814860
                Source Port:49743
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549741192202033132 12/03/23-20:23:14.759488
                SID:2033132
                Source Port:49741
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.66.38.11749748192202033132 12/03/23-20:24:57.092638
                SID:2033132
                Source Port:49748
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.69.157.22049730192202033132 12/03/23-20:21:23.501095
                SID:2033132
                Source Port:49730
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.452.28.247.25549741192202814860 12/03/23-20:23:15.348399
                SID:2814860
                Source Port:49741
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.66.38.11749748192202814860 12/03/23-20:25:13.193068
                SID:2814860
                Source Port:49748
                Destination Port:19220
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000000.00000000.1657947199.0000000000E32000.00000002.00000001.01000000.00000003.sdmpMalware Configuration Extractor: Njrat {"Host": "6.tcp.eu.ngrok.io", "Port": "19220", "Version": "im523", "Campaign ID": "mark", "Install Name": "server.exe", "Install Dir": "TEMP"}
                Source: QsKtlzYaKF.exeVirustotal: Detection: 80%Perma Link
                Source: QsKtlzYaKF.exeReversingLabs: Detection: 86%
                Source: Yara matchFile source: QsKtlzYaKF.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.QsKtlzYaKF.exe.e30000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1657947199.0000000000E32000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4110826869.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: QsKtlzYaKF.exe PID: 6856, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe, type: DROPPED
                Source: Yara matchFile source: C:\svchost.exe, type: DROPPED
                Source: QsKtlzYaKF.exeAvira: detected
                Source: 6.tcp.eu.ngrok.ioAvira URL Cloud: Label: malware
                Source: 6.tcp.eu.ngrok.ioVirustotal: Detection: 11%Perma Link
                Source: 6.tcp.eu.ngrok.ioVirustotal: Detection: 11%Perma Link
                Source: C:\svchost.exeAvira: detection malicious, Label: TR/ATRAPS.Gen
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exeAvira: detection malicious, Label: TR/ATRAPS.Gen
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exeReversingLabs: Detection: 86%
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exeVirustotal: Detection: 80%Perma Link
                Source: C:\svchost.exeReversingLabs: Detection: 86%
                Source: C:\svchost.exeVirustotal: Detection: 80%Perma Link
                Source: QsKtlzYaKF.exeJoe Sandbox ML: detected
                Source: C:\svchost.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exeJoe Sandbox ML: detected
                Source: QsKtlzYaKF.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
                Source: QsKtlzYaKF.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Spreading

                barindex
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeFile created: C:\autorun.infJump to behavior
                Source: QsKtlzYaKF.exe, 00000000.00000000.1657947199.0000000000E32000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: autorun.inf
                Source: QsKtlzYaKF.exe, 00000000.00000000.1657947199.0000000000E32000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: [autorun]
                Source: QsKtlzYaKF.exe, 00000000.00000002.4110826869.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
                Source: QsKtlzYaKF.exe, 00000000.00000002.4110826869.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
                Source: QsKtlzYaKF.exeBinary or memory string: autorun.inf
                Source: QsKtlzYaKF.exeBinary or memory string: [autorun]
                Source: svchost.exe.0.drBinary or memory string: autorun.inf
                Source: svchost.exe.0.drBinary or memory string: [autorun]
                Source: a502d6936d522819db45a43677dc3f7c.exe.0.drBinary or memory string: autorun.inf
                Source: a502d6936d522819db45a43677dc3f7c.exe.0.drBinary or memory string: [autorun]
                Source: autorun.inf.0.drBinary or memory string: [autorun]

                Networking

                barindex
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49729 -> 3.69.157.220:19220
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49729 -> 3.69.157.220:19220
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49729 -> 3.69.157.220:19220
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49730 -> 3.69.157.220:19220
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49730 -> 3.69.157.220:19220
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49730 -> 3.69.157.220:19220
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49737 -> 3.69.157.220:19220
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49737 -> 3.69.157.220:19220
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49737 -> 3.69.157.220:19220
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49737 -> 3.69.157.220:19220
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49737 -> 3.69.157.220:19220
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49739 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49739 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49739 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49740 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49740 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49740 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49740 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49740 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49741 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49741 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49741 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49741 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49741 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49742 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49742 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49742 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49742 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49742 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49743 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49743 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49743 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49743 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49743 -> 52.28.247.255:19220
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49744 -> 3.69.115.178:19220
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49744 -> 3.69.115.178:19220
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49744 -> 3.69.115.178:19220
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49744 -> 3.69.115.178:19220
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49744 -> 3.69.115.178:19220
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49745 -> 3.69.115.178:19220
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49745 -> 3.69.115.178:19220
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49745 -> 3.69.115.178:19220
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49745 -> 3.69.115.178:19220
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49745 -> 3.69.115.178:19220
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49746 -> 3.66.38.117:19220
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49746 -> 3.66.38.117:19220
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49746 -> 3.66.38.117:19220
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49746 -> 3.66.38.117:19220
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49746 -> 3.66.38.117:19220
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49747 -> 3.66.38.117:19220
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49747 -> 3.66.38.117:19220
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49747 -> 3.66.38.117:19220
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49748 -> 3.66.38.117:19220
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49748 -> 3.66.38.117:19220
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49748 -> 3.66.38.117:19220
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49748 -> 3.66.38.117:19220
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49748 -> 3.66.38.117:19220
                Source: Malware configuration extractorURLs: 6.tcp.eu.ngrok.io
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: Joe Sandbox ViewIP Address: 3.66.38.117 3.66.38.117
                Source: Joe Sandbox ViewIP Address: 52.28.247.255 52.28.247.255
                Source: global trafficTCP traffic: 192.168.2.4:49729 -> 3.69.157.220:19220
                Source: global trafficTCP traffic: 192.168.2.4:49739 -> 52.28.247.255:19220
                Source: global trafficTCP traffic: 192.168.2.4:49744 -> 3.69.115.178:19220
                Source: global trafficTCP traffic: 192.168.2.4:49746 -> 3.66.38.117:19220
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: QsKtlzYaKF.exe, svchost.exe.0.dr, a502d6936d522819db45a43677dc3f7c.exe.0.drString found in binary or memory: https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0
                Source: unknownDNS traffic detected: queries for: 6.tcp.eu.ngrok.io

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: QsKtlzYaKF.exe, kl.cs.Net Code: VKCodeToUnicode
                Source: a502d6936d522819db45a43677dc3f7c.exe.0.dr, kl.cs.Net Code: VKCodeToUnicode
                Source: svchost.exe.0.dr, kl.cs.Net Code: VKCodeToUnicode

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: QsKtlzYaKF.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.QsKtlzYaKF.exe.e30000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1657947199.0000000000E32000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4110826869.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: QsKtlzYaKF.exe PID: 6856, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe, type: DROPPED
                Source: Yara matchFile source: C:\svchost.exe, type: DROPPED

                Operating System Destruction

                barindex
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: 01 00 00 00 Jump to behavior

                System Summary

                barindex
                Source: QsKtlzYaKF.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: QsKtlzYaKF.exe, type: SAMPLEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: QsKtlzYaKF.exe, type: SAMPLEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: 0.0.QsKtlzYaKF.exe.e30000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: 0.0.QsKtlzYaKF.exe.e30000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: 0.0.QsKtlzYaKF.exe.e30000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: 00000000.00000000.1657947199.0000000000E32000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: 00000000.00000000.1657947199.0000000000E32000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: C:\svchost.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: C:\svchost.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: C:\svchost.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: QsKtlzYaKF.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: QsKtlzYaKF.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: QsKtlzYaKF.exe, type: SAMPLEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: QsKtlzYaKF.exe, type: SAMPLEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: 0.0.QsKtlzYaKF.exe.e30000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: 0.0.QsKtlzYaKF.exe.e30000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: 0.0.QsKtlzYaKF.exe.e30000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: 00000000.00000000.1657947199.0000000000E32000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: 00000000.00000000.1657947199.0000000000E32000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: C:\svchost.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: C:\svchost.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: C:\svchost.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeCode function: 0_2_0173BE26 NtSetInformationProcess,0_2_0173BE26
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeCode function: 0_2_0173BE04 NtSetInformationProcess,0_2_0173BE04
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeCode function: 0_2_0576019E NtQuerySystemInformation,0_2_0576019E
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeCode function: 0_2_05760163 NtQuerySystemInformation,0_2_05760163
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess Stats: CPU usage > 49%
                Source: QsKtlzYaKF.exe, 00000000.00000002.4109924762.000000000135E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs QsKtlzYaKF.exe
                Source: QsKtlzYaKF.exeVirustotal: Detection: 80%
                Source: QsKtlzYaKF.exeReversingLabs: Detection: 86%
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeFile read: C:\Users\user\Desktop\QsKtlzYaKF.exeJump to behavior
                Source: QsKtlzYaKF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\QsKtlzYaKF.exe C:\Users\user\Desktop\QsKtlzYaKF.exe
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\Desktop\QsKtlzYaKF.exe" "QsKtlzYaKF.exe" ENABLE
                Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Users\user\Desktop\QsKtlzYaKF.exe "C:\Users\user\Desktop\QsKtlzYaKF.exe" ..
                Source: unknownProcess created: C:\Users\user\Desktop\QsKtlzYaKF.exe "C:\Users\user\Desktop\QsKtlzYaKF.exe" ..
                Source: unknownProcess created: C:\Users\user\Desktop\QsKtlzYaKF.exe "C:\Users\user\Desktop\QsKtlzYaKF.exe" ..
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\Desktop\QsKtlzYaKF.exe" "QsKtlzYaKF.exe" ENABLEJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeCode function: 0_2_0173BAD6 AdjustTokenPrivileges,0_2_0173BAD6
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeCode function: 0_2_0173BA9F AdjustTokenPrivileges,0_2_0173BA9F
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exeJump to behavior
                Source: classification engineClassification label: mal100.spre.troj.adwa.spyw.evad.winEXE@7/7@4/4
                Source: QsKtlzYaKF.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7072:120:WilError_03
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeMutant created: \Sessions\1\BaseNamedObjects\a502d6936d522819db45a43677dc3f7c
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
                Source: QsKtlzYaKF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: QsKtlzYaKF.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: QsKtlzYaKF.exe, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                Source: a502d6936d522819db45a43677dc3f7c.exe.0.dr, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                Source: svchost.exe.0.dr, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])

                Persistence and Installation Behavior

                barindex
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeFile created: C:\svchost.exeJump to dropped file
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeFile created: C:\svchost.exeJump to dropped file
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exeJump to dropped file
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run a502d6936d522819db45a43677dc3f7cJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exeJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe\:Zone.Identifier:$DATAJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exeJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run a502d6936d522819db45a43677dc3f7cJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run a502d6936d522819db45a43677dc3f7cJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run a502d6936d522819db45a43677dc3f7cJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run a502d6936d522819db45a43677dc3f7cJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exe TID: 6880Thread sleep time: -734000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exe TID: 6880Thread sleep time: -4409000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exe TID: 2836Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exe TID: 2696Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exe TID: 6016Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeWindow / User API: threadDelayed 3261Jump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeWindow / User API: threadDelayed 734Jump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeWindow / User API: threadDelayed 4409Jump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeWindow / User API: foregroundWindowGot 426Jump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeWindow / User API: foregroundWindowGot 1272Jump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: netsh.exe, 00000001.00000003.1726236933.0000000000AB2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll[
                Source: QsKtlzYaKF.exe, 00000000.00000002.4109924762.00000000013BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: QsKtlzYaKF.exe, kl.csReference to suspicious API methods: MapVirtualKey(a, 0u)
                Source: QsKtlzYaKF.exe, kl.csReference to suspicious API methods: GetAsyncKeyState(num2)
                Source: QsKtlzYaKF.exe, OK.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, 100, ref lpszVer, 100)
                Source: QsKtlzYaKF.exe, 00000000.00000002.4110826869.000000000361C000.00000004.00000800.00020000.00000000.sdmp, QsKtlzYaKF.exe, 00000000.00000002.4110826869.00000000038CE000.00000004.00000800.00020000.00000000.sdmp, QsKtlzYaKF.exe, 00000000.00000002.4110826869.0000000003901000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: QsKtlzYaKF.exe, 00000000.00000002.4109924762.00000000013BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Rh Program Manager
                Source: QsKtlzYaKF.exe, 00000000.00000002.4110826869.000000000361C000.00000004.00000800.00020000.00000000.sdmp, QsKtlzYaKF.exe, 00000000.00000002.4110826869.00000000036E9000.00000004.00000800.00020000.00000000.sdmp, QsKtlzYaKF.exe, 00000000.00000002.4110826869.00000000036DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.
                Source: QsKtlzYaKF.exe, 00000000.00000002.4110826869.00000000033F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program manager
                Source: QsKtlzYaKF.exe, 00000000.00000002.4110826869.00000000038CE000.00000004.00000800.00020000.00000000.sdmp, QsKtlzYaKF.exe, 00000000.00000002.4110826869.0000000003901000.00000004.00000800.00020000.00000000.sdmp, QsKtlzYaKF.exe, 00000000.00000002.4110826869.00000000036E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@9
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Lowering of HIPS / PFW / Operating System Security Settings

                barindex
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\Desktop\QsKtlzYaKF.exe" "QsKtlzYaKF.exe" ENABLE
                Source: C:\Users\user\Desktop\QsKtlzYaKF.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\Desktop\QsKtlzYaKF.exe" "QsKtlzYaKF.exe" ENABLE

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: QsKtlzYaKF.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.QsKtlzYaKF.exe.e30000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1657947199.0000000000E32000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4110826869.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: QsKtlzYaKF.exe PID: 6856, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe, type: DROPPED
                Source: Yara matchFile source: C:\svchost.exe, type: DROPPED

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: QsKtlzYaKF.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.QsKtlzYaKF.exe.e30000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1657947199.0000000000E32000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4110826869.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: QsKtlzYaKF.exe PID: 6856, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe, type: DROPPED
                Source: Yara matchFile source: C:\svchost.exe, type: DROPPED
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
                11
                Replication Through Removable Media
                1
                Native API
                221
                Registry Run Keys / Startup Folder
                1
                Access Token Manipulation
                11
                Masquerading
                1
                Input Capture
                11
                Security Software Discovery
                11
                Replication Through Removable Media
                1
                Input Capture
                Exfiltration Over Other Network Medium1
                Non-Standard Port
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
                Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts2
                Process Injection
                21
                Disable or Modify Tools
                LSASS Memory2
                Process Discovery
                Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                Non-Application Layer Protocol
                SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
                Domain AccountsAtLogon Script (Windows)221
                Registry Run Keys / Startup Folder
                21
                Virtualization/Sandbox Evasion
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration11
                Application Layer Protocol
                Data Encrypted for ImpactDNS ServerEmail Addresses
                Local AccountsCronLogin HookLogin Hook1
                Access Token Manipulation
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput CaptureTraffic DuplicationProtocol ImpersonationData DestructionVirtual Private ServerEmployee Names
                Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                Process Injection
                LSA Secrets1
                Peripheral Device Discovery
                SSHKeyloggingScheduled TransferFallback ChannelsData Encrypted for ImpactServerGather Victim Network Information
                Replication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Software Packing
                Cached Domain Credentials12
                System Information Discovery
                VNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                QsKtlzYaKF.exe81%VirustotalBrowse
                QsKtlzYaKF.exe86%ReversingLabsByteCode-MSIL.Trojan.NjRAT
                QsKtlzYaKF.exe100%AviraTR/ATRAPS.Gen
                QsKtlzYaKF.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\svchost.exe100%AviraTR/ATRAPS.Gen
                C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe100%AviraTR/ATRAPS.Gen
                C:\svchost.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe86%ReversingLabsByteCode-MSIL.Trojan.NjRAT
                C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe81%VirustotalBrowse
                C:\svchost.exe86%ReversingLabsByteCode-MSIL.Trojan.NjRAT
                C:\svchost.exe81%VirustotalBrowse
                No Antivirus matches
                SourceDetectionScannerLabelLink
                6.tcp.eu.ngrok.io11%VirustotalBrowse
                SourceDetectionScannerLabelLink
                6.tcp.eu.ngrok.io100%Avira URL Cloudmalware
                6.tcp.eu.ngrok.io11%VirustotalBrowse
                NameIPActiveMaliciousAntivirus DetectionReputation
                6.tcp.eu.ngrok.io
                3.69.157.220
                truetrueunknown
                NameMaliciousAntivirus DetectionReputation
                6.tcp.eu.ngrok.iotrue
                • 11%, Virustotal, Browse
                • Avira URL Cloud: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0QsKtlzYaKF.exe, svchost.exe.0.dr, a502d6936d522819db45a43677dc3f7c.exe.0.drfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  3.66.38.117
                  unknownUnited States
                  16509AMAZON-02UStrue
                  52.28.247.255
                  unknownUnited States
                  16509AMAZON-02UStrue
                  3.69.115.178
                  unknownUnited States
                  16509AMAZON-02UStrue
                  3.69.157.220
                  6.tcp.eu.ngrok.ioUnited States
                  16509AMAZON-02UStrue
                  Joe Sandbox Version:38.0.0 Ammolite
                  Analysis ID:1352747
                  Start date and time:2023-12-03 20:20:17 +01:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 7m 28s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:11
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample file name:QsKtlzYaKF.exe
                  renamed because original name is a hash value
                  Original Sample Name:85AA59199316A48AE26E32A9A674D2AE.exe
                  Detection:MAL
                  Classification:mal100.spre.troj.adwa.spyw.evad.winEXE@7/7@4/4
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 141
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  19:21:14AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run a502d6936d522819db45a43677dc3f7c "C:\Users\user\Desktop\QsKtlzYaKF.exe" ..
                  19:21:24AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run a502d6936d522819db45a43677dc3f7c "C:\Users\user\Desktop\QsKtlzYaKF.exe" ..
                  19:21:32AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run a502d6936d522819db45a43677dc3f7c "C:\Users\user\Desktop\QsKtlzYaKF.exe" ..
                  19:21:43AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe
                  20:21:50API Interceptor123102x Sleep call for process: QsKtlzYaKF.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  3.66.38.117dKe1GfZOs1.exeGet hashmaliciousNjratBrowse
                    bRxR.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                      X5eo58PPCB.exeGet hashmaliciousNjratBrowse
                        ZuXcnAYgVp.exeGet hashmaliciousNjratBrowse
                          8AKGdJOQ8N.exeGet hashmaliciousNjratBrowse
                            uPMGLG7QnV.exeGet hashmaliciousNjratBrowse
                              X3vWrCoPG6.exeGet hashmaliciousNjratBrowse
                                7U23YeVgmF.exeGet hashmaliciousNjratBrowse
                                  KD9rMPUEBM.exeGet hashmaliciousNjratBrowse
                                    8fZNpRy9pN.exeGet hashmaliciousNjratBrowse
                                      2CVeP16GYU.exeGet hashmaliciousNjratBrowse
                                        QuX5A6qz9G.exeGet hashmaliciousNjratBrowse
                                          OperaSetup.exeGet hashmaliciousQuasarBrowse
                                            g8XyWsa2b6.exeGet hashmaliciousNjratBrowse
                                              887F546123CD59024356557175BD77FE1144BA5C56D93.exeGet hashmaliciousNjratBrowse
                                                r0EX1ZWE8C.exeGet hashmaliciousNjratBrowse
                                                  Android_USB_Jailbreaker.exeGet hashmaliciousNjratBrowse
                                                    NNUqIKtjza.exeGet hashmaliciousUnknownBrowse
                                                      bLtN.exeGet hashmaliciousNjratBrowse
                                                        bLtK.exeGet hashmaliciousNjratBrowse
                                                          52.28.247.255dKe1GfZOs1.exeGet hashmaliciousNjratBrowse
                                                            X5eo58PPCB.exeGet hashmaliciousNjratBrowse
                                                              ZuXcnAYgVp.exeGet hashmaliciousNjratBrowse
                                                                wiUnP1h5Ex.exeGet hashmaliciousNjratBrowse
                                                                  BqFosj9Wcb.exeGet hashmaliciousNjratBrowse
                                                                    d09l64ZAW6.exeGet hashmaliciousNjratBrowse
                                                                      8AKGdJOQ8N.exeGet hashmaliciousNjratBrowse
                                                                        uPMGLG7QnV.exeGet hashmaliciousNjratBrowse
                                                                          X3vWrCoPG6.exeGet hashmaliciousNjratBrowse
                                                                            8fZNpRy9pN.exeGet hashmaliciousNjratBrowse
                                                                              2CVeP16GYU.exeGet hashmaliciousNjratBrowse
                                                                                QuX5A6qz9G.exeGet hashmaliciousNjratBrowse
                                                                                  TdxWv8SpDq.exeGet hashmaliciousNjratBrowse
                                                                                    OperaSetup.exeGet hashmaliciousQuasarBrowse
                                                                                      HR0Hh3FsOH.exeGet hashmaliciousnjRatBrowse
                                                                                        r0EX1ZWE8C.exeGet hashmaliciousNjratBrowse
                                                                                          Android_USB_Jailbreaker.exeGet hashmaliciousNjratBrowse
                                                                                            NNUqIKtjza.exeGet hashmaliciousUnknownBrowse
                                                                                              CxVNNetrEI.exeGet hashmaliciousNjratBrowse
                                                                                                gAtrO34ote.exeGet hashmaliciousnjRatBrowse
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  6.tcp.eu.ngrok.ioxZLQ8X9Cxo.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.69.157.220
                                                                                                  sCXwkZrcZ3.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.68.171.119
                                                                                                  dKe1GfZOs1.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.69.157.220
                                                                                                  bRxR.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                                                  • 18.197.239.109
                                                                                                  X5eo58PPCB.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.69.157.220
                                                                                                  ZuXcnAYgVp.exeGet hashmaliciousNjratBrowse
                                                                                                  • 52.28.247.255
                                                                                                  wiUnP1h5Ex.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.69.115.178
                                                                                                  BqFosj9Wcb.exeGet hashmaliciousNjratBrowse
                                                                                                  • 52.28.247.255
                                                                                                  d09l64ZAW6.exeGet hashmaliciousNjratBrowse
                                                                                                  • 52.28.247.255
                                                                                                  8AKGdJOQ8N.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.68.171.119
                                                                                                  uPMGLG7QnV.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.66.38.117
                                                                                                  X3vWrCoPG6.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.68.171.119
                                                                                                  7U23YeVgmF.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.69.115.178
                                                                                                  KD9rMPUEBM.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.68.171.119
                                                                                                  8fZNpRy9pN.exeGet hashmaliciousNjratBrowse
                                                                                                  • 52.28.247.255
                                                                                                  2CVeP16GYU.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.66.38.117
                                                                                                  64EithtAyN.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.68.171.119
                                                                                                  QuX5A6qz9G.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.69.115.178
                                                                                                  TdxWv8SpDq.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.69.157.220
                                                                                                  g8XyWsa2b6.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.68.171.119
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  AMAZON-02USxZLQ8X9Cxo.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.69.157.220
                                                                                                  https://rasulcllc.com/captcha/Get hashmaliciousUnknownBrowse
                                                                                                  • 108.138.64.52
                                                                                                  Znuvgbtsedoszb.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                                  • 3.64.163.50
                                                                                                  Ylvjcujvcjtsqv.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                                  • 3.64.163.50
                                                                                                  INVOICE_PO.exeGet hashmaliciousFormBookBrowse
                                                                                                  • 52.60.87.163
                                                                                                  New_Order.exeGet hashmaliciousFormBookBrowse
                                                                                                  • 52.68.224.126
                                                                                                  rZjqwGvi9i.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 3.14.182.203
                                                                                                  SecuriteInfo.com.Trojan.Linux.Mirai.29744.17563.elfGet hashmaliciousUnknownBrowse
                                                                                                  • 34.249.145.219
                                                                                                  rQaPktWHyt.exeGet hashmaliciousNjratBrowse
                                                                                                  • 35.157.111.131
                                                                                                  https://xllt-103158.square.site/Get hashmaliciousUnknownBrowse
                                                                                                  • 3.162.111.130
                                                                                                  base_(2).apkGet hashmaliciousUnknownBrowse
                                                                                                  • 54.192.100.188
                                                                                                  5b5erB7O9O.exeGet hashmaliciousFormBookBrowse
                                                                                                  • 52.60.87.163
                                                                                                  5lFjzZyN2w.exeGet hashmaliciousFormBookBrowse
                                                                                                  • 52.60.87.163
                                                                                                  file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
                                                                                                  • 3.18.7.81
                                                                                                  sCXwkZrcZ3.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.68.171.119
                                                                                                  piHWNOmnbm.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 18.132.89.202
                                                                                                  lp0YqkzL1X.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 54.105.25.28
                                                                                                  Ma0hVedIX4.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
                                                                                                  • 3.18.7.81
                                                                                                  xJB9fCeYZjet.exeGet hashmaliciousRemcosBrowse
                                                                                                  • 18.190.57.209
                                                                                                  file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
                                                                                                  • 3.64.163.50
                                                                                                  AMAZON-02USxZLQ8X9Cxo.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.69.157.220
                                                                                                  https://rasulcllc.com/captcha/Get hashmaliciousUnknownBrowse
                                                                                                  • 108.138.64.52
                                                                                                  Znuvgbtsedoszb.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                                  • 3.64.163.50
                                                                                                  Ylvjcujvcjtsqv.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                                                  • 3.64.163.50
                                                                                                  INVOICE_PO.exeGet hashmaliciousFormBookBrowse
                                                                                                  • 52.60.87.163
                                                                                                  New_Order.exeGet hashmaliciousFormBookBrowse
                                                                                                  • 52.68.224.126
                                                                                                  rZjqwGvi9i.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 3.14.182.203
                                                                                                  SecuriteInfo.com.Trojan.Linux.Mirai.29744.17563.elfGet hashmaliciousUnknownBrowse
                                                                                                  • 34.249.145.219
                                                                                                  rQaPktWHyt.exeGet hashmaliciousNjratBrowse
                                                                                                  • 35.157.111.131
                                                                                                  https://xllt-103158.square.site/Get hashmaliciousUnknownBrowse
                                                                                                  • 3.162.111.130
                                                                                                  base_(2).apkGet hashmaliciousUnknownBrowse
                                                                                                  • 54.192.100.188
                                                                                                  5b5erB7O9O.exeGet hashmaliciousFormBookBrowse
                                                                                                  • 52.60.87.163
                                                                                                  5lFjzZyN2w.exeGet hashmaliciousFormBookBrowse
                                                                                                  • 52.60.87.163
                                                                                                  file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
                                                                                                  • 3.18.7.81
                                                                                                  sCXwkZrcZ3.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.68.171.119
                                                                                                  piHWNOmnbm.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 18.132.89.202
                                                                                                  lp0YqkzL1X.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 54.105.25.28
                                                                                                  Ma0hVedIX4.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
                                                                                                  • 3.18.7.81
                                                                                                  xJB9fCeYZjet.exeGet hashmaliciousRemcosBrowse
                                                                                                  • 18.190.57.209
                                                                                                  file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
                                                                                                  • 3.64.163.50
                                                                                                  No context
                                                                                                  No context
                                                                                                  Process:C:\Users\user\Desktop\QsKtlzYaKF.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):525
                                                                                                  Entropy (8bit):5.259753436570609
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                                                                                  MD5:260E01CC001F9C4643CA7A62F395D747
                                                                                                  SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                                                                                  SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                                                                                  SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                                                                                  Malicious:false
                                                                                                  Reputation:moderate, very likely benign file
                                                                                                  Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                                                                                  Process:C:\Users\user\Desktop\QsKtlzYaKF.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):105472
                                                                                                  Entropy (8bit):6.101513159941245
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:384:89uBz6dgibXjpPu7w9qyMTA3/r6s2cLrrAF+rMRTyN/0L+EcoinblneHQM3epzXh:5+NN9ZMTA3W1cvrM+rMRa8NuZqtxcf
                                                                                                  MD5:85AA59199316A48AE26E32A9A674D2AE
                                                                                                  SHA1:E7EBF981BC84C76FDB0F7B77F4067212FF70421D
                                                                                                  SHA-256:04009681685F9366286233D718166FF7DE75C6149ABA12FB4E913DAA52FFB445
                                                                                                  SHA-512:88A5571C84B64FAD280173FA4859B4FF915019C47AD67F36971703EC3764A54BDB0CF669F207F98604FF363C0E24AE203AE6F0859F331D8BCEF225DFCF7C99DF
                                                                                                  Malicious:true
                                                                                                  Yara Hits:
                                                                                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe, Author: unknown
                                                                                                  • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe, Author: Brian Wallace @botnet_hunter
                                                                                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe, Author: ditekSHen
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 86%
                                                                                                  • Antivirus: Virustotal, Detection: 81%, Browse
                                                                                                  Reputation:low
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ee................................ ........@.. ....................................@.................................t...W.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........e...E..........................................................&.(......**..(......*.s.........s.........s.........s..........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                                                                                  Process:C:\Users\user\Desktop\QsKtlzYaKF.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):26
                                                                                                  Entropy (8bit):3.95006375643621
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:ggPYV:rPYV
                                                                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                  Malicious:false
                                                                                                  Reputation:high, very likely benign file
                                                                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                                                                  Process:C:\Users\user\Desktop\QsKtlzYaKF.exe
                                                                                                  File Type:Microsoft Windows Autorun file
                                                                                                  Category:dropped
                                                                                                  Size (bytes):50
                                                                                                  Entropy (8bit):4.320240000427043
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:It1KV2LKMACovK0x:e1KzxvD
                                                                                                  MD5:5B0B50BADE67C5EC92D42E971287A5D9
                                                                                                  SHA1:90D5C99143E7A56AD6E5EE401015F8ECC093D95A
                                                                                                  SHA-256:04DDE2489D2D2E6846D42250D813AB90B5CA847D527F8F2C022E6C327DC6DB53
                                                                                                  SHA-512:C064DC3C4185A38D1CAEBD069ACB9FDBB85DFB650D6A241036E501A09BC89FD06E267BE9D400D20E6C14B4068473D1C6557962E8D82FDFD191DB7EABB6E66821
                                                                                                  Malicious:true
                                                                                                  Reputation:moderate, very likely benign file
                                                                                                  Preview:[autorun]..open=C:\svchost.exe..shellexecute=C:\..
                                                                                                  Process:C:\Users\user\Desktop\QsKtlzYaKF.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):105472
                                                                                                  Entropy (8bit):6.101513159941245
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:384:89uBz6dgibXjpPu7w9qyMTA3/r6s2cLrrAF+rMRTyN/0L+EcoinblneHQM3epzXh:5+NN9ZMTA3W1cvrM+rMRa8NuZqtxcf
                                                                                                  MD5:85AA59199316A48AE26E32A9A674D2AE
                                                                                                  SHA1:E7EBF981BC84C76FDB0F7B77F4067212FF70421D
                                                                                                  SHA-256:04009681685F9366286233D718166FF7DE75C6149ABA12FB4E913DAA52FFB445
                                                                                                  SHA-512:88A5571C84B64FAD280173FA4859B4FF915019C47AD67F36971703EC3764A54BDB0CF669F207F98604FF363C0E24AE203AE6F0859F331D8BCEF225DFCF7C99DF
                                                                                                  Malicious:true
                                                                                                  Yara Hits:
                                                                                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\svchost.exe, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\svchost.exe, Author: unknown
                                                                                                  • Rule: njrat1, Description: Identify njRat, Source: C:\svchost.exe, Author: Brian Wallace @botnet_hunter
                                                                                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\svchost.exe, Author: ditekSHen
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 86%
                                                                                                  • Antivirus: Virustotal, Detection: 81%, Browse
                                                                                                  Reputation:low
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ee................................ ........@.. ....................................@.................................t...W.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........e...E..........................................................&.(......**..(......*.s.........s.........s.........s..........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                                                                                  Process:C:\Users\user\Desktop\QsKtlzYaKF.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):26
                                                                                                  Entropy (8bit):3.95006375643621
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:ggPYV:rPYV
                                                                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                  Malicious:false
                                                                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                                                                  Process:C:\Windows\SysWOW64\netsh.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):313
                                                                                                  Entropy (8bit):4.971939296804078
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
                                                                                                  MD5:689E2126A85BF55121488295EE068FA1
                                                                                                  SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
                                                                                                  SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
                                                                                                  SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
                                                                                                  Malicious:false
                                                                                                  Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
                                                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Entropy (8bit):6.101513159941245
                                                                                                  TrID:
                                                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                  • DOS Executable Generic (2002/1) 0.01%
                                                                                                  File name:QsKtlzYaKF.exe
                                                                                                  File size:105'472 bytes
                                                                                                  MD5:85aa59199316a48ae26e32a9a674d2ae
                                                                                                  SHA1:e7ebf981bc84c76fdb0f7b77f4067212ff70421d
                                                                                                  SHA256:04009681685f9366286233d718166ff7de75c6149aba12fb4e913daa52ffb445
                                                                                                  SHA512:88a5571c84b64fad280173fa4859b4ff915019c47ad67f36971703ec3764a54bdb0cf669f207f98604ff363c0e24ae203ae6f0859f331d8bcef225dfcf7c99df
                                                                                                  SSDEEP:384:89uBz6dgibXjpPu7w9qyMTA3/r6s2cLrrAF+rMRTyN/0L+EcoinblneHQM3epzXh:5+NN9ZMTA3W1cvrM+rMRa8NuZqtxcf
                                                                                                  TLSH:51A38244DB40BD4FE2FA75718E161F9847B27125CC6927142BFAC6DF0B9EA015E20BE2
                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ee................................. ........@.. ....................................@................................
                                                                                                  Icon Hash:6d92b28e8696d069
                                                                                                  Entrypoint:0x40abce
                                                                                                  Entrypoint Section:.text
                                                                                                  Digitally signed:false
                                                                                                  Imagebase:0x400000
                                                                                                  Subsystem:windows gui
                                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                  Time Stamp:0x6565EEBD [Tue Nov 28 13:44:29 2023 UTC]
                                                                                                  TLS Callbacks:
                                                                                                  CLR (.Net) Version:
                                                                                                  OS Version Major:4
                                                                                                  OS Version Minor:0
                                                                                                  File Version Major:4
                                                                                                  File Version Minor:0
                                                                                                  Subsystem Version Major:4
                                                                                                  Subsystem Version Minor:0
                                                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                  Instruction
                                                                                                  jmp dword ptr [00402000h]
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xab740x57.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x10b0c.rsrc
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1e0000xc.reloc
                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                  .text0x20000x8bd40x8c00False0.46378348214285714data5.608042578085843IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                  .rsrc0xc0000x10b0c0x10c00False0.07984491604477612data5.827905252515968IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  .reloc0x1e0000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                  RT_ICON0xc0e80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.07501774517922631
                                                                                                  RT_GROUP_ICON0x1c9100x14data1.0
                                                                                                  RT_MANIFEST0x1c9240x1e7XML 1.0 document, ASCII text, with CRLF line terminators0.5338809034907598
                                                                                                  DLLImport
                                                                                                  mscoree.dll_CorExeMain
                                                                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                  192.168.2.452.28.247.25549739192202814860 12/03/23-20:22:51.251780TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4973919220192.168.2.452.28.247.255
                                                                                                  192.168.2.43.66.38.11749746192202033132 12/03/23-20:24:22.591862TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974619220192.168.2.43.66.38.117
                                                                                                  192.168.2.43.69.157.22049730192202825563 12/03/23-20:21:23.688164TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4973019220192.168.2.43.69.157.220
                                                                                                  192.168.2.43.69.157.22049729192202814856 12/03/23-20:21:17.448214TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4972919220192.168.2.43.69.157.220
                                                                                                  192.168.2.43.66.38.11749748192202825564 12/03/23-20:25:13.193068TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974819220192.168.2.43.66.38.117
                                                                                                  192.168.2.43.66.38.11749748192202825563 12/03/23-20:24:57.283768TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974819220192.168.2.43.66.38.117
                                                                                                  192.168.2.452.28.247.25549739192202033132 12/03/23-20:22:42.761128TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973919220192.168.2.452.28.247.255
                                                                                                  192.168.2.43.66.38.11749747192202825563 12/03/23-20:24:37.860433TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974719220192.168.2.43.66.38.117
                                                                                                  192.168.2.43.66.38.11749746192202825563 12/03/23-20:24:22.776536TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974619220192.168.2.43.66.38.117
                                                                                                  192.168.2.43.66.38.11749746192202825564 12/03/23-20:24:29.426575TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974619220192.168.2.43.66.38.117
                                                                                                  192.168.2.43.69.157.22049737192202033132 12/03/23-20:22:05.018671TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973719220192.168.2.43.69.157.220
                                                                                                  192.168.2.452.28.247.25549741192202825563 12/03/23-20:23:14.946007TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974119220192.168.2.452.28.247.255
                                                                                                  192.168.2.452.28.247.25549740192202825563 12/03/23-20:22:53.706955TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974019220192.168.2.452.28.247.255
                                                                                                  192.168.2.452.28.247.25549742192202825563 12/03/23-20:23:26.344895TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974219220192.168.2.452.28.247.255
                                                                                                  192.168.2.452.28.247.25549740192202825564 12/03/23-20:22:59.051727TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974019220192.168.2.452.28.247.255
                                                                                                  192.168.2.452.28.247.25549742192202825564 12/03/23-20:23:30.911166TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974219220192.168.2.452.28.247.255
                                                                                                  192.168.2.43.69.157.22049729192202033132 12/03/23-20:21:17.262929TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4972919220192.168.2.43.69.157.220
                                                                                                  192.168.2.452.28.247.25549743192202825563 12/03/23-20:23:37.605690TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974319220192.168.2.452.28.247.255
                                                                                                  192.168.2.43.69.115.17849744192202825564 12/03/23-20:24:02.368608TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974419220192.168.2.43.69.115.178
                                                                                                  192.168.2.43.69.115.17849744192202825563 12/03/23-20:23:48.158065TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974419220192.168.2.43.69.115.178
                                                                                                  192.168.2.43.69.157.22049729192202825563 12/03/23-20:21:17.448214TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4972919220192.168.2.43.69.157.220
                                                                                                  192.168.2.452.28.247.25549743192202825564 12/03/23-20:23:40.973464TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974319220192.168.2.452.28.247.255
                                                                                                  192.168.2.43.69.115.17849745192202825563 12/03/23-20:24:12.746923TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974519220192.168.2.43.69.115.178
                                                                                                  192.168.2.43.69.157.22049737192202825564 12/03/23-20:22:34.323672TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4973719220192.168.2.43.69.157.220
                                                                                                  192.168.2.43.69.115.17849745192202825564 12/03/23-20:24:13.178120TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974519220192.168.2.43.69.115.178
                                                                                                  192.168.2.43.69.157.22049737192202825563 12/03/23-20:22:05.210462TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4973719220192.168.2.43.69.157.220
                                                                                                  192.168.2.452.28.247.25549741192202825564 12/03/23-20:23:15.348399TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974119220192.168.2.452.28.247.255
                                                                                                  192.168.2.43.69.157.22049737192202814856 12/03/23-20:22:05.210462TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973719220192.168.2.43.69.157.220
                                                                                                  192.168.2.43.66.38.11749748192202814856 12/03/23-20:24:57.283768TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974819220192.168.2.43.66.38.117
                                                                                                  192.168.2.452.28.247.25549743192202814856 12/03/23-20:23:37.605690TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974319220192.168.2.452.28.247.255
                                                                                                  192.168.2.452.28.247.25549742192202814856 12/03/23-20:23:26.344895TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974219220192.168.2.452.28.247.255
                                                                                                  192.168.2.43.69.157.22049730192202814856 12/03/23-20:21:23.688164TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973019220192.168.2.43.69.157.220
                                                                                                  192.168.2.452.28.247.25549741192202814856 12/03/23-20:23:14.946007TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974119220192.168.2.452.28.247.255
                                                                                                  192.168.2.452.28.247.25549740192202814856 12/03/23-20:22:53.706955TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974019220192.168.2.452.28.247.255
                                                                                                  192.168.2.43.66.38.11749747192202814856 12/03/23-20:24:37.860433TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974719220192.168.2.43.66.38.117
                                                                                                  192.168.2.43.69.115.17849744192202814860 12/03/23-20:24:03.120602TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974419220192.168.2.43.69.115.178
                                                                                                  192.168.2.43.69.115.17849745192202814860 12/03/23-20:24:13.178120TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974519220192.168.2.43.69.115.178
                                                                                                  192.168.2.43.69.115.17849745192202033132 12/03/23-20:24:12.557531TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974519220192.168.2.43.69.115.178
                                                                                                  192.168.2.43.69.157.22049737192202814860 12/03/23-20:22:39.270213TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4973719220192.168.2.43.69.157.220
                                                                                                  192.168.2.43.66.38.11749746192202814856 12/03/23-20:24:22.776536TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974619220192.168.2.43.66.38.117
                                                                                                  192.168.2.452.28.247.25549742192202033132 12/03/23-20:23:26.153978TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974219220192.168.2.452.28.247.255
                                                                                                  192.168.2.452.28.247.25549743192202033132 12/03/23-20:23:37.416476TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974319220192.168.2.452.28.247.255
                                                                                                  192.168.2.452.28.247.25549739192202814856 12/03/23-20:22:43.464095TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973919220192.168.2.452.28.247.255
                                                                                                  192.168.2.452.28.247.25549740192202033132 12/03/23-20:22:53.517449TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974019220192.168.2.452.28.247.255
                                                                                                  192.168.2.43.69.115.17849744192202033132 12/03/23-20:23:47.970103TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974419220192.168.2.43.69.115.178
                                                                                                  192.168.2.43.66.38.11749746192202814860 12/03/23-20:24:29.426575TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974619220192.168.2.43.66.38.117
                                                                                                  192.168.2.43.69.115.17849744192202814856 12/03/23-20:23:48.158065TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974419220192.168.2.43.69.115.178
                                                                                                  192.168.2.43.69.115.17849745192202814856 12/03/23-20:24:12.746923TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974519220192.168.2.43.69.115.178
                                                                                                  192.168.2.452.28.247.25549740192202814860 12/03/23-20:22:59.051727TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974019220192.168.2.452.28.247.255
                                                                                                  192.168.2.452.28.247.25549742192202814860 12/03/23-20:23:30.911166TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974219220192.168.2.452.28.247.255
                                                                                                  192.168.2.43.66.38.11749747192202033132 12/03/23-20:24:37.669337TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974719220192.168.2.43.66.38.117
                                                                                                  192.168.2.452.28.247.25549743192202814860 12/03/23-20:23:40.973464TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974319220192.168.2.452.28.247.255
                                                                                                  192.168.2.452.28.247.25549741192202033132 12/03/23-20:23:14.759488TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974119220192.168.2.452.28.247.255
                                                                                                  192.168.2.43.66.38.11749748192202033132 12/03/23-20:24:57.092638TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974819220192.168.2.43.66.38.117
                                                                                                  192.168.2.43.69.157.22049730192202033132 12/03/23-20:21:23.501095TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973019220192.168.2.43.69.157.220
                                                                                                  192.168.2.452.28.247.25549741192202814860 12/03/23-20:23:15.348399TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974119220192.168.2.452.28.247.255
                                                                                                  192.168.2.43.66.38.11749748192202814860 12/03/23-20:25:13.193068TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974819220192.168.2.43.66.38.117
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Dec 3, 2023 20:21:16.949775934 CET4972919220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:21:17.134910107 CET19220497293.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:21:17.135025978 CET4972919220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:21:17.262928963 CET4972919220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:21:17.448121071 CET19220497293.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:21:17.448214054 CET4972919220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:21:17.633409023 CET19220497293.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:21:21.268573999 CET19220497293.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:21:21.317231894 CET4972919220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:21:23.307272911 CET4972919220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:21:23.309146881 CET4973019220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:21:23.496160030 CET19220497303.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:21:23.496252060 CET4973019220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:21:23.501095057 CET4973019220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:21:23.688019037 CET19220497303.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:21:23.688163996 CET4973019220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:21:23.875531912 CET19220497303.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:21:38.882241964 CET19220497303.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:21:38.882302999 CET4973019220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:21:54.106287956 CET19220497303.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:21:54.106359959 CET4973019220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:21:55.754508018 CET19220497303.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:21:55.754642010 CET4973019220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:21:56.372534990 CET19220497303.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:21:56.372643948 CET4973019220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:21:56.919554949 CET19220497303.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:21:56.919667006 CET4973019220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:21:57.770504951 CET4973019220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:21:57.772375107 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:21:58.192100048 CET4973019220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:21:58.786004066 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:21:59.020189047 CET4973019220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:21:59.210483074 CET19220497303.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:00.801556110 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:04.817079067 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:05.013024092 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:05.013180017 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:05.018671036 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:05.210298061 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:05.210462093 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:05.440330982 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:07.473679066 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:07.973304987 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:08.165543079 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:12.989212036 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:13.179318905 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:14.822344065 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:15.270222902 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:15.466408014 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:20.802325010 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:20.989144087 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:21.052205086 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:21.442179918 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:21.630619049 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:22.270541906 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:22.660804987 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:22.852292061 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:22.956238985 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:23.143481970 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:23.143630981 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:23.333961010 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:23.334083080 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:23.645296097 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:23.915687084 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:23.915954113 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:24.223280907 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:24.413630962 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:24.413908005 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:24.602298021 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:24.602399111 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:24.792716980 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:24.792851925 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:25.098526001 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:25.288453102 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:25.288737059 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:25.598288059 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:25.910887957 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:26.166167021 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:26.166420937 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:26.402553082 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:26.402745008 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:26.707741976 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:27.020246983 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:27.629523993 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:27.825870991 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:27.825995922 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:28.016659975 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:28.016915083 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:28.317030907 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:28.506978989 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:28.507194996 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:28.817128897 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:29.129551888 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:29.738996983 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:30.942008018 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:32.145179033 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:33.348423004 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:33.535439968 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:33.535578966 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:33.726258993 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:33.726280928 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:33.726432085 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:33.928352118 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:33.928369045 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:33.928611994 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:34.119138002 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:34.119153023 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:34.119497061 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:34.320122957 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:34.323672056 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:34.629626989 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:34.942003012 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:35.551486969 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:36.679214001 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:36.770126104 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:36.869585991 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:37.311872005 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:37.312237024 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:37.972639084 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:37.972867966 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:38.586900949 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:38.587107897 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:39.270212889 CET4973719220192.168.2.43.69.157.220
                                                                                                  Dec 3, 2023 20:22:39.460273981 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:39.462500095 CET19220497373.69.157.220192.168.2.4
                                                                                                  Dec 3, 2023 20:22:40.567006111 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:42.566996098 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:42.758126974 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:42.758285046 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:42.761127949 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:43.464095116 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:43.765878916 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:43.765963078 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:45.770144939 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:45.781192064 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:45.781469107 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:45.960856915 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:48.770220041 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:48.960946083 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:48.961095095 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:49.151853085 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:49.151949883 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:49.151979923 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:49.151981115 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:49.152045012 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:49.342631102 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:49.342654943 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:49.342668056 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:49.343024969 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:49.533610106 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:49.533626080 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:49.533787966 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:49.724266052 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:49.724348068 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:49.914793015 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:49.914922953 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:50.105473995 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:50.105592966 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:50.296475887 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:50.296597958 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:50.487565041 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:50.487714052 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:50.678436041 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:50.678685904 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:50.870069027 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:50.870312929 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:51.060883999 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:51.060991049 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:51.251543999 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:51.251780033 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:51.294357061 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:51.364042997 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:51.442313910 CET192204973952.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:53.317111015 CET4973919220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:53.319341898 CET4974019220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:53.508790970 CET192204974052.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:53.508929014 CET4974019220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:53.517448902 CET4974019220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:53.706727028 CET192204974052.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:53.706954956 CET4974019220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:53.896482944 CET192204974052.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:22:59.051727057 CET4974019220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:22:59.242485046 CET192204974052.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:12.550096035 CET192204974052.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:12.553606033 CET4974019220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:14.567168951 CET4974019220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:14.569583893 CET4974119220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:14.756047964 CET192204974152.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:14.756153107 CET4974119220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:14.756515026 CET192204974052.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:14.759488106 CET4974119220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:14.945910931 CET192204974152.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:14.946007013 CET4974119220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:15.132476091 CET192204974152.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:15.348398924 CET4974119220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:15.535921097 CET192204974152.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:23.953702927 CET192204974152.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:23.953886032 CET4974119220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:25.957556009 CET4974119220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:25.960640907 CET4974219220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:26.144543886 CET192204974152.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:26.151465893 CET192204974252.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:26.151573896 CET4974219220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:26.153978109 CET4974219220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:26.344763041 CET192204974252.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:26.344894886 CET4974219220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:26.535407066 CET192204974252.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:30.911165953 CET4974219220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:31.102243900 CET192204974252.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:35.220310926 CET192204974252.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:35.220398903 CET4974219220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:37.223190069 CET4974219220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:37.225099087 CET4974319220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:37.413831949 CET192204974252.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:37.414048910 CET192204974352.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:37.414171934 CET4974319220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:37.416476011 CET4974319220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:37.605428934 CET192204974352.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:37.605690002 CET4974319220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:37.794634104 CET192204974352.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:40.973464012 CET4974319220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:41.163177967 CET192204974352.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:45.639605999 CET192204974352.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:45.639770031 CET4974319220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:47.645221949 CET4974319220192.168.2.452.28.247.255
                                                                                                  Dec 3, 2023 20:23:47.778893948 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:47.834372044 CET192204974352.28.247.255192.168.2.4
                                                                                                  Dec 3, 2023 20:23:47.966825962 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:47.966962099 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:47.970103025 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:48.157918930 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:48.158065081 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:48.345854044 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:48.848876953 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:49.036758900 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:50.379810095 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:50.567684889 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:54.879775047 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:55.067888021 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:55.129679918 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:55.317837000 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:56.676548004 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:56.864823103 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:56.864995956 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:57.052654028 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:57.274096966 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:57.461885929 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:57.461976051 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:57.650003910 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:57.650407076 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:57.838366985 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:57.838587046 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:58.026408911 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:58.026501894 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:58.214497089 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:58.214557886 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:58.402410984 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:58.402560949 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:58.592919111 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:58.593038082 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:58.780709028 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:58.780796051 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:58.971077919 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:58.971215010 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:59.161885023 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:59.162148952 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:59.352740049 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:59.353081942 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:59.540802956 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:59.541050911 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:59.734560966 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:59.734832048 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:23:59.923034906 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:23:59.923295021 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:00.111478090 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:00.111562014 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:00.299525023 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:00.299715996 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:00.487644911 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:00.487771988 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:00.675805092 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:00.675987959 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:00.863692045 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:00.863795996 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:01.051656008 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:01.051767111 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:01.239571095 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:01.239680052 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:01.427635908 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:01.427762032 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:01.615495920 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:01.615741968 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:01.803407907 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:01.803620100 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:01.991267920 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:01.991456985 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:02.180299044 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:02.180401087 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:02.368284941 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:02.368607998 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:02.556571007 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:02.556754112 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:02.744575977 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:02.744684935 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:02.932421923 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:02.932637930 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:03.120343924 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:03.120601892 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:03.308280945 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:10.356204987 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:10.356293917 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:12.363707066 CET4974419220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:12.365601063 CET4974519220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:12.551891088 CET19220497443.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:12.554701090 CET19220497453.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:12.554819107 CET4974519220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:12.557531118 CET4974519220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:12.746862888 CET19220497453.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:12.746922970 CET4974519220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:12.936227083 CET19220497453.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:13.178119898 CET4974519220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:13.367867947 CET19220497453.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:20.247921944 CET19220497453.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:20.248073101 CET4974519220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:22.254416943 CET4974519220192.168.2.43.69.115.178
                                                                                                  Dec 3, 2023 20:24:22.403251886 CET4974619220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:24:22.443695068 CET19220497453.69.115.178192.168.2.4
                                                                                                  Dec 3, 2023 20:24:22.588119984 CET19220497463.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:24:22.588332891 CET4974619220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:24:22.591861963 CET4974619220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:24:22.776458025 CET19220497463.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:24:22.776535988 CET4974619220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:24:22.961366892 CET19220497463.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:24:29.426574945 CET4974619220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:24:29.611269951 CET19220497463.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:24:35.461355925 CET19220497463.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:24:35.461476088 CET4974619220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:24:37.473115921 CET4974619220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:24:37.475626945 CET4974719220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:24:37.657643080 CET19220497463.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:24:37.666692019 CET19220497473.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:24:37.666918993 CET4974719220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:24:37.669337034 CET4974719220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:24:37.860342026 CET19220497473.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:24:37.860433102 CET4974719220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:24:38.052303076 CET19220497473.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:24:53.056881905 CET19220497473.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:24:53.056994915 CET4974719220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:24:54.888999939 CET19220497473.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:24:54.889108896 CET4974719220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:24:56.894916058 CET4974719220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:24:56.897814989 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:24:57.086370945 CET19220497473.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:24:57.088749886 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:24:57.088845968 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:24:57.092638016 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:24:57.283690929 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:24:57.283767939 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:24:57.474797964 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:24:57.910748959 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:24:58.102027893 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:00.942502975 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:01.133606911 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:01.975742102 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:02.167280912 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:05.349498034 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:05.540647030 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:05.540735006 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:05.732065916 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:06.598191977 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:06.789596081 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:06.789690971 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:06.981138945 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:06.981232882 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:07.172255993 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:07.172365904 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:07.363415956 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:07.363632917 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:07.554811001 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:07.554912090 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:07.746007919 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:07.746174097 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:07.937393904 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:07.937505960 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:08.128639936 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:08.128767967 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:08.319890022 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:08.319974899 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:08.511137962 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:08.511254072 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:08.702349901 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:08.702469110 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:08.893496037 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:08.893584013 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:09.084820032 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:09.084924936 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:09.276422977 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:09.276628017 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:09.467864990 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:09.467957020 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:09.659207106 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:09.659342051 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:09.850552082 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:09.850660086 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:10.042017937 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:10.042164087 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:10.233202934 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:10.233304977 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:10.424410105 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:10.424628973 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:10.616070032 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:10.616204977 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:10.807468891 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:10.807693958 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:10.998960018 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:10.999052048 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:11.190244913 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:11.190496922 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:11.381627083 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:11.381701946 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:11.572830915 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:11.572973967 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:11.764123917 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:11.852426052 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:12.043586969 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:12.043672085 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:12.234942913 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:12.235169888 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:12.426347017 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:12.427202940 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:12.618493080 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:12.619110107 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:12.810370922 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:13.001749039 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:13.192990065 CET19220497483.66.38.117192.168.2.4
                                                                                                  Dec 3, 2023 20:25:13.193068027 CET4974819220192.168.2.43.66.38.117
                                                                                                  Dec 3, 2023 20:25:13.384098053 CET19220497483.66.38.117192.168.2.4
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Dec 3, 2023 20:21:16.808505058 CET6161253192.168.2.41.1.1.1
                                                                                                  Dec 3, 2023 20:21:16.946496964 CET53616121.1.1.1192.168.2.4
                                                                                                  Dec 3, 2023 20:22:39.320367098 CET6441653192.168.2.41.1.1.1
                                                                                                  Dec 3, 2023 20:22:39.458174944 CET53644161.1.1.1192.168.2.4
                                                                                                  Dec 3, 2023 20:23:47.646611929 CET5664253192.168.2.41.1.1.1
                                                                                                  Dec 3, 2023 20:23:47.777641058 CET53566421.1.1.1192.168.2.4
                                                                                                  Dec 3, 2023 20:24:22.255919933 CET5803153192.168.2.41.1.1.1
                                                                                                  Dec 3, 2023 20:24:22.401644945 CET53580311.1.1.1192.168.2.4
                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                  Dec 3, 2023 20:21:16.808505058 CET192.168.2.41.1.1.10x5cd6Standard query (0)6.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                                                  Dec 3, 2023 20:22:39.320367098 CET192.168.2.41.1.1.10x64d9Standard query (0)6.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                                                  Dec 3, 2023 20:23:47.646611929 CET192.168.2.41.1.1.10x9b01Standard query (0)6.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                                                  Dec 3, 2023 20:24:22.255919933 CET192.168.2.41.1.1.10xab51Standard query (0)6.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                  Dec 3, 2023 20:21:16.946496964 CET1.1.1.1192.168.2.40x5cd6No error (0)6.tcp.eu.ngrok.io3.69.157.220A (IP address)IN (0x0001)false
                                                                                                  Dec 3, 2023 20:22:39.458174944 CET1.1.1.1192.168.2.40x64d9No error (0)6.tcp.eu.ngrok.io52.28.247.255A (IP address)IN (0x0001)false
                                                                                                  Dec 3, 2023 20:23:47.777641058 CET1.1.1.1192.168.2.40x9b01No error (0)6.tcp.eu.ngrok.io3.69.115.178A (IP address)IN (0x0001)false
                                                                                                  Dec 3, 2023 20:24:22.401644945 CET1.1.1.1192.168.2.40xab51No error (0)6.tcp.eu.ngrok.io3.66.38.117A (IP address)IN (0x0001)false

                                                                                                  Click to jump to process

                                                                                                  Click to jump to process

                                                                                                  Click to dive into process behavior distribution

                                                                                                  Click to jump to process

                                                                                                  Target ID:0
                                                                                                  Start time:20:21:07
                                                                                                  Start date:03/12/2023
                                                                                                  Path:C:\Users\user\Desktop\QsKtlzYaKF.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:C:\Users\user\Desktop\QsKtlzYaKF.exe
                                                                                                  Imagebase:0xe30000
                                                                                                  File size:105'472 bytes
                                                                                                  MD5 hash:85AA59199316A48AE26E32A9A674D2AE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.1657947199.0000000000E32000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000000.1657947199.0000000000E32000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                                                                  • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000000.1657947199.0000000000E32000.00000002.00000001.01000000.00000003.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.4110826869.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  Reputation:low
                                                                                                  Has exited:false

                                                                                                  Target ID:1
                                                                                                  Start time:20:21:13
                                                                                                  Start date:03/12/2023
                                                                                                  Path:C:\Windows\SysWOW64\netsh.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:netsh firewall add allowedprogram "C:\Users\user\Desktop\QsKtlzYaKF.exe" "QsKtlzYaKF.exe" ENABLE
                                                                                                  Imagebase:0x1560000
                                                                                                  File size:82'432 bytes
                                                                                                  MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:moderate
                                                                                                  Has exited:true

                                                                                                  Target ID:2
                                                                                                  Start time:20:21:14
                                                                                                  Start date:03/12/2023
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:4
                                                                                                  Start time:20:21:23
                                                                                                  Start date:03/12/2023
                                                                                                  Path:C:\Users\user\Desktop\QsKtlzYaKF.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\QsKtlzYaKF.exe" ..
                                                                                                  Imagebase:0xb20000
                                                                                                  File size:105'472 bytes
                                                                                                  MD5 hash:85AA59199316A48AE26E32A9A674D2AE
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:8
                                                                                                  Start time:20:21:32
                                                                                                  Start date:03/12/2023
                                                                                                  Path:C:\Users\user\Desktop\QsKtlzYaKF.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\QsKtlzYaKF.exe" ..
                                                                                                  Imagebase:0x20000
                                                                                                  File size:105'472 bytes
                                                                                                  MD5 hash:85AA59199316A48AE26E32A9A674D2AE
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:9
                                                                                                  Start time:20:21:43
                                                                                                  Start date:03/12/2023
                                                                                                  Path:C:\Users\user\Desktop\QsKtlzYaKF.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\QsKtlzYaKF.exe" ..
                                                                                                  Imagebase:0x1d0000
                                                                                                  File size:105'472 bytes
                                                                                                  MD5 hash:85AA59199316A48AE26E32A9A674D2AE
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Reset < >

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:20.4%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:8%
                                                                                                    Total number of Nodes:175
                                                                                                    Total number of Limit Nodes:8
                                                                                                    execution_graph 7036 5761ab2 7038 5761ae7 GetProcessTimes 7036->7038 7039 5761b19 7038->7039 6882 5761d7e 6883 5761db3 WSAConnect 6882->6883 6885 5761dd2 6883->6885 7040 576163e 7041 5761676 MapViewOfFile 7040->7041 7043 57616c5 7041->7043 7044 56010a8 KiUserExceptionDispatcher 7045 56010dc 7044->7045 7046 173a93a 7047 173a969 WaitForInputIdle 7046->7047 7048 173a99f 7046->7048 7049 173a977 7047->7049 7048->7047 6886 173b0fe 6887 173b12a FindClose 6886->6887 6889 173b15c 6886->6889 6888 173b13f 6887->6888 6889->6887 6890 173a2fe 6891 173a353 6890->6891 6892 173a32a SetErrorMode 6890->6892 6891->6892 6893 173a33f 6892->6893 6898 5761062 6900 576109a WSASocketW 6898->6900 6901 57610d6 6900->6901 6902 57618e2 6904 5761917 shutdown 6902->6904 6905 5761940 6904->6905 6906 5762fee 6908 5763023 ioctlsocket 6906->6908 6909 576304f 6908->6909 6910 173aeea 6912 173af1f GetFileType 6910->6912 6913 173af4c 6912->6913 7058 576212a 7059 5762165 LoadLibraryA 7058->7059 7061 57621a2 7059->7061 7062 56003bd 7064 56003c4 7062->7064 7063 56005bf 7064->7063 7065 5601d3f 2 API calls 7064->7065 7065->7063 6914 173add2 6915 173ae0a CreateFileW 6914->6915 6917 173ae59 6915->6917 7066 173a392 7068 173a3c7 RegQueryValueExW 7066->7068 7069 173a41b 7068->7069 6918 173b956 6920 173b97f LookupPrivilegeValueW 6918->6920 6921 173b9a6 6920->6921 6922 173bad6 6924 173bb05 AdjustTokenPrivileges 6922->6924 6925 173bb27 6924->6925 7070 5762e1e 7071 5762e56 RegCreateKeyExW 7070->7071 7073 5762ec8 7071->7073 7074 576319e 7077 57631d3 GetProcessWorkingSetSize 7074->7077 7076 57631ff 7077->7076 7078 576019e 7079 57601d3 NtQuerySystemInformation 7078->7079 7080 57601fe 7078->7080 7081 57601e8 7079->7081 7080->7079 7082 5761b9e 7083 5761bd9 getaddrinfo 7082->7083 7085 5761c4b 7083->7085 7090 173a09a 7091 173a107 7090->7091 7092 173a0cf send 7090->7092 7091->7092 7093 173a0dd 7092->7093 6926 57600da 6927 5760106 K32EnumProcesses 6926->6927 6929 5760122 6927->6929 6930 173b25e 6932 173b293 ReadFile 6930->6932 6933 173b2c5 6932->6933 6934 5601750 6935 560139a 6934->6935 6940 5601827 6935->6940 6949 560183a 6935->6949 6958 5601809 6935->6958 6967 5601798 6935->6967 6941 560182e 6940->6941 6976 5600310 6941->6976 6944 5600310 2 API calls 6945 560195e 6944->6945 6946 5601984 6945->6946 6980 5602628 6945->6980 6984 56025c7 6945->6984 6950 5601841 6949->6950 6951 5600310 2 API calls 6950->6951 6952 56018f5 6951->6952 6953 5600310 2 API calls 6952->6953 6954 560195e 6953->6954 6955 5601984 6954->6955 6956 56025c7 2 API calls 6954->6956 6957 5602628 2 API calls 6954->6957 6956->6955 6957->6955 6959 5601810 6958->6959 6960 5600310 2 API calls 6959->6960 6961 56018f5 6960->6961 6962 5600310 2 API calls 6961->6962 6963 560195e 6962->6963 6964 5601984 6963->6964 6965 56025c7 2 API calls 6963->6965 6966 5602628 2 API calls 6963->6966 6965->6964 6966->6964 6968 56017a6 6967->6968 6969 5600310 2 API calls 6968->6969 6970 56018f5 6969->6970 6971 5600310 2 API calls 6970->6971 6972 560195e 6971->6972 6973 5601984 6972->6973 6974 56025c7 2 API calls 6972->6974 6975 5602628 2 API calls 6972->6975 6974->6973 6975->6973 6978 5600311 6976->6978 6977 5600348 6977->6944 6978->6977 6988 5601d3f 6978->6988 6981 5602653 6980->6981 6982 560269b 6981->6982 7001 5602c40 6981->7001 6982->6946 6985 56025d0 6984->6985 6986 56025fc 6985->6986 6987 5602c40 2 API calls 6985->6987 6986->6946 6987->6986 6990 5601d45 6988->6990 6989 5602219 6989->6977 6990->6989 6993 173be04 6990->6993 6997 173be26 6990->6997 6994 173be26 NtSetInformationProcess 6993->6994 6996 173be70 6994->6996 6996->6989 6998 173be86 6997->6998 6999 173be5b NtSetInformationProcess 6997->6999 6998->6999 7000 173be70 6999->7000 7000->6989 7002 5602c75 7001->7002 7006 5761e9e 7002->7006 7009 5761e0a 7002->7009 7003 5602cb0 7003->6982 7007 5761eee GetVolumeInformationA 7006->7007 7008 5761ef6 7007->7008 7008->7003 7010 5761e44 GetVolumeInformationA 7009->7010 7012 5761ef6 7010->7012 7012->7003 7094 5763282 7095 57632b7 SetProcessWorkingSetSize 7094->7095 7097 57632e3 7095->7097 7016 173a646 7019 173a67e CreateMutexW 7016->7019 7018 173a6c1 7019->7018 7098 173aa86 7099 173aabe RegOpenKeyExW 7098->7099 7101 173ab14 7099->7101 7102 173a486 7104 173a4bb RegSetValueExW 7102->7104 7105 173a507 7104->7105 7020 576044e 7021 57604c4 7020->7021 7022 576048c DuplicateHandle 7020->7022 7021->7022 7023 576049a 7022->7023 7106 576148e 7107 57614c6 ConvertStringSecurityDescriptorToSecurityDescriptorW 7106->7107 7109 5761507 7107->7109 7024 173bd4a 7026 173bd7f GetExitCodeProcess 7024->7026 7027 173bda8 7026->7027 7110 173ad0a 7111 173ad33 CopyFileW 7110->7111 7113 173ad5a 7111->7113 7028 57630ca 7031 57630f3 select 7028->7031 7030 5763128 7031->7030 7032 173a74e 7033 173a77a FindCloseChangeNotification 7032->7033 7034 173a7b9 7032->7034 7035 173a788 7033->7035 7034->7033 7114 173ab8e 7115 173abb7 SetFileAttributesW 7114->7115 7117 173abd3 7115->7117
                                                                                                    APIs
                                                                                                    • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 0173BB1F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AdjustPrivilegesToken
                                                                                                    • String ID:
                                                                                                    • API String ID: 2874748243-0
                                                                                                    • Opcode ID: 29f5761f019666d7106c5730751f9b49b1b0ee3a27ab284b59b0541950f2c9c8
                                                                                                    • Instruction ID: 15f88d7eb5346ede301a4da1cba0c6bcad6ac8d87bda009b967b3989b213ee7a
                                                                                                    • Opcode Fuzzy Hash: 29f5761f019666d7106c5730751f9b49b1b0ee3a27ab284b59b0541950f2c9c8
                                                                                                    • Instruction Fuzzy Hash: A221DE755097809FEB238F25DC40B52BFF4EF06310F0884DAE9848B163D230A908DBA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • NtQuerySystemInformation.NTDLL ref: 057601D9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InformationQuerySystem
                                                                                                    • String ID:
                                                                                                    • API String ID: 3562636166-0
                                                                                                    • Opcode ID: 3559e01b5638072e7be66152b60ded89bc747addce6fd201af4efb78e23c55bd
                                                                                                    • Instruction ID: fdd8650e585b5efde709716fda2bb70a0ffea80ade7a2b72e0d1af5ffbddb849
                                                                                                    • Opcode Fuzzy Hash: 3559e01b5638072e7be66152b60ded89bc747addce6fd201af4efb78e23c55bd
                                                                                                    • Instruction Fuzzy Hash: 1C21AE714097C0AFDB238B20DC45A52FFB4EF17214F0980CBED848B1A3D265A91DDB62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 0173BB1F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AdjustPrivilegesToken
                                                                                                    • String ID:
                                                                                                    • API String ID: 2874748243-0
                                                                                                    • Opcode ID: 89322f9e2c3c0425e60b31081ee38318f1fbdcc3b7a78f8fe1156ed014ec30fb
                                                                                                    • Instruction ID: 7435ff5499e38842ca90a4ccda11c3704af533fb4ca3dfa6c0c240bc2d978809
                                                                                                    • Opcode Fuzzy Hash: 89322f9e2c3c0425e60b31081ee38318f1fbdcc3b7a78f8fe1156ed014ec30fb
                                                                                                    • Instruction Fuzzy Hash: 5811A0716002049FEB20CF55D984B62FBE4EF48220F08C4AADD898B656D731E418DF62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • NtSetInformationProcess.NTDLL ref: 0173BE61
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InformationProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 1801817001-0
                                                                                                    • Opcode ID: 6d9c9fb2917452d007f97b7c214cd03bccabc370e2b36d3b5a8e65787bd2406b
                                                                                                    • Instruction ID: 5523435296fbda31430a1e6abfc769022329728cfeda0adbdd32080d9a4eb6ce
                                                                                                    • Opcode Fuzzy Hash: 6d9c9fb2917452d007f97b7c214cd03bccabc370e2b36d3b5a8e65787bd2406b
                                                                                                    • Instruction Fuzzy Hash: 3611A3714097809FCB228F15DC44E52FFB4EF46220F08849EED844B563D275A818DB62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • NtSetInformationProcess.NTDLL ref: 0173BE61
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InformationProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 1801817001-0
                                                                                                    • Opcode ID: a1d4dfed1868c5a863c3f30ba60689fc45e1e91c9cc6c2acaf2cc1dffa33d7ca
                                                                                                    • Instruction ID: 8ed86bd8902bf2347c179d7076cdc6c64d5a7423f10bc8fd55920a969ba40920
                                                                                                    • Opcode Fuzzy Hash: a1d4dfed1868c5a863c3f30ba60689fc45e1e91c9cc6c2acaf2cc1dffa33d7ca
                                                                                                    • Instruction Fuzzy Hash: E4018B32500644DFDB218F59D984B61FBE0EF48620F08C49ADE494B652D375E458DFB2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • NtQuerySystemInformation.NTDLL ref: 057601D9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InformationQuerySystem
                                                                                                    • String ID:
                                                                                                    • API String ID: 3562636166-0
                                                                                                    • Opcode ID: ac818a0a5ef8e36f14d8e4430511836e534a19c685d5a543eaed62103382fe45
                                                                                                    • Instruction ID: 58f510795fbab83fe5a5a7407d6e2f17381eeb1e53629f1677d77174a389615f
                                                                                                    • Opcode Fuzzy Hash: ac818a0a5ef8e36f14d8e4430511836e534a19c685d5a543eaed62103382fe45
                                                                                                    • Instruction Fuzzy Hash: 38018B315006449FDB20CF45D988B66FBE1FF08720F08C09ADE494B662D375A458EFA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 133 56010a8-56010e3 KiUserExceptionDispatcher 136 56010eb 133->136 137 56010ed-5601126 136->137 141 5601175-5601178 137->141 142 5601128-560112a 137->142 143 56011f5-5601212 141->143 144 560117a-5601188 141->144 166 560112c call 17e05df 142->166 167 560112c call 5602238 142->167 168 560112c call 17e0606 142->168 144->137 145 560118e-5601192 144->145 148 5601194-56011a5 145->148 149 56011e6 145->149 146 5601132-5601141 150 5601172 146->150 151 5601143-560116a 146->151 148->143 156 56011a7-56011b7 148->156 153 56011f0 149->153 150->141 151->150 153->136 158 56011d8-56011de 156->158 159 56011b9-56011c4 156->159 158->149 159->143 161 56011c6-56011d0 159->161 161->158 166->146 167->146 168->146
                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 056010CF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112895489.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5600000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: e791a133db56fdd1615a37eeaa3583e957d969e4f77cd2863c6beee4a03574af
                                                                                                    • Instruction ID: acbc8e532d153d87a215b5f8f3a4a750c7873a9c164166fe6dd0a578eee7fe29
                                                                                                    • Opcode Fuzzy Hash: e791a133db56fdd1615a37eeaa3583e957d969e4f77cd2863c6beee4a03574af
                                                                                                    • Instruction Fuzzy Hash: 12419F317002018FCB18DF74D9845AEB7E6AF89214B1480B9D809DB399EF38DE45CBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 169 5601099-56010a3 170 56010a8-56010d5 KiUserExceptionDispatcher 169->170 171 56010dc-56010e3 170->171 173 56010eb 171->173 174 56010ed-5601126 173->174 178 5601175-5601178 174->178 179 5601128-560112a 174->179 180 56011f5-5601212 178->180 181 560117a-5601188 178->181 203 560112c call 17e05df 179->203 204 560112c call 5602238 179->204 205 560112c call 17e0606 179->205 181->174 182 560118e-5601192 181->182 185 5601194-56011a5 182->185 186 56011e6 182->186 183 5601132-5601141 187 5601172 183->187 188 5601143-560116a 183->188 185->180 193 56011a7-56011b7 185->193 190 56011f0 186->190 187->178 188->187 190->173 195 56011d8-56011de 193->195 196 56011b9-56011c4 193->196 195->186 196->180 198 56011c6-56011d0 196->198 198->195 203->183 204->183 205->183
                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 056010CF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112895489.0000000005600000.00000040.00000800.00020000.00000000.sdmp, Offset: 05600000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5600000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: a7b8aa65c3206e2838fcc7306328ee29882220065e80928ac6c68f6122ad0e14
                                                                                                    • Instruction ID: b19a9c1809727f8627ed2cf198162e568085b6c0d55e693506cb0eff0ba498d3
                                                                                                    • Opcode Fuzzy Hash: a7b8aa65c3206e2838fcc7306328ee29882220065e80928ac6c68f6122ad0e14
                                                                                                    • Instruction Fuzzy Hash: 303192316002018FCB48DF74CD846AEB6E6AF89314B1890B9980ADB799EF34DE45C7A0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 206 5761e0a-5761ef0 GetVolumeInformationA 210 5761ef6-5761f1f 206->210
                                                                                                    APIs
                                                                                                    • GetVolumeInformationA.KERNEL32(?,00000E24,?,?), ref: 05761EEE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InformationVolume
                                                                                                    • String ID:
                                                                                                    • API String ID: 2039140958-0
                                                                                                    • Opcode ID: 912bd561103b9e8d5a3b0f26148e6d6613cb90f8db24125bb34900a98265a20a
                                                                                                    • Instruction ID: 76e1720afd10b3ff9d44c6f632bd0208335c8d4e223d2327e4db0a5c5c7c5991
                                                                                                    • Opcode Fuzzy Hash: 912bd561103b9e8d5a3b0f26148e6d6613cb90f8db24125bb34900a98265a20a
                                                                                                    • Instruction Fuzzy Hash: BF416B6150E3C06FD7038B358C61AA2BFB4AF47210F1E84CBD8C4CF5A3D6246959C7A2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 212 5762df2-5762e76 216 5762e7b-5762e87 212->216 217 5762e78 212->217 218 5762e8c-5762e95 216->218 219 5762e89 216->219 217->216 220 5762e97 218->220 221 5762e9a-5762eb1 218->221 219->218 220->221 223 5762ef3-5762ef8 221->223 224 5762eb3-5762ec6 RegCreateKeyExW 221->224 223->224 225 5762efa-5762eff 224->225 226 5762ec8-5762ef0 224->226 225->226
                                                                                                    APIs
                                                                                                    • RegCreateKeyExW.KERNEL32(?,00000E24), ref: 05762EB9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Create
                                                                                                    • String ID:
                                                                                                    • API String ID: 2289755597-0
                                                                                                    • Opcode ID: f30de66c11d834a2e32ea3d30e32b2d3011d9095c0cf8e95cfc3a7b812058587
                                                                                                    • Instruction ID: cdbf3f7b600e46763fa7c8c6191891273322f7afffedd490cddca3202b94b861
                                                                                                    • Opcode Fuzzy Hash: f30de66c11d834a2e32ea3d30e32b2d3011d9095c0cf8e95cfc3a7b812058587
                                                                                                    • Instruction Fuzzy Hash: E4317076504784AFEB21CB65CC44FA7BBFCEF05214F08459AE9858B652D324E908DBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 231 5760f4f-5760f6f 232 5760f91-5760fc3 231->232 233 5760f71-5760f90 231->233 237 5760fc6-576101e RegQueryValueExW 232->237 233->232 239 5761024-576103a 237->239
                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNEL32(?,00000E24,?,?), ref: 05761016
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: a63c96fbf09dc2e01dbde7dd04866f1a121ab21f6afb6cc2c673a44b2b718616
                                                                                                    • Instruction ID: e76048f8300882ca67f11fb0e55f7315cf4c91900bccaf1309b0711166444c55
                                                                                                    • Opcode Fuzzy Hash: a63c96fbf09dc2e01dbde7dd04866f1a121ab21f6afb6cc2c673a44b2b718616
                                                                                                    • Instruction Fuzzy Hash: 7A319C6510E3C06FD3138B258C65A61BFB4EF47610F0E45CBE8C48F6A3D229A909D7B2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 240 5761b7c-5761c3b 246 5761c8d-5761c92 240->246 247 5761c3d-5761c45 getaddrinfo 240->247 246->247 249 5761c4b-5761c5d 247->249 250 5761c94-5761c99 249->250 251 5761c5f-5761c8a 249->251 250->251
                                                                                                    APIs
                                                                                                    • getaddrinfo.WS2_32(?,00000E24), ref: 05761C43
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: getaddrinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 300660673-0
                                                                                                    • Opcode ID: 2eaf3b773abfb59fb8d3ff8abd6a80d7a5427985eaaf04eb9ed0c692815ab91f
                                                                                                    • Instruction ID: fde3a4c3ead51a88cc505de8b3d48a7a06caeaf1f2183014e147d460a15d645c
                                                                                                    • Opcode Fuzzy Hash: 2eaf3b773abfb59fb8d3ff8abd6a80d7a5427985eaaf04eb9ed0c692815ab91f
                                                                                                    • Instruction Fuzzy Hash: D431A471504344AFEB21CB51CC84FAAFBACEF04314F04489AFA899B691D375A949CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 255 173aa52-173aae1 259 173aae3 255->259 260 173aae6-173aafd 255->260 259->260 262 173ab3f-173ab44 260->262 263 173aaff-173ab12 RegOpenKeyExW 260->263 262->263 264 173ab46-173ab4b 263->264 265 173ab14-173ab3c 263->265 264->265
                                                                                                    APIs
                                                                                                    • RegOpenKeyExW.KERNEL32(?,00000E24), ref: 0173AB05
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Open
                                                                                                    • String ID:
                                                                                                    • API String ID: 71445658-0
                                                                                                    • Opcode ID: 25d4cb113f58012d83f81911b7dbf2074f9c00ba3f19e0edb14fb59ca3cdbf2e
                                                                                                    • Instruction ID: f6b27572f1f04275686313a48adf9e70fb8141dba7b32ad18967a58eb91e805c
                                                                                                    • Opcode Fuzzy Hash: 25d4cb113f58012d83f81911b7dbf2074f9c00ba3f19e0edb14fb59ca3cdbf2e
                                                                                                    • Instruction Fuzzy Hash: 433193724083846FE7228B65CC85FA6BFBCEF06214F08849AE984CB593D324A50DC771
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 270 5761a74-5761b09 275 5761b56-5761b5b 270->275 276 5761b0b-5761b13 GetProcessTimes 270->276 275->276 278 5761b19-5761b2b 276->278 279 5761b5d-5761b62 278->279 280 5761b2d-5761b53 278->280 279->280
                                                                                                    APIs
                                                                                                    • GetProcessTimes.KERNEL32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 05761B11
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ProcessTimes
                                                                                                    • String ID:
                                                                                                    • API String ID: 1995159646-0
                                                                                                    • Opcode ID: eea3b56a82c34a7c9a62143a8ee807a4e2be70c6d8ce7822ccd235720a38ff9d
                                                                                                    • Instruction ID: b613fa84b335601c2f67b6f5960031e28d8f75d37a84c1ad93a868a481f49634
                                                                                                    • Opcode Fuzzy Hash: eea3b56a82c34a7c9a62143a8ee807a4e2be70c6d8ce7822ccd235720a38ff9d
                                                                                                    • Instruction Fuzzy Hash: F131F7715093806FDB128F60DC44FA6BFB8EF06310F08849AE988CB193D225A949C7B5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 283 173a612-173a695 287 173a697 283->287 288 173a69a-173a6a3 283->288 287->288 289 173a6a5 288->289 290 173a6a8-173a6b1 288->290 289->290 291 173a6b3-173a6d7 CreateMutexW 290->291 292 173a702-173a707 290->292 295 173a709-173a70e 291->295 296 173a6d9-173a6ff 291->296 292->291 295->296
                                                                                                    APIs
                                                                                                    • CreateMutexW.KERNEL32(?,?), ref: 0173A6B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateMutex
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964310414-0
                                                                                                    • Opcode ID: 310aae6bcfbec7ed3f2468cd02925b76cae8b7cdd78805617f052f5d40687816
                                                                                                    • Instruction ID: 227480eca2220669486d214aa20b3a4321792b1437446c6e76bec8b2720eccd6
                                                                                                    • Opcode Fuzzy Hash: 310aae6bcfbec7ed3f2468cd02925b76cae8b7cdd78805617f052f5d40687816
                                                                                                    • Instruction Fuzzy Hash: 603181B15093805FE712CB65CC85B96FFF8EF46214F08849AE984CB293D365A909C772
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 299 5761468-57614e9 303 57614ee-57614f7 299->303 304 57614eb 299->304 305 576154f-5761554 303->305 306 57614f9-5761501 ConvertStringSecurityDescriptorToSecurityDescriptorW 303->306 304->303 305->306 308 5761507-5761519 306->308 309 5761556-576155b 308->309 310 576151b-576154c 308->310 309->310
                                                                                                    APIs
                                                                                                    • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 057614FF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DescriptorSecurity$ConvertString
                                                                                                    • String ID:
                                                                                                    • API String ID: 3907675253-0
                                                                                                    • Opcode ID: 4dc89c0a326cd2a155e178da1a2b0b3ed7aa892b16f2dddd51829a41825505cd
                                                                                                    • Instruction ID: 9f2a33c7beb3b84f01a027d98d80130d2b953e7face4d7c8186d07a536b92d19
                                                                                                    • Opcode Fuzzy Hash: 4dc89c0a326cd2a155e178da1a2b0b3ed7aa892b16f2dddd51829a41825505cd
                                                                                                    • Instruction Fuzzy Hash: 58318171504384AFEB21CB65DC45FAABFA8EF05210F08849AE985DB652D364A909CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 314 173adad-173ae2a 318 173ae2f-173ae3b 314->318 319 173ae2c 314->319 320 173ae40-173ae49 318->320 321 173ae3d 318->321 319->318 322 173ae4b-173ae6f CreateFileW 320->322 323 173ae9a-173ae9f 320->323 321->320 326 173aea1-173aea6 322->326 327 173ae71-173ae97 322->327 323->322 326->327
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNEL32(?,?,?,?,?,?), ref: 0173AE51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 823142352-0
                                                                                                    • Opcode ID: 36866d909c959d1e116265d1be8b788288ecd9c73d80398b9d9fe6095e21528c
                                                                                                    • Instruction ID: 327eb90a2f7caa4244f7ead639a2133362fb2b3074e2fc536622def9b01a7413
                                                                                                    • Opcode Fuzzy Hash: 36866d909c959d1e116265d1be8b788288ecd9c73d80398b9d9fe6095e21528c
                                                                                                    • Instruction Fuzzy Hash: A8319171504380AFEB21CF65DC85F96FBE8EF09214F08849DE9898B652D375E918CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 330 173bd0c-173bd98 334 173bde3-173bde8 330->334 335 173bd9a-173bda2 GetExitCodeProcess 330->335 334->335 336 173bda8-173bdba 335->336 338 173bdea-173bdef 336->338 339 173bdbc-173bde2 336->339 338->339
                                                                                                    APIs
                                                                                                    • GetExitCodeProcess.KERNEL32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 0173BDA0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CodeExitProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 3861947596-0
                                                                                                    • Opcode ID: 5c85e1b7e3aa2f5f86c2685adc5e00b6110bfeb19ac147ba54b3f49c6a46cc65
                                                                                                    • Instruction ID: 4986a5f7fd4b15e77addb82737d444dfaeb783c5b943136f4f2b5da137b40031
                                                                                                    • Opcode Fuzzy Hash: 5c85e1b7e3aa2f5f86c2685adc5e00b6110bfeb19ac147ba54b3f49c6a46cc65
                                                                                                    • Instruction Fuzzy Hash: C121E5715093806FEB12CB64DC45BA6BFB8EF46324F0884DAE984CF193D364A949C7B5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 342 5762e1e-5762e76 345 5762e7b-5762e87 342->345 346 5762e78 342->346 347 5762e8c-5762e95 345->347 348 5762e89 345->348 346->345 349 5762e97 347->349 350 5762e9a-5762eb1 347->350 348->347 349->350 352 5762ef3-5762ef8 350->352 353 5762eb3-5762ec6 RegCreateKeyExW 350->353 352->353 354 5762efa-5762eff 353->354 355 5762ec8-5762ef0 353->355 354->355
                                                                                                    APIs
                                                                                                    • RegCreateKeyExW.KERNEL32(?,00000E24), ref: 05762EB9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Create
                                                                                                    • String ID:
                                                                                                    • API String ID: 2289755597-0
                                                                                                    • Opcode ID: 35df17e991ef84eae2f1b0a4c616db6b1fe7248358c1cdf6f4a8bdca06e9ceab
                                                                                                    • Instruction ID: 1795f07c6d6aaf9a907318616255d60d889ba2a6dc0fe2eaa25a69f5408ca8ee
                                                                                                    • Opcode Fuzzy Hash: 35df17e991ef84eae2f1b0a4c616db6b1fe7248358c1cdf6f4a8bdca06e9ceab
                                                                                                    • Instruction Fuzzy Hash: C521AD76600244AFEB21DF55CC48FABBBECEF08614F08856AED45CB652D730E508DAB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNEL32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 0173A40C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: 9b46a1621dd2b70425c6774b239145f7f1bc392b1d2c14445679c82710a23901
                                                                                                    • Instruction ID: a07dd607d64ff731c414fd6911bce60812f5185dd5c7ece66de9be0f24d4891d
                                                                                                    • Opcode Fuzzy Hash: 9b46a1621dd2b70425c6774b239145f7f1bc392b1d2c14445679c82710a23901
                                                                                                    • Instruction Fuzzy Hash: 7D317C75509780AFE722CB15CC85F96FBB8EF46210F08849AE985CB293D364E949CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetProcessWorkingSetSize.KERNEL32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 057631F7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ProcessSizeWorking
                                                                                                    • String ID:
                                                                                                    • API String ID: 3584180929-0
                                                                                                    • Opcode ID: 5e1a09b5b6d40119b590fd4823c01208a36afe62ea519f50cbfe1a621218d545
                                                                                                    • Instruction ID: 552d36061b9fbfb03b7500821f9733c584142cfc09f1298cd6ae2652e0b954c9
                                                                                                    • Opcode Fuzzy Hash: 5e1a09b5b6d40119b590fd4823c01208a36afe62ea519f50cbfe1a621218d545
                                                                                                    • Instruction Fuzzy Hash: 9821E6715093C06FE713CB20CC54F96BFB8AF46214F0884DBE9888F193D225A909C775
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • getaddrinfo.WS2_32(?,00000E24), ref: 05761C43
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: getaddrinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 300660673-0
                                                                                                    • Opcode ID: 32d749043bc2140341a1214eb3d97335fe02c08aee8b4cdbc82c89bc5311030b
                                                                                                    • Instruction ID: 48ba955d933781498b7093afb4c154f661c60cce309abfb9662207c761e1e293
                                                                                                    • Opcode Fuzzy Hash: 32d749043bc2140341a1214eb3d97335fe02c08aee8b4cdbc82c89bc5311030b
                                                                                                    • Instruction Fuzzy Hash: 0521A171600244AEEB20DF60CD84FBAFBACEF04714F04485AFA499A681D7B5A54DCBB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetFileType.KERNEL32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 0173AF3D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileType
                                                                                                    • String ID:
                                                                                                    • API String ID: 3081899298-0
                                                                                                    • Opcode ID: 02e036e7f35fad291c4209a843cb47e6584904aadf245c3503719aee63a9cf8b
                                                                                                    • Instruction ID: ef1bb2b215d9463a1136ab68e95c23c49466b6bd5e1146cff30001f23675da7c
                                                                                                    • Opcode Fuzzy Hash: 02e036e7f35fad291c4209a843cb47e6584904aadf245c3503719aee63a9cf8b
                                                                                                    • Instruction Fuzzy Hash: 3D2128B55093806FD7128B25DC85BA2BFBCEF47720F0880D6E9848B293D264A90DC775
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: select
                                                                                                    • String ID:
                                                                                                    • API String ID: 1274211008-0
                                                                                                    • Opcode ID: 1c1b98d96d10c3a83833942b55dc63d6cc295d0cf5e7da8797a5b0bd6b1b26ae
                                                                                                    • Instruction ID: 7bfd347db6d4b1b9555f49764640a3394bd5b6e598de452dac822d14ec8c9234
                                                                                                    • Opcode Fuzzy Hash: 1c1b98d96d10c3a83833942b55dc63d6cc295d0cf5e7da8797a5b0bd6b1b26ae
                                                                                                    • Instruction Fuzzy Hash: 5B216D755097849FDB12CF25DC84B62BFF8EF06210F0888DAED84CB262D365A909DB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegSetValueExW.KERNEL32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 0173A4F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: f5025ddcba4bfc6c18ebbb6ab961554cfdf07ace3e8f9fd94dc50eb253738c9d
                                                                                                    • Instruction ID: 7f149e7729b4056ce3b00ce0d599b41287b5ccb5e9220901ea823f18c08aa21a
                                                                                                    • Opcode Fuzzy Hash: f5025ddcba4bfc6c18ebbb6ab961554cfdf07ace3e8f9fd94dc50eb253738c9d
                                                                                                    • Instruction Fuzzy Hash: A721AE725043806FEB228B15CC45FA7FFB8EF46210F08849AE985CB693C364E848C7B5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • WSASocketW.WS2_32(?,?,?,?,?), ref: 057610CE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Socket
                                                                                                    • String ID:
                                                                                                    • API String ID: 38366605-0
                                                                                                    • Opcode ID: 536d4850827fc72d58d41ee1fd616d5deff2fbfc9fe47890ca9b59fed0578ae7
                                                                                                    • Instruction ID: ca5cfb5059a680b3e0f37497384e4cc68a651ab33ea8ee8bc768d487f422aa54
                                                                                                    • Opcode Fuzzy Hash: 536d4850827fc72d58d41ee1fd616d5deff2fbfc9fe47890ca9b59fed0578ae7
                                                                                                    • Instruction Fuzzy Hash: E321A071505380AFEB22CF55CC45FA6FFB8EF05210F08889EE9858B652D375A518CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileView
                                                                                                    • String ID:
                                                                                                    • API String ID: 3314676101-0
                                                                                                    • Opcode ID: d5f3662acca038a44f0dd17e953f571b3b9a5fd317ef0167b5c1be5ffb74824a
                                                                                                    • Instruction ID: 37d2d1f81cf3e9e6a3149b351113cc7445ddc9eda72297277e366a9eefa29213
                                                                                                    • Opcode Fuzzy Hash: d5f3662acca038a44f0dd17e953f571b3b9a5fd317ef0167b5c1be5ffb74824a
                                                                                                    • Instruction Fuzzy Hash: 8221B171405380AFE722CF55CC48F96FFF8EF09214F08849EE9898B252D375A508CB65
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • CreateFileW.KERNEL32(?,?,?,?,?,?), ref: 0173AE51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 823142352-0
                                                                                                    • Opcode ID: d25a7839943401d86dd4ded8c0487f15e3d8e1cc706308500c5ddedbf3400900
                                                                                                    • Instruction ID: 4096e5fb3622c7d23f0e15d346c6592672eecd641e36856839229a7fa90c3e2b
                                                                                                    • Opcode Fuzzy Hash: d25a7839943401d86dd4ded8c0487f15e3d8e1cc706308500c5ddedbf3400900
                                                                                                    • Instruction Fuzzy Hash: 4E21B071600244AFEB21CF65CD86F66FBE8EF08214F04886DE989CB652D375E418CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • ReadFile.KERNEL32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 0173B2BD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 2738559852-0
                                                                                                    • Opcode ID: 71be60d06020a4ca3dc72874215b67bdc94c08534256130c55f146997da29991
                                                                                                    • Instruction ID: 64b7e68187af119f98acac247a911247af75bd10b20a0d348ac3cdfc7a675aab
                                                                                                    • Opcode Fuzzy Hash: 71be60d06020a4ca3dc72874215b67bdc94c08534256130c55f146997da29991
                                                                                                    • Instruction Fuzzy Hash: F821C271505384AFEB228F55DC44FA7BFB8EF46310F08849AF9859B553C225A908CBB5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNEL32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 05761414
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: b0124dd8b083722f7149721c411a4105ca3fa9ae5f292ad9ce466df767f37c10
                                                                                                    • Instruction ID: fff86b68170899f2131b63505275dd877fca3f7b07548d8c93afd9672776d094
                                                                                                    • Opcode Fuzzy Hash: b0124dd8b083722f7149721c411a4105ca3fa9ae5f292ad9ce466df767f37c10
                                                                                                    • Instruction Fuzzy Hash: BC21B272508380AFE721CB51CC84FA7BFF8EF45310F08849AE9858B692D324E908CB75
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 057614FF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DescriptorSecurity$ConvertString
                                                                                                    • String ID:
                                                                                                    • API String ID: 3907675253-0
                                                                                                    • Opcode ID: 2254d91ac5414d325f6a0ef5a0d52a60e91385338662b459fda2f62aabe011c8
                                                                                                    • Instruction ID: 3a3e7cd0aad5ad52bc238997717dbf36e6259f163b4d14f4dcb7c478fe3c326d
                                                                                                    • Opcode Fuzzy Hash: 2254d91ac5414d325f6a0ef5a0d52a60e91385338662b459fda2f62aabe011c8
                                                                                                    • Instruction Fuzzy Hash: 5B21BE72600244AFEB20DF65DC45FAAFBACEF04210F08886AED45DB642D374E508CAB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegOpenKeyExW.KERNEL32(?,00000E24), ref: 0173AB05
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Open
                                                                                                    • String ID:
                                                                                                    • API String ID: 71445658-0
                                                                                                    • Opcode ID: 42ff08965b4d06a6a65189ee5a9889de5990c039b5d4aadaf1e83c6f58da0d64
                                                                                                    • Instruction ID: 3b1dcf7fa4133baa09108f10e0cad031b79c7e444de127d7897e09ed83ff8cc6
                                                                                                    • Opcode Fuzzy Hash: 42ff08965b4d06a6a65189ee5a9889de5990c039b5d4aadaf1e83c6f58da0d64
                                                                                                    • Instruction Fuzzy Hash: 5421F372500204AEEB21DF55CC45FABFBECEF08214F04885AEA84CB642D764E54D8BB2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SetProcessWorkingSetSize.KERNEL32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 057632DB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ProcessSizeWorking
                                                                                                    • String ID:
                                                                                                    • API String ID: 3584180929-0
                                                                                                    • Opcode ID: 7a40237e62b8a240fd8ff9416ba5e6ee6e3dbf6be8f562a2c526da4cfcf585ea
                                                                                                    • Instruction ID: 6aa7623c96aceb38cfe5ba4c26beb8cbae35fd5a9dac8b948805ea0ceb5f78e9
                                                                                                    • Opcode Fuzzy Hash: 7a40237e62b8a240fd8ff9416ba5e6ee6e3dbf6be8f562a2c526da4cfcf585ea
                                                                                                    • Instruction Fuzzy Hash: 5B21A4715093806FDB11CF65DC44FABBFB8EF45210F08849AE985DB192D364A908CBB5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • CreateMutexW.KERNEL32(?,?), ref: 0173A6B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateMutex
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964310414-0
                                                                                                    • Opcode ID: fd7ec8c1db6b173b7e7365adf2370d19b92354b195762bbf2849f8c8107eb095
                                                                                                    • Instruction ID: bc639a3f2f08bd6add5fa0dc41f370ef79fe9178a8312aba149a57a754be039d
                                                                                                    • Opcode Fuzzy Hash: fd7ec8c1db6b173b7e7365adf2370d19b92354b195762bbf2849f8c8107eb095
                                                                                                    • Instruction Fuzzy Hash: DA2180716002449FE721CB65CD85BA6FBE8EF44314F0484A9ED89CB642D375E909CA76
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • shutdown.WS2_32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 05761938
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: shutdown
                                                                                                    • String ID:
                                                                                                    • API String ID: 2510479042-0
                                                                                                    • Opcode ID: a7b626523047a2174ea7e044d70d2b14d7939aab8fa3acb4011b83de4b63f3f8
                                                                                                    • Instruction ID: f37f2c78f7ae625796130be85a7ab1fe9798ec4bda6313876051832a5b0f6090
                                                                                                    • Opcode Fuzzy Hash: a7b626523047a2174ea7e044d70d2b14d7939aab8fa3acb4011b83de4b63f3f8
                                                                                                    • Instruction Fuzzy Hash: 5B219571509380AFDB12CB50CC44F96BFB8EF46220F0884DAE9849B152C368A548C7B5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 0173B99E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LookupPrivilegeValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3899507212-0
                                                                                                    • Opcode ID: c62f60f53afca3f1d6fdca4c76f2d5450f98a1bc558ea897287ddef95e2750fa
                                                                                                    • Instruction ID: c08e1f7679fa213e0e81ff15927be892e4325267878206a0b0f1c5fe254b24b2
                                                                                                    • Opcode Fuzzy Hash: c62f60f53afca3f1d6fdca4c76f2d5450f98a1bc558ea897287ddef95e2750fa
                                                                                                    • Instruction Fuzzy Hash: 1A2162725093809FDB128F29DC55B92FFE8EF46210F0884DAED85CB253D265E408D761
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNEL32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 0173A40C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: 3171902c0caaf1b693ce2d79c1d19ecfd42867255e45df4ca25c3d2717f86faf
                                                                                                    • Instruction ID: 3c2ff754f54458ef12b43ff9c818c8c7bab4d106e4d37f60330582966244d11e
                                                                                                    • Opcode Fuzzy Hash: 3171902c0caaf1b693ce2d79c1d19ecfd42867255e45df4ca25c3d2717f86faf
                                                                                                    • Instruction Fuzzy Hash: 4E21A276600604AFEB21CF19CC85FA6FBECEF44710F04845AE985CB692D364E949CAB5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • ioctlsocket.WS2_32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 05763047
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ioctlsocket
                                                                                                    • String ID:
                                                                                                    • API String ID: 3577187118-0
                                                                                                    • Opcode ID: 6d1950345a773b69561d0873e9c3771d33654613664e10849c77ea6b68e40f03
                                                                                                    • Instruction ID: b73c4db6c2351c18091501e5f991a3fe5f7c7c053ce1baf1212f47f8350fb8f4
                                                                                                    • Opcode Fuzzy Hash: 6d1950345a773b69561d0873e9c3771d33654613664e10849c77ea6b68e40f03
                                                                                                    • Instruction Fuzzy Hash: 7321D5715093806FDB22CF50CC84FA6FFB8EF45210F08849BE9899B592C375A508CBB5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNEL32(?,F752A6E1,00000000,?,?,?,?,?,?,?,?,6CAC3C58), ref: 0173BBD8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseFindNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 2591292051-0
                                                                                                    • Opcode ID: 95123ec3efb078fb522b8605e27441ca5bd4aa28a54fce55ce5357b580c324ef
                                                                                                    • Instruction ID: bb73ce5de7cb2c77e30ec295522acd9e0fb9ef4d25ac011150111449fe5f46fd
                                                                                                    • Opcode Fuzzy Hash: 95123ec3efb078fb522b8605e27441ca5bd4aa28a54fce55ce5357b580c324ef
                                                                                                    • Instruction Fuzzy Hash: 7021AE725093C05FDB128B25DC94B92BFB4AF47224F0984DAE8858F663D264A908DB62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SetFileAttributesW.KERNEL32(?,?,F752A6E1,00000000,?,?,?,?,?,?,?,?,6CAC3C58), ref: 0173ABCB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188754299-0
                                                                                                    • Opcode ID: 7917321b1ee099a9d7c25a979535c005ecd888b40491e9210d2216afcbc4e14b
                                                                                                    • Instruction ID: f65dda7d1911793820458f6407337d08bf576f1d096ff0997764502fcfe21f79
                                                                                                    • Opcode Fuzzy Hash: 7917321b1ee099a9d7c25a979535c005ecd888b40491e9210d2216afcbc4e14b
                                                                                                    • Instruction Fuzzy Hash: F021A4715093C09FEB12CB25D885B92BFE8EF46214F0984EAE885CB257D2649849CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNEL32(?,F752A6E1,00000000,?,?,?,?,?,?,?,?,6CAC3C58), ref: 0173A780
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseFindNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 2591292051-0
                                                                                                    • Opcode ID: 1b7436dbff59634943010c79dd3a499992ef823920f5d8c6307f3f8c223ad439
                                                                                                    • Instruction ID: 265f1454b18c3dccc1fccf32fb5c05069377be89f1f87866c354cf38c863c3f4
                                                                                                    • Opcode Fuzzy Hash: 1b7436dbff59634943010c79dd3a499992ef823920f5d8c6307f3f8c223ad439
                                                                                                    • Instruction Fuzzy Hash: 182105B55083809FDB128F25DC85792BFB8EF02220F0880EADC858B253D2359909DBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • WSASocketW.WS2_32(?,?,?,?,?), ref: 057610CE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Socket
                                                                                                    • String ID:
                                                                                                    • API String ID: 38366605-0
                                                                                                    • Opcode ID: 5888bd48513655865de8aff20095c4d0c470e12d880a4f9a3f1663ecbaf1b707
                                                                                                    • Instruction ID: b5e6a43f0fe2a97ee59aa58663953e9f66c8685de62d627954d7b3938a2fd2d5
                                                                                                    • Opcode Fuzzy Hash: 5888bd48513655865de8aff20095c4d0c470e12d880a4f9a3f1663ecbaf1b707
                                                                                                    • Instruction Fuzzy Hash: 9F21CF71500244AFEB21CF55CD45FA6FBE8EF08324F04885AED858B651D375A418DB76
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 05761DCA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Connect
                                                                                                    • String ID:
                                                                                                    • API String ID: 3144859779-0
                                                                                                    • Opcode ID: 160e6a7cb07cd32fe69ff547fc3f309f083460143fbd687722b23a6d2671ff6b
                                                                                                    • Instruction ID: 5a1be32f973308dc4f674725dc5dc262ffdbb1b9cdf0f049c06d7e45aa91b60f
                                                                                                    • Opcode Fuzzy Hash: 160e6a7cb07cd32fe69ff547fc3f309f083460143fbd687722b23a6d2671ff6b
                                                                                                    • Instruction Fuzzy Hash: C8218E75508780AFDB22CF55DC44FA2BFF8EF06210F08859AED858B162D335A818EB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileView
                                                                                                    • String ID:
                                                                                                    • API String ID: 3314676101-0
                                                                                                    • Opcode ID: d585ee33cf72d15f09f54a275685cce4411905c1905af3b897f62c1a9af7316d
                                                                                                    • Instruction ID: 221c6649db0fee9f4c1bd9c69e21f6f34538eaff3fae609638368cbc4c6cbbb2
                                                                                                    • Opcode Fuzzy Hash: d585ee33cf72d15f09f54a275685cce4411905c1905af3b897f62c1a9af7316d
                                                                                                    • Instruction Fuzzy Hash: 0A21AE71500244AFEB21CF55CD89FAAFBE8EF08324F088459E9498B651D775E44CCBB6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • LoadLibraryA.KERNEL32(?,00000E24), ref: 05762193
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad
                                                                                                    • String ID:
                                                                                                    • API String ID: 1029625771-0
                                                                                                    • Opcode ID: 698caaad9a8cf051902a621a3e3af0ffd5c22f15a7fad54c462b66caf52b4343
                                                                                                    • Instruction ID: e69f53109476d3bf294bda0093e6469f8e44c0ab5fd3f7acec19dbaf0abc5e43
                                                                                                    • Opcode Fuzzy Hash: 698caaad9a8cf051902a621a3e3af0ffd5c22f15a7fad54c462b66caf52b4343
                                                                                                    • Instruction Fuzzy Hash: FB11B7755053806FE721CB11DC85FA6FFB8EF45720F04809AFD445B292D364A948CB75
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegSetValueExW.KERNEL32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 0173A4F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: 949eb15d8831ccf50cb0e158c75ae8717aafac69ec1725d9966cbf20cf48cefb
                                                                                                    • Instruction ID: 132ec816623e8c5c989a59c54bc0823125ca15b1722c81ec056e68b226ab02df
                                                                                                    • Opcode Fuzzy Hash: 949eb15d8831ccf50cb0e158c75ae8717aafac69ec1725d9966cbf20cf48cefb
                                                                                                    • Instruction Fuzzy Hash: C211D072600604AFEB21CF19CC45FA7FBECEF44610F04845AED89CB682D360E448CAB6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNEL32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 05761414
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: 235fc7506a6afa5b4f7dd804b324d23cef3ec8ed261489680fcc012ad496612d
                                                                                                    • Instruction ID: 72a4e0d1dcf241546b226dfd6b4d75c77a75b3b109be5f21ec77da8b424329c8
                                                                                                    • Opcode Fuzzy Hash: 235fc7506a6afa5b4f7dd804b324d23cef3ec8ed261489680fcc012ad496612d
                                                                                                    • Instruction Fuzzy Hash: 6F118172600604AFEB21CF55DC84FA6FBE8EF04710F08845AED469B651D360E54CDAB6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • CopyFileW.KERNEL32(?,?,?,F752A6E1,00000000,?,?,?,?,?,?,?,?,6CAC3C58), ref: 0173AD52
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CopyFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 1304948518-0
                                                                                                    • Opcode ID: 69bc9aabb55d02d5f03fb9213a56a1d06b53900afef6015f644aee93f0a64173
                                                                                                    • Instruction ID: a4da875a8afe6a4a3863182185281494bdc503948b5aa651588a508dd4909fc4
                                                                                                    • Opcode Fuzzy Hash: 69bc9aabb55d02d5f03fb9213a56a1d06b53900afef6015f644aee93f0a64173
                                                                                                    • Instruction Fuzzy Hash: A91172715053809FDB21CF69DC85B57FFE8EF46211F0884AAE985CB657D224E848CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetProcessTimes.KERNEL32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 05761B11
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ProcessTimes
                                                                                                    • String ID:
                                                                                                    • API String ID: 1995159646-0
                                                                                                    • Opcode ID: 83abfd791f710983ec2f760c38d1ce2d21dbafbc2f734feb8ba646c16e40999d
                                                                                                    • Instruction ID: 1e58dc66d35af6d593ebcca9fbe87f2be4df1f9280803699d6b06f86d15a01c5
                                                                                                    • Opcode Fuzzy Hash: 83abfd791f710983ec2f760c38d1ce2d21dbafbc2f734feb8ba646c16e40999d
                                                                                                    • Instruction Fuzzy Hash: 7611E272600244AFEB21CF55DD84FAAFBE8EF44320F04846AED49CB651D374A948DBB5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetProcessWorkingSetSize.KERNEL32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 057631F7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ProcessSizeWorking
                                                                                                    • String ID:
                                                                                                    • API String ID: 3584180929-0
                                                                                                    • Opcode ID: 8ef6ea29a01f5bec0a79a7c0388a30fe8bafa74684e92ceffd5a6589eea97a10
                                                                                                    • Instruction ID: 1f9555c7d60e002d4340be897f06123b495abd39b99ce82a2bb604a448d40c2b
                                                                                                    • Opcode Fuzzy Hash: 8ef6ea29a01f5bec0a79a7c0388a30fe8bafa74684e92ceffd5a6589eea97a10
                                                                                                    • Instruction Fuzzy Hash: 5211C471600244AFEB21CF55DD45FAAB7E8EF04724F04846AEE45CB641D374A548CAB5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SetProcessWorkingSetSize.KERNEL32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 057632DB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ProcessSizeWorking
                                                                                                    • String ID:
                                                                                                    • API String ID: 3584180929-0
                                                                                                    • Opcode ID: 8ef6ea29a01f5bec0a79a7c0388a30fe8bafa74684e92ceffd5a6589eea97a10
                                                                                                    • Instruction ID: 0d40a18caafebf667ca31a0f9b3b5f539d10a8af5df975d9d2379fc2ea1d1e6e
                                                                                                    • Opcode Fuzzy Hash: 8ef6ea29a01f5bec0a79a7c0388a30fe8bafa74684e92ceffd5a6589eea97a10
                                                                                                    • Instruction Fuzzy Hash: 0C11C471600244AFEB10CF55DC45FAAB7A8EF04324F04846AED45DB641D774A548DAB5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetExitCodeProcess.KERNEL32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 0173BDA0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CodeExitProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 3861947596-0
                                                                                                    • Opcode ID: fc23479f75fb25e373b08cf784ae412f9249e4221c9758a1fd44fbe3bf608bcc
                                                                                                    • Instruction ID: cc8a732fb1245e8ba94d09ceadd485edbdbd329ad5a3659615c261049cb02f04
                                                                                                    • Opcode Fuzzy Hash: fc23479f75fb25e373b08cf784ae412f9249e4221c9758a1fd44fbe3bf608bcc
                                                                                                    • Instruction Fuzzy Hash: 34110671600244AFEB11CF55DC84BAAF7ECEF44324F0484AAED44CB642D374A548CBB6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • ReadFile.KERNEL32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 0173B2BD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 2738559852-0
                                                                                                    • Opcode ID: d3418537147283eb2fdad0fca641a75feb482c9ec87ad1cb13c99655136ce993
                                                                                                    • Instruction ID: c7bac3980fb27247744669f5e675251965c2e6d32f6b9a808e85e76c14fd8c8e
                                                                                                    • Opcode Fuzzy Hash: d3418537147283eb2fdad0fca641a75feb482c9ec87ad1cb13c99655136ce993
                                                                                                    • Instruction Fuzzy Hash: F4112772500244AFEB21CF55DC44FAAFBE8EF44310F04845AEE458B652C334A50CCBB6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • K32EnumProcesses.KERNEL32(?,?,?,F752A6E1,00000000,?,?,?,?,?,?,?,?,6CAC3C58), ref: 0576011A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnumProcesses
                                                                                                    • String ID:
                                                                                                    • API String ID: 84517404-0
                                                                                                    • Opcode ID: 8869e888984e5d544d2810b121a49910747852cbc4aefbacd601df4892f87e3a
                                                                                                    • Instruction ID: 44c1d987e4f3089646615c2f4c61557a10aa41d03a0e7fc646c6dbf4fdbb7b8c
                                                                                                    • Opcode Fuzzy Hash: 8869e888984e5d544d2810b121a49910747852cbc4aefbacd601df4892f87e3a
                                                                                                    • Instruction Fuzzy Hash: 301184715093809FDB11CF65DC84B56FFE8EF06210F0884AAED85CB252D234A818DB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • ioctlsocket.WS2_32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 05763047
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ioctlsocket
                                                                                                    • String ID:
                                                                                                    • API String ID: 3577187118-0
                                                                                                    • Opcode ID: e43c5cef4cf73dd8319ac7de6c929692590ac32d3fe15035bfc3c2e67a7b41a3
                                                                                                    • Instruction ID: 110f275cbbd204d3ba2a0619994036ee2559d1059ed54bfe0f54c4c74a86d70c
                                                                                                    • Opcode Fuzzy Hash: e43c5cef4cf73dd8319ac7de6c929692590ac32d3fe15035bfc3c2e67a7b41a3
                                                                                                    • Instruction Fuzzy Hash: 3311E371600244AFEB20CF54CC84FAAFBA8EF44724F04889AED499B641C375A54CCAB5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNEL32(?,F752A6E1,00000000,?,?,?,?,?,?,?,?,6CAC3C58), ref: 0173AA14
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseFindNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 2591292051-0
                                                                                                    • Opcode ID: e59f1e1ec1498ef405819e44f209fc7bf52c1e7fb633f96a3988b6d237eb82f5
                                                                                                    • Instruction ID: 2ef9f9d7a8f6623b44f9f9ecd817c072b02e20adf8d48b5246bbd47e5d43dfc1
                                                                                                    • Opcode Fuzzy Hash: e59f1e1ec1498ef405819e44f209fc7bf52c1e7fb633f96a3988b6d237eb82f5
                                                                                                    • Instruction Fuzzy Hash: 371160715093C09FDB128B65DC45B92BFB4EF47220F0884DAED848F253C275A548DB62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • shutdown.WS2_32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 05761938
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: shutdown
                                                                                                    • String ID:
                                                                                                    • API String ID: 2510479042-0
                                                                                                    • Opcode ID: 2278cdc24d7a18dc7035e4843d15b7b7727f24dc37231c6440c81fada655ee9f
                                                                                                    • Instruction ID: db69f09ca2498818e82f43bf109ced44cdb1a41409220d25164c8004c4f5acd2
                                                                                                    • Opcode Fuzzy Hash: 2278cdc24d7a18dc7035e4843d15b7b7727f24dc37231c6440c81fada655ee9f
                                                                                                    • Instruction Fuzzy Hash: 5111C271600244AFEB10CF55DC88FAABBACEF44724F14849AED489B641D374A548CBB5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SetErrorMode.KERNEL32(?,F752A6E1,00000000,?,?,?,?,?,?,?,?,6CAC3C58), ref: 0173A330
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorMode
                                                                                                    • String ID:
                                                                                                    • API String ID: 2340568224-0
                                                                                                    • Opcode ID: b1b7c341f60921c094b73a039eec33290853cda80e035f62ecb18c5d1b1f1e63
                                                                                                    • Instruction ID: bfd7999426def4c2c66849f7b5027d588547f32baf16676af945526269dd91f6
                                                                                                    • Opcode Fuzzy Hash: b1b7c341f60921c094b73a039eec33290853cda80e035f62ecb18c5d1b1f1e63
                                                                                                    • Instruction Fuzzy Hash: FB113D7140A3C0AFDB138B259C54A62BFA49F47624F0980DAEDC58B263D2656918D772
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05760492
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DuplicateHandle
                                                                                                    • String ID:
                                                                                                    • API String ID: 3793708945-0
                                                                                                    • Opcode ID: 9b1c9a763c2fa970b36fa6a9b20d25296350e9960b63203867eabb4d9dcfe12d
                                                                                                    • Instruction ID: b0fb4c7cd8296565d8242021933431eb6e0efbafe0183fb06d1e3962c885d341
                                                                                                    • Opcode Fuzzy Hash: 9b1c9a763c2fa970b36fa6a9b20d25296350e9960b63203867eabb4d9dcfe12d
                                                                                                    • Instruction Fuzzy Hash: A8115E71409780AFDB22CF55DD84F56FFF4EF4A220F08889AED898B562C375A418DB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • LoadLibraryA.KERNEL32(?,00000E24), ref: 05762193
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad
                                                                                                    • String ID:
                                                                                                    • API String ID: 1029625771-0
                                                                                                    • Opcode ID: 9eff9106109292d2d9721230031d3ef6f4fb56c89ef2de80e38816a4a9492dde
                                                                                                    • Instruction ID: a1dc13dd457e0c858a22619c1c865974675de2941d4bbb613c5598da55db2fea
                                                                                                    • Opcode Fuzzy Hash: 9eff9106109292d2d9721230031d3ef6f4fb56c89ef2de80e38816a4a9492dde
                                                                                                    • Instruction Fuzzy Hash: 4D110C75604244AEE720CB15DD41FBAF7A8DF04714F148056FE445A781D3B4B54CCAB6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: select
                                                                                                    • String ID:
                                                                                                    • API String ID: 1274211008-0
                                                                                                    • Opcode ID: f4b44b7dcf2a856d7e8475bd63d4d308da796f70c4414d4c732ccb553408392f
                                                                                                    • Instruction ID: c5649faee2ec58853dc01e0ac672b8435c3fdfe2bc31eb36cc81f411523c07ec
                                                                                                    • Opcode Fuzzy Hash: f4b44b7dcf2a856d7e8475bd63d4d308da796f70c4414d4c732ccb553408392f
                                                                                                    • Instruction Fuzzy Hash: A4118F756046049FDB20CF55D884F62FBE8EF04710F0888AADD49CB652D335E448DB72
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: send
                                                                                                    • String ID:
                                                                                                    • API String ID: 2809346765-0
                                                                                                    • Opcode ID: 60eb7b6387c5075e3909e44d8142e6daf73b07efc9ef2811a1ccff8b1d7079ef
                                                                                                    • Instruction ID: 99d20dfc26d8327bce8d4e57f6863d16ff3fe60ebce5890408db0ba536462459
                                                                                                    • Opcode Fuzzy Hash: 60eb7b6387c5075e3909e44d8142e6daf73b07efc9ef2811a1ccff8b1d7079ef
                                                                                                    • Instruction Fuzzy Hash: 1C119171509780AFDB22CF55DC44F52FFB4EF46224F0884DAED848B553C275A518DB62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 0173B99E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LookupPrivilegeValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3899507212-0
                                                                                                    • Opcode ID: 04ed1b98d7b8f58c60bed737fe91771a219d18ab2c85cd6aec20f40a28746c11
                                                                                                    • Instruction ID: 57c82385761b09f77eb1e307dea0f47a75a6f89019978751fbbda69b0a7e31ff
                                                                                                    • Opcode Fuzzy Hash: 04ed1b98d7b8f58c60bed737fe91771a219d18ab2c85cd6aec20f40a28746c11
                                                                                                    • Instruction Fuzzy Hash: 43116572604244DFEB10CF69D985B66FBD8EF44610F0884AADD49CB743D775E448CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • CopyFileW.KERNEL32(?,?,?,F752A6E1,00000000,?,?,?,?,?,?,?,?,6CAC3C58), ref: 0173AD52
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CopyFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 1304948518-0
                                                                                                    • Opcode ID: 04ed1b98d7b8f58c60bed737fe91771a219d18ab2c85cd6aec20f40a28746c11
                                                                                                    • Instruction ID: cda7ea88047b1c7d7670582c4f8c93a03e4bc024d5d55ece1950dff05080df7f
                                                                                                    • Opcode Fuzzy Hash: 04ed1b98d7b8f58c60bed737fe91771a219d18ab2c85cd6aec20f40a28746c11
                                                                                                    • Instruction Fuzzy Hash: 4011A5726002008FEB20CF29D889B66FBE8EF44211F08C4AADD85CB747D735E448CA61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetFileType.KERNEL32(?,00000E24,F752A6E1,00000000,00000000,00000000,00000000), ref: 0173AF3D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileType
                                                                                                    • String ID:
                                                                                                    • API String ID: 3081899298-0
                                                                                                    • Opcode ID: 8623fd828f7be973aa3c73a9c629b26bd9d43ed9fb6e76483b701dc9afaf3603
                                                                                                    • Instruction ID: a35f3976593876d9051985304bc24320ed5042f75a096923656767611a58a351
                                                                                                    • Opcode Fuzzy Hash: 8623fd828f7be973aa3c73a9c629b26bd9d43ed9fb6e76483b701dc9afaf3603
                                                                                                    • Instruction Fuzzy Hash: 0901D671604244AEEB10CB15DC85FA6F7E8DF44724F04C096ED448B792D375E54C8AB6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • FindClose.KERNEL32(?,F752A6E1,00000000,?,?,?,?,?,?,?,?,6CAC3C58), ref: 0173B130
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseFind
                                                                                                    • String ID:
                                                                                                    • API String ID: 1863332320-0
                                                                                                    • Opcode ID: 21da00cf8921ba8f4717a8c4f43d38529a9c714cc11959e2ce18e148473820fb
                                                                                                    • Instruction ID: 4ff2910882ffb1155c97d45ec469255056180e7eb39f8498f1e152db6302123a
                                                                                                    • Opcode Fuzzy Hash: 21da00cf8921ba8f4717a8c4f43d38529a9c714cc11959e2ce18e148473820fb
                                                                                                    • Instruction Fuzzy Hash: 1B11A5755093C09FDB128F15DC84B52FFB4DF47220F0880DBED858B2A3D265A958DB62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • WaitForInputIdle.USER32(?,?), ref: 0173A96F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: IdleInputWait
                                                                                                    • String ID:
                                                                                                    • API String ID: 2200289081-0
                                                                                                    • Opcode ID: d08a0570e6169304c50e71a3f2dc9bc283a9137c12ff5449fd7bc6968242a8bf
                                                                                                    • Instruction ID: 8404453477365331a6baf020a67f053e65ab2208b4221fbcb857a5bad99cb018
                                                                                                    • Opcode Fuzzy Hash: d08a0570e6169304c50e71a3f2dc9bc283a9137c12ff5449fd7bc6968242a8bf
                                                                                                    • Instruction Fuzzy Hash: 5011A0714093809FDB12CF55DC85B52FFA8EF46220F0984DAED848F263D279A808CB72
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 05761DCA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Connect
                                                                                                    • String ID:
                                                                                                    • API String ID: 3144859779-0
                                                                                                    • Opcode ID: 5618b75d01397b2c7568711bb58e8c55d25f8d6d4940cc3d5ef6416dcbf648ce
                                                                                                    • Instruction ID: cdfa5b4aa56b8175aecd2dc202c8b9a96b7bdf8b3aeeb9532d7912437caf42d2
                                                                                                    • Opcode Fuzzy Hash: 5618b75d01397b2c7568711bb58e8c55d25f8d6d4940cc3d5ef6416dcbf648ce
                                                                                                    • Instruction Fuzzy Hash: 3611A0315006449FDB20CF55C844F62FBE4FF08310F08849ADE458B662D331E418DFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • K32EnumProcesses.KERNEL32(?,?,?,F752A6E1,00000000,?,?,?,?,?,?,?,?,6CAC3C58), ref: 0576011A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnumProcesses
                                                                                                    • String ID:
                                                                                                    • API String ID: 84517404-0
                                                                                                    • Opcode ID: cb37e1be54b905d831c6cf23f091dbdad80938377f821a99da565ab4b87f5b17
                                                                                                    • Instruction ID: ab060f00c0953e14174b5dc2ff3af9cb9f752967f04db76577dbeab9052d647e
                                                                                                    • Opcode Fuzzy Hash: cb37e1be54b905d831c6cf23f091dbdad80938377f821a99da565ab4b87f5b17
                                                                                                    • Instruction Fuzzy Hash: 3711AD716002048FDB24CF69D888B6AFBE8EF04220F08C4AADD49CB652D335E448DB62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SetFileAttributesW.KERNEL32(?,?,F752A6E1,00000000,?,?,?,?,?,?,?,?,6CAC3C58), ref: 0173ABCB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188754299-0
                                                                                                    • Opcode ID: d2e95bef69307d8bc70929987f8fa964645671d9d986c38f11025901a1bd0816
                                                                                                    • Instruction ID: 47ff66ed8ce867e1823066229fdbd075e4f5002669ec229b89391d734a3054a4
                                                                                                    • Opcode Fuzzy Hash: d2e95bef69307d8bc70929987f8fa964645671d9d986c38f11025901a1bd0816
                                                                                                    • Instruction Fuzzy Hash: 9C01B571A042449FEB10CF29D985B66FBE8EF44220F08C4AADD85CB743D375E448CE62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetVolumeInformationA.KERNEL32(?,00000E24,?,?), ref: 05761EEE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InformationVolume
                                                                                                    • String ID:
                                                                                                    • API String ID: 2039140958-0
                                                                                                    • Opcode ID: e1a0ad063d0d810027e51150b61fa144195a8087bbd4f47a5c8402efbd788bdf
                                                                                                    • Instruction ID: 6ec2ebff4c81f022c9f44203d697d5dad7cb9243314f404a98ad0cfe37d77081
                                                                                                    • Opcode Fuzzy Hash: e1a0ad063d0d810027e51150b61fa144195a8087bbd4f47a5c8402efbd788bdf
                                                                                                    • Instruction Fuzzy Hash: B101B171A00200AFD310DF16CC45B66FBE8FB88A20F14811AEC089BB41D731B915CBE5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05760492
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DuplicateHandle
                                                                                                    • String ID:
                                                                                                    • API String ID: 3793708945-0
                                                                                                    • Opcode ID: 2825e665017c603dbb270b5395170641497c832b7c18ef370fb88cb5023e5690
                                                                                                    • Instruction ID: 3bf0dc701b7daf3e9bad017ece391c386146c8401d08af41215ecf9184bb5d87
                                                                                                    • Opcode Fuzzy Hash: 2825e665017c603dbb270b5395170641497c832b7c18ef370fb88cb5023e5690
                                                                                                    • Instruction Fuzzy Hash: 7601A1315006409FDB20CF51D944B62FFE1EF09320F08889ADE894A652C335E018DF62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNEL32(?,F752A6E1,00000000,?,?,?,?,?,?,?,?,6CAC3C58), ref: 0173A780
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseFindNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 2591292051-0
                                                                                                    • Opcode ID: 9de2166e128480f6b0078763de3601f1146e547177b93f4bbea27a045aa44cd1
                                                                                                    • Instruction ID: 28e2642893a9357f4271a8f79935916f41c36d509cf4b2a7dea55caf3cb6d2a1
                                                                                                    • Opcode Fuzzy Hash: 9de2166e128480f6b0078763de3601f1146e547177b93f4bbea27a045aa44cd1
                                                                                                    • Instruction Fuzzy Hash: 6D01BC71A002408FEB118F29D985B66FBA4DF44220F08C4AADD8ACB642D275A448CAA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNEL32(?,F752A6E1,00000000,?,?,?,?,?,?,?,?,6CAC3C58), ref: 0173BBD8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseFindNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 2591292051-0
                                                                                                    • Opcode ID: ff710d672ed9673f31e63f466bee5dad99a0a69622fcc2a08fedfa665a6ca693
                                                                                                    • Instruction ID: 375636dedaf012fb4e7ebe4786ae4a608854f12d9277b46150ad58e7cf464f99
                                                                                                    • Opcode Fuzzy Hash: ff710d672ed9673f31e63f466bee5dad99a0a69622fcc2a08fedfa665a6ca693
                                                                                                    • Instruction Fuzzy Hash: 6201DF71A042408FDB20CF19D984B62FBE4EF84220F08C0AADD499B646C775E458CAA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNEL32(?,00000E24,?,?), ref: 05761016
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4112981171.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5760000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: 99cdb9e7d86e7ad6da80bd54f69f49f3863eba4df9c02a7f11ca6df49fe07ad1
                                                                                                    • Instruction ID: db6f9cc99846cd2cde03a4ac91e9673e2ff0c94a163dffb90edf6506d61ee482
                                                                                                    • Opcode Fuzzy Hash: 99cdb9e7d86e7ad6da80bd54f69f49f3863eba4df9c02a7f11ca6df49fe07ad1
                                                                                                    • Instruction Fuzzy Hash: 6D01A271500600ABD310DF16CC46F66FBE8FB88A20F14811AEC089BB81D771F915CBE5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: send
                                                                                                    • String ID:
                                                                                                    • API String ID: 2809346765-0
                                                                                                    • Opcode ID: 4af075f2cecf85c98b9cfa69087999b113ed574fb32f2205c218a4a0583476fb
                                                                                                    • Instruction ID: 723b5496aae8d98e774d66e1fa7930f296713b62b5cad01546ce7cfc80a054fb
                                                                                                    • Opcode Fuzzy Hash: 4af075f2cecf85c98b9cfa69087999b113ed574fb32f2205c218a4a0583476fb
                                                                                                    • Instruction Fuzzy Hash: 4501BC329006409FDB20CF55D985B62FBE4EF48320F08C4AADE898B656D375E458CFA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • WaitForInputIdle.USER32(?,?), ref: 0173A96F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: IdleInputWait
                                                                                                    • String ID:
                                                                                                    • API String ID: 2200289081-0
                                                                                                    • Opcode ID: b8b21790d369b8a6d518bd46569bb1ab43177c17a988dc6aa145807fe0bbc271
                                                                                                    • Instruction ID: 02b5fadd2012d2e491d96245be7d63d51bf2aab521760f3bcfd953ba828ef331
                                                                                                    • Opcode Fuzzy Hash: b8b21790d369b8a6d518bd46569bb1ab43177c17a988dc6aa145807fe0bbc271
                                                                                                    • Instruction Fuzzy Hash: E301F2759042409FDB10CF15D985B65FBE4EF44220F08C4AADD889F257D379A408CFA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • FindClose.KERNEL32(?,F752A6E1,00000000,?,?,?,?,?,?,?,?,6CAC3C58), ref: 0173B130
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseFind
                                                                                                    • String ID:
                                                                                                    • API String ID: 1863332320-0
                                                                                                    • Opcode ID: 5359d62a3e693670da4d9c24714da37201b60ff812632fe83fdbc49ec5aa1228
                                                                                                    • Instruction ID: 1631de8f9dc61d21055eb857cf4b589a091dfda189f8dc4635a23b663c11bdfd
                                                                                                    • Opcode Fuzzy Hash: 5359d62a3e693670da4d9c24714da37201b60ff812632fe83fdbc49ec5aa1228
                                                                                                    • Instruction Fuzzy Hash: 7801DC75A00244CFDB108F19D984B62FBE4EF45620F08C0AADD098B793D375E848CEA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNEL32(?,F752A6E1,00000000,?,?,?,?,?,?,?,?,6CAC3C58), ref: 0173AA14
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseFindNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 2591292051-0
                                                                                                    • Opcode ID: 06b748b3846bb1ff8071c2225423bdd7c3e5edd5a0c87ce57f3d1b77644c9903
                                                                                                    • Instruction ID: ddf5c152a0d6074e8b3ae2c033a26b1ecebb71713b30004c2cd645297641527b
                                                                                                    • Opcode Fuzzy Hash: 06b748b3846bb1ff8071c2225423bdd7c3e5edd5a0c87ce57f3d1b77644c9903
                                                                                                    • Instruction Fuzzy Hash: 5C01AD72A042849FDB10CF55DA85B61FBE4EF44220F08C4AADD898F747D379A548CAA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SetErrorMode.KERNEL32(?,F752A6E1,00000000,?,?,?,?,?,?,?,?,6CAC3C58), ref: 0173A330
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110243044.000000000173A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_173a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorMode
                                                                                                    • String ID:
                                                                                                    • API String ID: 2340568224-0
                                                                                                    • Opcode ID: ff959ae084b924ad3fba80180a67658607fcd379b99f8c036aeedd88d5c89e13
                                                                                                    • Instruction ID: 4097d0202a9f6fe7305cd44d6224fb8a816cf8921fcabe907e1a76b763115b21
                                                                                                    • Opcode Fuzzy Hash: ff959ae084b924ad3fba80180a67658607fcd379b99f8c036aeedd88d5c89e13
                                                                                                    • Instruction Fuzzy Hash: 5BF08C75904244DFDB108F09D985B61FFA4EF44720F08C09ADD898B753D3B5A448CAA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110659596.00000000017E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 017E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_17e0000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 199b0cfa375368bd7ff4ad681f609d1859377c0e8517b74222edbd913f139d72
                                                                                                    • Instruction ID: 6226cff08ee612bd22fba7b5670bc03893c8a727a4f6fadab84a5936fd904cac
                                                                                                    • Opcode Fuzzy Hash: 199b0cfa375368bd7ff4ad681f609d1859377c0e8517b74222edbd913f139d72
                                                                                                    • Instruction Fuzzy Hash: 6D219D312093C48FD717CF24D990755BFF1AB5B218F2A85DEE4858B6A3C3769806CB52
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4113422228.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5e40000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d8ba61418f6b1566e03c7cb668029fe23c576b5f48c718e3ac6f51a369cab50b
                                                                                                    • Instruction ID: 75d3098c41cb4c69938a7fd2308aec23c36ac061b9f9e6d7a507b437266f1710
                                                                                                    • Opcode Fuzzy Hash: d8ba61418f6b1566e03c7cb668029fe23c576b5f48c718e3ac6f51a369cab50b
                                                                                                    • Instruction Fuzzy Hash: 9111BAB5A08341AFD740CF19D980A5BFBE4FB88664F04895EF998D7311D331E9188FA6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110659596.00000000017E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 017E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_17e0000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 417b329ada406bc2dcd8cfe7c2c2af0653001ca58f681a041f8abb1e3477e265
                                                                                                    • Instruction ID: 1fcec9a196ca5ed0b904b459ad19f3df360ddeaba24d3cd9bde2a9c2ab38d1a5
                                                                                                    • Opcode Fuzzy Hash: 417b329ada406bc2dcd8cfe7c2c2af0653001ca58f681a041f8abb1e3477e265
                                                                                                    • Instruction Fuzzy Hash: 5711DF303082809FE711CF14D984B26FBE5EB8D718F28C99CE9895B752C7BBD842CA41
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110316035.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_174a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 02a92abf83292f2a12d0d80377ba123e63e113f84350caaba217d64d24db4899
                                                                                                    • Instruction ID: 9fa066c607dc5c9ef012cfd05bf86854d93b9dae7285caaf2b6a887ded93f0e5
                                                                                                    • Opcode Fuzzy Hash: 02a92abf83292f2a12d0d80377ba123e63e113f84350caaba217d64d24db4899
                                                                                                    • Instruction Fuzzy Hash: A611FAB5A08301AFD750CF49DC80E57FBE8EB88660F04895EF95997311D231E9088FA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110659596.00000000017E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 017E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_17e0000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8e2f1337bd54988243a77f7994931381af886bf67322e181797c02afa0290ce1
                                                                                                    • Instruction ID: 22c92bf7689ace4bfdd4498f94918b50bd94d7ade6bfd407c093e771b08c0eb3
                                                                                                    • Opcode Fuzzy Hash: 8e2f1337bd54988243a77f7994931381af886bf67322e181797c02afa0290ce1
                                                                                                    • Instruction Fuzzy Hash: 7001D6B650D3806FC7118F05AC40862FFA8EB8622070984AFEC4987652D225B908CBB6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110659596.00000000017E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 017E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_17e0000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 53963eade7438ca410e32634de66363e024afaa3f40a7da14d248b9d76a52dc3
                                                                                                    • Instruction ID: fdf55197fad5c1f031d3a5e03f4fc2a1925c2d5371e954f0899282c2db1d7a25
                                                                                                    • Opcode Fuzzy Hash: 53963eade7438ca410e32634de66363e024afaa3f40a7da14d248b9d76a52dc3
                                                                                                    • Instruction Fuzzy Hash: D2F01D35208644DFC306CF04D584B15FBE2EB89718F24CAADE94917752C777E813DA81
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110659596.00000000017E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 017E0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_17e0000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3bfd856325c00ed04aa7ae526bcce8a1cb27a88e38ea607dba257c173ac1a69b
                                                                                                    • Instruction ID: ad1c2b73260854f651e84083b98d016668aaf8e70f82b051c6ca91aae71ecff4
                                                                                                    • Opcode Fuzzy Hash: 3bfd856325c00ed04aa7ae526bcce8a1cb27a88e38ea607dba257c173ac1a69b
                                                                                                    • Instruction Fuzzy Hash: 67E092B6A046448BD750CF0AED81852F7D8EB84630718C07FDC0D8B711D235B508CAA5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110316035.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_174a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 389a732bb784b2b58668eda8165dc800ac051f9f6e7d92176e115de48147ccc5
                                                                                                    • Instruction ID: 63b5e3f037f8b14475536c3a4a71d3f3b46455dc24afff4e2d0a9f61275a4a54
                                                                                                    • Opcode Fuzzy Hash: 389a732bb784b2b58668eda8165dc800ac051f9f6e7d92176e115de48147ccc5
                                                                                                    • Instruction Fuzzy Hash: D7E020B2A4020467D7108F069C45F63F79CDB50A30F04C557EE0D5B742D171B518CAF5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4113422228.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5e40000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 6f8491ff14fae4d0d6002176dfe0009e6a3481b1f70d04dd44eec7a2e2de2a72
                                                                                                    • Instruction ID: 833d7646d0fb687810dbf2614736783c003780cc6c62aed253ba54f6068f9664
                                                                                                    • Opcode Fuzzy Hash: 6f8491ff14fae4d0d6002176dfe0009e6a3481b1f70d04dd44eec7a2e2de2a72
                                                                                                    • Instruction Fuzzy Hash: 13E0D8B2A0020067D6109E069C45F63FB98DB40A30F08C457EE085B742D172B518C9E5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4113422228.0000000005E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E40000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_5e40000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: eb759d9e11192bd4495606f0ad80943b81bedc6ae21d68b31dca1e2451ac4a25
                                                                                                    • Instruction ID: 6db64661cc7a5ccea05a95475bc93b9fcff04c7948e69ad128036fd0bcf8f8f3
                                                                                                    • Opcode Fuzzy Hash: eb759d9e11192bd4495606f0ad80943b81bedc6ae21d68b31dca1e2451ac4a25
                                                                                                    • Instruction Fuzzy Hash: 11E0D8B2A4020067D7108E069C45F62FB9CDB54A30F04C567EE085B742D171B51889E5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110223582.0000000001732000.00000040.00000800.00020000.00000000.sdmp, Offset: 01732000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_1732000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2a6ccab1fa083ad800696f4b7064b27aab0aaab64e81414281fb3c6660216dfd
                                                                                                    • Instruction ID: 6da7d29a997e145aa20f6842e0d683e03815580aba28e9aa641d4c65bb8b9229
                                                                                                    • Opcode Fuzzy Hash: 2a6ccab1fa083ad800696f4b7064b27aab0aaab64e81414281fb3c6660216dfd
                                                                                                    • Instruction Fuzzy Hash: 26D02E793006C04FE3128A0CC2A8B857BE4AB80704F0A00F9A8008B763C728E8C1C200
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.4110223582.0000000001732000.00000040.00000800.00020000.00000000.sdmp, Offset: 01732000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_1732000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 443061496d24ba0196d91a6d910e5aa366ce86e5cd94262f4b00ce7124274323
                                                                                                    • Instruction ID: 4f46cb0f842f2da5a9c497df149cf5d3d84a947b049d51cd07a2dc7c7c739c6f
                                                                                                    • Opcode Fuzzy Hash: 443061496d24ba0196d91a6d910e5aa366ce86e5cd94262f4b00ce7124274323
                                                                                                    • Instruction Fuzzy Hash: 2FD05E352406814BD715DA0CC2D4F59BBD4AB80B14F1A44E8BC108B763C7B4D8C5CA00
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:18.4%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:0%
                                                                                                    Total number of Nodes:19
                                                                                                    Total number of Limit Nodes:1
                                                                                                    execution_graph 569 112a612 570 112a646 CreateMutexW 569->570 572 112a6c1 570->572 577 112a462 579 112a486 RegSetValueExW 577->579 580 112a507 579->580 573 112a710 574 112a74e FindCloseChangeNotification 573->574 576 112a788 574->576 581 112a361 583 112a392 RegQueryValueExW 581->583 584 112a41b 583->584 561 112a646 562 112a67e CreateMutexW 561->562 564 112a6c1 562->564 565 112a74e 566 112a77a FindCloseChangeNotification 565->566 567 112a7b9 565->567 568 112a788 566->568 567->566

                                                                                                    Callgraph

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 0 112a612-112a695 4 112a697 0->4 5 112a69a-112a6a3 0->5 4->5 6 112a6a5 5->6 7 112a6a8-112a6b1 5->7 6->7 8 112a702-112a707 7->8 9 112a6b3-112a6d7 CreateMutexW 7->9 8->9 12 112a709-112a70e 9->12 13 112a6d9-112a6ff 9->13 12->13
                                                                                                    APIs
                                                                                                    • CreateMutexW.KERNELBASE(?,?), ref: 0112A6B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1873619234.000000000112A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_112a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateMutex
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964310414-0
                                                                                                    • Opcode ID: a6e3c371a95f35266553a91d5201bd173b9b203d05bc82596e8967f12ae3ad72
                                                                                                    • Instruction ID: ed86c664953299b332cb2b0797f2bf69477d4d7bf7d932c09b60d1a6126d7243
                                                                                                    • Opcode Fuzzy Hash: a6e3c371a95f35266553a91d5201bd173b9b203d05bc82596e8967f12ae3ad72
                                                                                                    • Instruction Fuzzy Hash: 0A31B3755097805FE712CB25DC85B96BFF8EF06210F08849AE984CF693D375A909C771
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 16 112a361-112a3cf 19 112a3d1 16->19 20 112a3d4-112a3dd 16->20 19->20 21 112a3e2-112a3e8 20->21 22 112a3df 20->22 23 112a3ea 21->23 24 112a3ed-112a404 21->24 22->21 23->24 26 112a406-112a419 RegQueryValueExW 24->26 27 112a43b-112a440 24->27 28 112a442-112a447 26->28 29 112a41b-112a438 26->29 27->26 28->29
                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(?,00000E24,5ABE45A6,00000000,00000000,00000000,00000000), ref: 0112A40C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1873619234.000000000112A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_112a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: b9d771938b723b599b8ab8d16e4c30ca34b26fa07e121f57e81df7e9bb9e7793
                                                                                                    • Instruction ID: 15758e52f509b9cadbb2d4163b87c7022cdf4bdd78329e9307c38e6d8a1ab1a7
                                                                                                    • Opcode Fuzzy Hash: b9d771938b723b599b8ab8d16e4c30ca34b26fa07e121f57e81df7e9bb9e7793
                                                                                                    • Instruction Fuzzy Hash: DD319175509780AFE722CF15DC84F96BFF8EF06210F08849AE985CB692D364E949CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 33 112a462-112a4c3 36 112a4c5 33->36 37 112a4c8-112a4d4 33->37 36->37 38 112a4d6 37->38 39 112a4d9-112a4f0 37->39 38->39 41 112a4f2-112a505 RegSetValueExW 39->41 42 112a527-112a52c 39->42 43 112a507-112a524 41->43 44 112a52e-112a533 41->44 42->41 44->43
                                                                                                    APIs
                                                                                                    • RegSetValueExW.KERNELBASE(?,00000E24,5ABE45A6,00000000,00000000,00000000,00000000), ref: 0112A4F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1873619234.000000000112A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_112a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: 60a3740849d5fd33963ec53150830efaee781816fb66365ff673759356e61764
                                                                                                    • Instruction ID: fae5bd84631e246b903c70c812f987adac7d990a8bd2fe998a76d84c932f9ea9
                                                                                                    • Opcode Fuzzy Hash: 60a3740849d5fd33963ec53150830efaee781816fb66365ff673759356e61764
                                                                                                    • Instruction Fuzzy Hash: 532190725047906FE722CF15DC44FA7BFB8EF46210F08849AE989CB652D364E958CBB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 48 112a646-112a695 51 112a697 48->51 52 112a69a-112a6a3 48->52 51->52 53 112a6a5 52->53 54 112a6a8-112a6b1 52->54 53->54 55 112a702-112a707 54->55 56 112a6b3-112a6bb CreateMutexW 54->56 55->56 57 112a6c1-112a6d7 56->57 59 112a709-112a70e 57->59 60 112a6d9-112a6ff 57->60 59->60
                                                                                                    APIs
                                                                                                    • CreateMutexW.KERNELBASE(?,?), ref: 0112A6B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1873619234.000000000112A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_112a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateMutex
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964310414-0
                                                                                                    • Opcode ID: bdf581710081bb8de7b319ca84c370b50b4764f096d1911cfdb5eafaa45daa75
                                                                                                    • Instruction ID: 3c2cd9df9b75a39f50b24797cb059c6d1a48d563b8c480f9fb210f584cc33b5d
                                                                                                    • Opcode Fuzzy Hash: bdf581710081bb8de7b319ca84c370b50b4764f096d1911cfdb5eafaa45daa75
                                                                                                    • Instruction Fuzzy Hash: 4121D4716002509FE720CF25DD45BA6FBE8EF04214F04846AEE49CBB41D371E819CAB6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 63 112a710-112a778 65 112a77a-112a782 FindCloseChangeNotification 63->65 66 112a7b9-112a7be 63->66 68 112a788-112a79a 65->68 66->65 69 112a7c0-112a7c5 68->69 70 112a79c-112a7b8 68->70 69->70
                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 0112A780
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1873619234.000000000112A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_112a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseFindNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 2591292051-0
                                                                                                    • Opcode ID: 4b05142c37bd9b92bfc7461f49eb70b5a6f77bfd621ce40dea55655feb467e4e
                                                                                                    • Instruction ID: 9be169ffcf81a14898b59eb69cff7fbd182b15c6250e6e8b9c45d3e44d5ca99e
                                                                                                    • Opcode Fuzzy Hash: 4b05142c37bd9b92bfc7461f49eb70b5a6f77bfd621ce40dea55655feb467e4e
                                                                                                    • Instruction Fuzzy Hash: 0D21F6B55097805FDB128F25DC85751BFB4EF02220F0884DBDD858B653D2259909DB62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 72 112a392-112a3cf 74 112a3d1 72->74 75 112a3d4-112a3dd 72->75 74->75 76 112a3e2-112a3e8 75->76 77 112a3df 75->77 78 112a3ea 76->78 79 112a3ed-112a404 76->79 77->76 78->79 81 112a406-112a419 RegQueryValueExW 79->81 82 112a43b-112a440 79->82 83 112a442-112a447 81->83 84 112a41b-112a438 81->84 82->81 83->84
                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(?,00000E24,5ABE45A6,00000000,00000000,00000000,00000000), ref: 0112A40C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1873619234.000000000112A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_112a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: 8dd17dfb78aa92af846cadf6ebd7e3b9ef05de4b83adf27074a17f4a507751d8
                                                                                                    • Instruction ID: 4557ecdb594677adbec2541de6a8746dbd45ef091ce0cac93e7a3d65c98a7817
                                                                                                    • Opcode Fuzzy Hash: 8dd17dfb78aa92af846cadf6ebd7e3b9ef05de4b83adf27074a17f4a507751d8
                                                                                                    • Instruction Fuzzy Hash: C021A275600654AFE721CF15DC84FA6FBECEF04610F08845AEA45CBA51D360E959CAB2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 88 112a486-112a4c3 90 112a4c5 88->90 91 112a4c8-112a4d4 88->91 90->91 92 112a4d6 91->92 93 112a4d9-112a4f0 91->93 92->93 95 112a4f2-112a505 RegSetValueExW 93->95 96 112a527-112a52c 93->96 97 112a507-112a524 95->97 98 112a52e-112a533 95->98 96->95 98->97
                                                                                                    APIs
                                                                                                    • RegSetValueExW.KERNELBASE(?,00000E24,5ABE45A6,00000000,00000000,00000000,00000000), ref: 0112A4F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1873619234.000000000112A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_112a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: a84ff1ddff7785d630b17adf3a157cf35c925e6a7a4584a05d889e0e514f75e3
                                                                                                    • Instruction ID: 444aee001ec8d92f67290a14ddb3f17d16d3d8e6f4acbe700eff03dc43ddc2f5
                                                                                                    • Opcode Fuzzy Hash: a84ff1ddff7785d630b17adf3a157cf35c925e6a7a4584a05d889e0e514f75e3
                                                                                                    • Instruction Fuzzy Hash: C911D072600654AFEB21CF15DC44FA7FBECEF04610F08845AEE498BA42D360E558CAB2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 102 112a74e-112a778 103 112a77a-112a782 FindCloseChangeNotification 102->103 104 112a7b9-112a7be 102->104 106 112a788-112a79a 103->106 104->103 107 112a7c0-112a7c5 106->107 108 112a79c-112a7b8 106->108 107->108
                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 0112A780
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1873619234.000000000112A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_112a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseFindNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 2591292051-0
                                                                                                    • Opcode ID: 9d3046de1907025f35db15226fc7aaedb77617e7f051140e98b6bd885f0a9cbd
                                                                                                    • Instruction ID: aec86d6b52e4b6f2c9666b299745b6e2c1e82b0d46c6572fa2ae6dc24c8b80cf
                                                                                                    • Opcode Fuzzy Hash: 9d3046de1907025f35db15226fc7aaedb77617e7f051140e98b6bd885f0a9cbd
                                                                                                    • Instruction Fuzzy Hash: 0901D4716006008FDB14CF15E984765FBE4DF04220F08C4ABDD4A8BB42D376E458CEA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 110 52f0310-52f0334 112 52f033e-52f0346 110->112 113 52f0336-52f0338 110->113 114 52f034e-52f0391 112->114 115 52f0348-52f034d 112->115 113->112 118 52f03d8-52f0418 114->118 119 52f0393-52f03ce 114->119 126 52f041f-52f0434 118->126 127 52f041a 118->127 119->118 129 52f046b-52f0523 126->129 130 52f0436-52f0460 126->130 127->126 149 52f0525-52f0569 129->149 150 52f0570-52f0587 129->150 130->129 149->150 151 52f058d-52f05bf 150->151 152 52f0880 150->152 151->152
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1874191260.00000000052F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052F0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_52f0000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 33180ed52bae785eef0f43186bf1f9dc54563df8f7e1b7ca9ba8253f7a035b48
                                                                                                    • Instruction ID: d3f24adf71d8e4e3e5527ad9dc969b2eb0032784ab978403ac79b349501a88e9
                                                                                                    • Opcode Fuzzy Hash: 33180ed52bae785eef0f43186bf1f9dc54563df8f7e1b7ca9ba8253f7a035b48
                                                                                                    • Instruction Fuzzy Hash: 7B5111303142018BC718DB7994146AEB6E7AF85608B44407AE00AEF7D5DF3DDC4AC7A6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 163 52f03bd-52f0418 171 52f041f-52f0434 163->171 172 52f041a 163->172 174 52f046b-52f0523 171->174 175 52f0436-52f0460 171->175 172->171 194 52f0525-52f0569 174->194 195 52f0570-52f0587 174->195 175->174 194->195 196 52f058d-52f05bf 195->196 197 52f0880 195->197 196->197
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1874191260.00000000052F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052F0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_52f0000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 909bad38a9e44969b6ffb0cdf0d1ed010c71e9e3a9b87d2a51b379002a413676
                                                                                                    • Instruction ID: b178ec1408e421c59b7815120ddb36944b77d2da5e38de5219923e3570f7e8c4
                                                                                                    • Opcode Fuzzy Hash: 909bad38a9e44969b6ffb0cdf0d1ed010c71e9e3a9b87d2a51b379002a413676
                                                                                                    • Instruction Fuzzy Hash: 2041E0307101218B9B18ABBA94142BD72D3AFC56487444039E01AFF7D8DF7CDD4A97E6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 208 52f0080-52f00ad 211 52f00b8-52f02f9 208->211
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1874191260.00000000052F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052F0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_52f0000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4f85a7a2d541d71b37033e8f7ab1cb03453b41cbcd13ba6aaf43258f7db1239a
                                                                                                    • Instruction ID: 2ad4f14c617b901e6269eb03c34d711eda7f26fd464305c82535373e630cd0b7
                                                                                                    • Opcode Fuzzy Hash: 4f85a7a2d541d71b37033e8f7ab1cb03453b41cbcd13ba6aaf43258f7db1239a
                                                                                                    • Instruction Fuzzy Hash: 81514E30211246CBC704DF76E58498A77A6FB81A08740857CD014AF7AADF7C5DADDBC1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 249 52f0006-52f006a 251 52f0070 call 52f03bd 249->251 252 52f0070 call 1640606 249->252 253 52f0070 call 16405e0 249->253 254 52f0070 call 52f0301 249->254 255 52f0070 call 52f0310 249->255 250 52f0076 251->250 252->250 253->250 254->250 255->250
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1874191260.00000000052F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052F0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_52f0000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c4566ee239d6d5ab16df2c1bfa235fa43047489f83deb0c9bf8762cf7f4b6244
                                                                                                    • Instruction ID: fbd1b0ffa01e72c891d023ff8a508034aab34b1d6e0ee1f382042c47cb57f0a8
                                                                                                    • Opcode Fuzzy Hash: c4566ee239d6d5ab16df2c1bfa235fa43047489f83deb0c9bf8762cf7f4b6244
                                                                                                    • Instruction Fuzzy Hash: FC017AA680E3C28FD7078774ACA66807F70AE2321570F45D7C0D1CF1A7E159895ADB36
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 256 16405e0-1640620 258 1640626-1640643 256->258
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1873928310.0000000001640000.00000040.00000020.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_1640000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9c9a746a10e567e191cd20ce65acc16259ee1e7d541a932ada60523ae1db0b8d
                                                                                                    • Instruction ID: bd385f235243d5ce77ccb4ce8aa47f3eada9c60cb94484d2fa8f7d99f37d31fd
                                                                                                    • Opcode Fuzzy Hash: 9c9a746a10e567e191cd20ce65acc16259ee1e7d541a932ada60523ae1db0b8d
                                                                                                    • Instruction Fuzzy Hash: 6B01A2B55093805FD711CF15EC40896FFE8EF86230B0984ABE8898B612D235B959CBB2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 259 1640606-1640620 260 1640626-1640643 259->260
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1873928310.0000000001640000.00000040.00000020.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_1640000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: fe3ba4035d654db4a8362902279053d12b44db091911aa399b55a79edc124721
                                                                                                    • Instruction ID: 8083f9d28c70b1dd6bb5a9e1b85dabdcf00b0fee4c668341b9dcbee6646f223a
                                                                                                    • Opcode Fuzzy Hash: fe3ba4035d654db4a8362902279053d12b44db091911aa399b55a79edc124721
                                                                                                    • Instruction Fuzzy Hash: 3CE092B6A006044BD650CF0AEC41452F7D8EB84630708C07FDD0D8B711D236B508CAA6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 261 11223f4-11223ff 262 1122412-1122417 261->262 263 1122401-112240e 261->263 264 112241a 262->264 265 1122419 262->265 263->262 266 1122420-1122421 264->266
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1873602972.0000000001122000.00000040.00000800.00020000.00000000.sdmp, Offset: 01122000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_1122000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3e424efc71014b09b34dd59fbe601055f6d12d18a131fa11f731af8a7498e044
                                                                                                    • Instruction ID: 88439e73f0235b05e05d71fd0bbe5575f32a4b45c79828f4b7881f3ec0b90ee3
                                                                                                    • Opcode Fuzzy Hash: 3e424efc71014b09b34dd59fbe601055f6d12d18a131fa11f731af8a7498e044
                                                                                                    • Instruction Fuzzy Hash: 3DD02E793006D04FE31A8A0CC2A8B893BE4AB40704F0A00FAEC008B763C778D4C1C600
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.1873602972.0000000001122000.00000040.00000800.00020000.00000000.sdmp, Offset: 01122000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_1122000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f28a23254905a12af34899b9725525e6ee25c4debcdcf7b72c6c5753fdb204c6
                                                                                                    • Instruction ID: cb79af09e90a813f7fc7e72bd8f4d39b56c11bd7272c33bb87051ef037252173
                                                                                                    • Opcode Fuzzy Hash: f28a23254905a12af34899b9725525e6ee25c4debcdcf7b72c6c5753fdb204c6
                                                                                                    • Instruction Fuzzy Hash: 43D05E342046814BD719DA0CC2D4F5D3BD4AF44714F1A44E8BC108B762C7B4D8D5CA00
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:11.2%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:0%
                                                                                                    Total number of Nodes:19
                                                                                                    Total number of Limit Nodes:1
                                                                                                    execution_graph 552 94a646 555 94a67e CreateMutexW 552->555 554 94a6c1 555->554 564 94a710 565 94a74e FindCloseChangeNotification 564->565 567 94a788 565->567 572 94a361 573 94a392 RegQueryValueExW 572->573 575 94a41b 573->575 568 94a612 569 94a646 CreateMutexW 568->569 571 94a6c1 569->571 576 94a462 577 94a486 RegSetValueExW 576->577 579 94a507 577->579 560 94a74e 561 94a7b9 560->561 562 94a77a FindCloseChangeNotification 560->562 561->562 563 94a788 562->563

                                                                                                    Callgraph

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 0 94a612-94a695 4 94a697 0->4 5 94a69a-94a6a3 0->5 4->5 6 94a6a5 5->6 7 94a6a8-94a6b1 5->7 6->7 8 94a702-94a707 7->8 9 94a6b3-94a6d7 CreateMutexW 7->9 8->9 12 94a709-94a70e 9->12 13 94a6d9-94a6ff 9->13 12->13
                                                                                                    APIs
                                                                                                    • CreateMutexW.KERNELBASE(?,?), ref: 0094A6B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.1954933497.000000000094A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0094A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_94a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateMutex
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964310414-0
                                                                                                    • Opcode ID: d69fd4b6e5543d4b9635b53d9d82bbcdb6ea01aa98e4488d83d146875f8d4b8a
                                                                                                    • Instruction ID: 1fc5cd870ee36d28b768ae0f2899e38b6ae7441bfe98066d6039efe3ae8181b2
                                                                                                    • Opcode Fuzzy Hash: d69fd4b6e5543d4b9635b53d9d82bbcdb6ea01aa98e4488d83d146875f8d4b8a
                                                                                                    • Instruction Fuzzy Hash: EA3181715097806FE711CB25CC85F96BFF8EF06314F09849AE984CF292D365A909C776
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 16 94a361-94a3cf 19 94a3d4-94a3dd 16->19 20 94a3d1 16->20 21 94a3e2-94a3e8 19->21 22 94a3df 19->22 20->19 23 94a3ed-94a404 21->23 24 94a3ea 21->24 22->21 26 94a406-94a419 RegQueryValueExW 23->26 27 94a43b-94a440 23->27 24->23 28 94a442-94a447 26->28 29 94a41b-94a438 26->29 27->26 28->29
                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(?,00000E24,99F7E1AA,00000000,00000000,00000000,00000000), ref: 0094A40C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.1954933497.000000000094A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0094A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_94a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: 85cdad3dc9a0314f7ab199e8e95108b92af381571ee6e1cd2b865f0735bb7e99
                                                                                                    • Instruction ID: 731e99a0eb5398d907ba2f273d2a0c60b95e653cb964633ad04dc0c9089b8fd5
                                                                                                    • Opcode Fuzzy Hash: 85cdad3dc9a0314f7ab199e8e95108b92af381571ee6e1cd2b865f0735bb7e99
                                                                                                    • Instruction Fuzzy Hash: 98318175505780AFE721CF11CC84F96BBFCEF06310F08849AE9858B2A2D364E949CB72
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 33 94a462-94a4c3 36 94a4c5 33->36 37 94a4c8-94a4d4 33->37 36->37 38 94a4d6 37->38 39 94a4d9-94a4f0 37->39 38->39 41 94a527-94a52c 39->41 42 94a4f2-94a505 RegSetValueExW 39->42 41->42 43 94a507-94a524 42->43 44 94a52e-94a533 42->44 44->43
                                                                                                    APIs
                                                                                                    • RegSetValueExW.KERNELBASE(?,00000E24,99F7E1AA,00000000,00000000,00000000,00000000), ref: 0094A4F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.1954933497.000000000094A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0094A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_94a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: bf4b2b2c4ee6c3d4f705b7dd16702b1e34509adf1957845b49a3824246e7c65c
                                                                                                    • Instruction ID: f35e7ca932495f2d874cd18a3565685ffe6ceee2f486469560567759c095b0fd
                                                                                                    • Opcode Fuzzy Hash: bf4b2b2c4ee6c3d4f705b7dd16702b1e34509adf1957845b49a3824246e7c65c
                                                                                                    • Instruction Fuzzy Hash: 432192725447806FD7228F11DC44FA7BFBCEF46220F08849AE985CB652D364E948CB72
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 48 94a646-94a695 51 94a697 48->51 52 94a69a-94a6a3 48->52 51->52 53 94a6a5 52->53 54 94a6a8-94a6b1 52->54 53->54 55 94a702-94a707 54->55 56 94a6b3-94a6bb CreateMutexW 54->56 55->56 57 94a6c1-94a6d7 56->57 59 94a709-94a70e 57->59 60 94a6d9-94a6ff 57->60 59->60
                                                                                                    APIs
                                                                                                    • CreateMutexW.KERNELBASE(?,?), ref: 0094A6B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.1954933497.000000000094A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0094A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_94a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateMutex
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964310414-0
                                                                                                    • Opcode ID: d336fd7fbad23ce5851f2b6d05b4dacd3baf862eb8b60cee234bbdc91d172a72
                                                                                                    • Instruction ID: 63f058c12db5a72b2411890eab27bd06af6ed8146ef1f3c923172694dbfb91ba
                                                                                                    • Opcode Fuzzy Hash: d336fd7fbad23ce5851f2b6d05b4dacd3baf862eb8b60cee234bbdc91d172a72
                                                                                                    • Instruction Fuzzy Hash: 63218071604244AFE720CF25CD45FA6FBE8EF04314F08886AE9488B641D375E909CA76
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 63 94a710-94a778 65 94a7b9-94a7be 63->65 66 94a77a-94a782 FindCloseChangeNotification 63->66 65->66 68 94a788-94a79a 66->68 69 94a7c0-94a7c5 68->69 70 94a79c-94a7b8 68->70 69->70
                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 0094A780
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.1954933497.000000000094A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0094A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_94a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseFindNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 2591292051-0
                                                                                                    • Opcode ID: 4ea77beb26ded9f12b9318a373774d4c814e9d1bd81d11a734a3d08eade80229
                                                                                                    • Instruction ID: 6e1fe69c3586b065a7f16a30472718a42e880d884e419195df626742146870e1
                                                                                                    • Opcode Fuzzy Hash: 4ea77beb26ded9f12b9318a373774d4c814e9d1bd81d11a734a3d08eade80229
                                                                                                    • Instruction Fuzzy Hash: A721F6B55093805FDB128F25DC85751BFB8EF02320F0880DBDC858B653D2259909CB62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 72 94a392-94a3cf 74 94a3d4-94a3dd 72->74 75 94a3d1 72->75 76 94a3e2-94a3e8 74->76 77 94a3df 74->77 75->74 78 94a3ed-94a404 76->78 79 94a3ea 76->79 77->76 81 94a406-94a419 RegQueryValueExW 78->81 82 94a43b-94a440 78->82 79->78 83 94a442-94a447 81->83 84 94a41b-94a438 81->84 82->81 83->84
                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(?,00000E24,99F7E1AA,00000000,00000000,00000000,00000000), ref: 0094A40C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.1954933497.000000000094A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0094A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_94a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: 404e09b9ad71150d4e62bbbe72ada799ae63f52cb2b49f8a205ab64dedc43d17
                                                                                                    • Instruction ID: c1b9f21861596ee72d685f7ea91452dab6a54c2be7b128a6362f03217cde2e7f
                                                                                                    • Opcode Fuzzy Hash: 404e09b9ad71150d4e62bbbe72ada799ae63f52cb2b49f8a205ab64dedc43d17
                                                                                                    • Instruction Fuzzy Hash: 69219075640604AFE720CF15CC84FA7F7ECEF14710F08845AE9458B661D364E949CAB6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 88 94a486-94a4c3 90 94a4c5 88->90 91 94a4c8-94a4d4 88->91 90->91 92 94a4d6 91->92 93 94a4d9-94a4f0 91->93 92->93 95 94a527-94a52c 93->95 96 94a4f2-94a505 RegSetValueExW 93->96 95->96 97 94a507-94a524 96->97 98 94a52e-94a533 96->98 98->97
                                                                                                    APIs
                                                                                                    • RegSetValueExW.KERNELBASE(?,00000E24,99F7E1AA,00000000,00000000,00000000,00000000), ref: 0094A4F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.1954933497.000000000094A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0094A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_94a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: d332654670e92c62dc0451247661a26a1464c863bb577a520fb3d35d6f6bc54a
                                                                                                    • Instruction ID: 1e577a208da6a81e526363c9286d9a9a7713a8d17f8a919e90bd4228f8ab882d
                                                                                                    • Opcode Fuzzy Hash: d332654670e92c62dc0451247661a26a1464c863bb577a520fb3d35d6f6bc54a
                                                                                                    • Instruction Fuzzy Hash: D211D0B2640604AFEB20CF11CD45FABFBECEF04724F04845AED498A651D364E848CAB6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 102 94a74e-94a778 103 94a7b9-94a7be 102->103 104 94a77a-94a782 FindCloseChangeNotification 102->104 103->104 106 94a788-94a79a 104->106 107 94a7c0-94a7c5 106->107 108 94a79c-94a7b8 106->108 107->108
                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 0094A780
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.1954933497.000000000094A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0094A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_94a000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseFindNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 2591292051-0
                                                                                                    • Opcode ID: 532ab4f166d54ce2c15b71f210a049755de3a5c97aba7519f8d4c39a67d1227a
                                                                                                    • Instruction ID: bcade653be8b3e88989ea82be69f78227396185b8c39fcfa9524855673bef2db
                                                                                                    • Opcode Fuzzy Hash: 532ab4f166d54ce2c15b71f210a049755de3a5c97aba7519f8d4c39a67d1227a
                                                                                                    • Instruction Fuzzy Hash: 6501D475A002008FEB20CF15D985B65FBE8DF04320F08C4ABDD498B756D279E848CEA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 110 b60310-b60334 112 b60336-b60338 110->112 113 b6033e-b60346 110->113 112->113 114 b6034e-b6035c 113->114 115 b60348-b6034d 113->115 117 b60362-b60391 114->117 118 b6035e-b60360 114->118 120 b60393-b603bb 117->120 121 b603d8-b603ff 117->121 118->117 126 b603ce 120->126 127 b6040a-b60418 121->127 126->121 128 b6041f-b60434 127->128 129 b6041a 127->129 131 b60436-b60460 128->131 132 b6046b-b60523 128->132 129->128 131->132 151 b60525-b60569 132->151 152 b60570-b60587 132->152 151->152 153 b60880 152->153 154 b6058d-b605bf 152->154 154->153
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.1955172305.0000000000B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_b60000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a5953fd0f24c15f3538058c4991bff27f2ca0c8591c9cc5889c2c7cf711c3f4e
                                                                                                    • Instruction ID: 3a6681c6c91a1e388f78c8f3b9bd969fd66b22535e6adadb78d67fad61126a50
                                                                                                    • Opcode Fuzzy Hash: a5953fd0f24c15f3538058c4991bff27f2ca0c8591c9cc5889c2c7cf711c3f4e
                                                                                                    • Instruction Fuzzy Hash: 0B5104307243008FC718EB7A94506BE77E2AB85345B84416AE406DB7D9DF39DD0AD7A2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 165 b603bd-b60418 173 b6041f-b60434 165->173 174 b6041a 165->174 176 b60436-b60460 173->176 177 b6046b-b60523 173->177 174->173 176->177 196 b60525-b60569 177->196 197 b60570-b60587 177->197 196->197 198 b60880 197->198 199 b6058d-b605bf 197->199 199->198
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.1955172305.0000000000B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_b60000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 491c49124031cb39be5bc66a7d19f43d6af4215b678d1ccdf6554244a5421273
                                                                                                    • Instruction ID: b02ea76a6be0006fcaa03a303a24dda01aa8ff797c8bbc9f3f77c46eb7fc1dc4
                                                                                                    • Opcode Fuzzy Hash: 491c49124031cb39be5bc66a7d19f43d6af4215b678d1ccdf6554244a5421273
                                                                                                    • Instruction Fuzzy Hash: 1841E4307142104BCB18FB7A84557BE32D3AFC5349784506AE406EBBD5EF29DD0A97A2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 210 b60080-b600ad 213 b600b8-b602f9 210->213
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.1955172305.0000000000B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_b60000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 84addd0bea2d6bd4f56753d1965b3d3e32a08ee7440490e19beb58b6989ae858
                                                                                                    • Instruction ID: c9654aabb3d47db42a2c0378b17316ed46a926e76fc7378a3e46bfa00f2577b0
                                                                                                    • Opcode Fuzzy Hash: 84addd0bea2d6bd4f56753d1965b3d3e32a08ee7440490e19beb58b6989ae858
                                                                                                    • Instruction Fuzzy Hash: 6F5122306152468FC708FF75E59598977E2BB86248780EA2ED0048B76EEF34598ECBD1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 251 b60006-b60076
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.1955172305.0000000000B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_b60000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2c719fdfa604481cbdb128b1468738d1cc3ca5fa4a6770069ffeb6decee9ba64
                                                                                                    • Instruction ID: 2e730683e4dc8ab09902c8cbe8a963485a0d07ff38b969da813fb25a02343dd3
                                                                                                    • Opcode Fuzzy Hash: 2c719fdfa604481cbdb128b1468738d1cc3ca5fa4a6770069ffeb6decee9ba64
                                                                                                    • Instruction Fuzzy Hash: 6101529649E3C54FEB5347741C28290BFB06E2322079B42CBC4C1CB6EBE28C194AC326
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 252 a005e0-a00603 253 a00606-a00620 252->253 254 a00626-a00643 253->254
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.1955071135.0000000000A00000.00000040.00000020.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_a00000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 11d2aeaa837a31bbf4550087627f6ddbead8005e4bdd5da96199a0adc32faa95
                                                                                                    • Instruction ID: 46f67ebafa00627b6fcd02b7d039e3d963a244d0b4afc52cf0a38c0d05804404
                                                                                                    • Opcode Fuzzy Hash: 11d2aeaa837a31bbf4550087627f6ddbead8005e4bdd5da96199a0adc32faa95
                                                                                                    • Instruction Fuzzy Hash: FF01867650D7846FD7118B16AC41862FFA8EF86520709C4DFEC898B652D225A809CBB2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 255 a00606-a00620 256 a00626-a00643 255->256
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.1955071135.0000000000A00000.00000040.00000020.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_a00000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5568be3c15376bb6297f69f86572457103e84075f863ec8441dd2384eba88158
                                                                                                    • Instruction ID: 1a748c86eb28d9a6f6416cbf2acb1e7fa13bc74f1bf84826d8dbf530803d50eb
                                                                                                    • Opcode Fuzzy Hash: 5568be3c15376bb6297f69f86572457103e84075f863ec8441dd2384eba88158
                                                                                                    • Instruction Fuzzy Hash: 7FE092B66046044BD750CF0AEC41462F7D8EB84630708C07FDC0D8B711D275B508CAA5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 257 9423f4-9423ff 258 942401-94240e 257->258 259 942412-942417 257->259 258->259 260 942419 259->260 261 94241a 259->261 262 942420-942421 261->262
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.1954919001.0000000000942000.00000040.00000800.00020000.00000000.sdmp, Offset: 00942000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_942000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0ee79bde8398fd0b276580aa91a8f02483469bb0738d8afe275998fc7d8e8001
                                                                                                    • Instruction ID: 72a054d90e571705c3fce6e5e4abda66b22e58eff0724bb9468d4d0806128002
                                                                                                    • Opcode Fuzzy Hash: 0ee79bde8398fd0b276580aa91a8f02483469bb0738d8afe275998fc7d8e8001
                                                                                                    • Instruction Fuzzy Hash: D1D05E792096C14FD3169B1CC2A8FA537D8BB51714F8A44F9B8408BBB3CB68D9C5D640
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000008.00000002.1954919001.0000000000942000.00000040.00000800.00020000.00000000.sdmp, Offset: 00942000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_8_2_942000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d76870e9ae114e5d505f9cbd02ff5c434bd64738faf46f60fa864c0364629fea
                                                                                                    • Instruction ID: ca640176afc5b99dc4b05758199d7430fd6a4674efa516fcc7bb6f26e997d0f6
                                                                                                    • Opcode Fuzzy Hash: d76870e9ae114e5d505f9cbd02ff5c434bd64738faf46f60fa864c0364629fea
                                                                                                    • Instruction Fuzzy Hash: 0FD05E342006814BC715DF0CC2D4F5937E8BB40B14F1A44E8BC108B762C7B8DCC5CA00
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:11.2%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:0%
                                                                                                    Total number of Nodes:19
                                                                                                    Total number of Limit Nodes:1
                                                                                                    execution_graph 534 7ba74e 535 7ba77a FindCloseChangeNotification 534->535 536 7ba7b9 534->536 537 7ba788 535->537 536->535 550 7ba462 553 7ba486 RegSetValueExW 550->553 552 7ba507 553->552 558 7ba612 561 7ba646 CreateMutexW 558->561 560 7ba6c1 561->560 554 7ba361 555 7ba392 RegQueryValueExW 554->555 557 7ba41b 555->557 562 7ba710 563 7ba74e FindCloseChangeNotification 562->563 565 7ba788 563->565 542 7ba646 543 7ba67e CreateMutexW 542->543 545 7ba6c1 543->545

                                                                                                    Callgraph

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 0 7ba612-7ba695 4 7ba69a-7ba6a3 0->4 5 7ba697 0->5 6 7ba6a8-7ba6b1 4->6 7 7ba6a5 4->7 5->4 8 7ba6b3-7ba6d7 CreateMutexW 6->8 9 7ba702-7ba707 6->9 7->6 12 7ba709-7ba70e 8->12 13 7ba6d9-7ba6ff 8->13 9->8 12->13
                                                                                                    APIs
                                                                                                    • CreateMutexW.KERNELBASE(?,?), ref: 007BA6B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2065721018.00000000007BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 007BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_7ba000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateMutex
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964310414-0
                                                                                                    • Opcode ID: 79497cf5580a2fda9f40cb06039e1b227b462100071c9787f0ff9ea24a6424c4
                                                                                                    • Instruction ID: b5ada96b2cd7d7ff37cf3d646869c9e88c2a6cc830814b80c5616b692ed7cc9b
                                                                                                    • Opcode Fuzzy Hash: 79497cf5580a2fda9f40cb06039e1b227b462100071c9787f0ff9ea24a6424c4
                                                                                                    • Instruction Fuzzy Hash: DD3193B15093806FE712CB25CC85B96BFF8EF06314F08849AE984CF292D375A909C772
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 16 7ba361-7ba3cf 19 7ba3d1 16->19 20 7ba3d4-7ba3dd 16->20 19->20 21 7ba3df 20->21 22 7ba3e2-7ba3e8 20->22 21->22 23 7ba3ea 22->23 24 7ba3ed-7ba404 22->24 23->24 26 7ba43b-7ba440 24->26 27 7ba406-7ba419 RegQueryValueExW 24->27 26->27 28 7ba41b-7ba438 27->28 29 7ba442-7ba447 27->29 29->28
                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(?,00000E24,FB2AD30F,00000000,00000000,00000000,00000000), ref: 007BA40C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2065721018.00000000007BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 007BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_7ba000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: 162b9d244382cd08d302ce11878c025f87e11b60ab6c28cfb17c2f180fa91ee7
                                                                                                    • Instruction ID: 3e5c8f91189f34b916ab776283e70606619effb1169ee2a5f301f6da062ab149
                                                                                                    • Opcode Fuzzy Hash: 162b9d244382cd08d302ce11878c025f87e11b60ab6c28cfb17c2f180fa91ee7
                                                                                                    • Instruction Fuzzy Hash: C9316175505780AFD721CF15CC84F96BBF8EF06710F08849AE9858B292D364E949CB72
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 33 7ba462-7ba4c3 36 7ba4c8-7ba4d4 33->36 37 7ba4c5 33->37 38 7ba4d9-7ba4f0 36->38 39 7ba4d6 36->39 37->36 41 7ba4f2-7ba505 RegSetValueExW 38->41 42 7ba527-7ba52c 38->42 39->38 43 7ba52e-7ba533 41->43 44 7ba507-7ba524 41->44 42->41 43->44
                                                                                                    APIs
                                                                                                    • RegSetValueExW.KERNELBASE(?,00000E24,FB2AD30F,00000000,00000000,00000000,00000000), ref: 007BA4F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2065721018.00000000007BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 007BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_7ba000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: 00aa2069626c5c2bff3eb8e71cd85e7bf60145638004562617949fbb33f69c35
                                                                                                    • Instruction ID: 57054840922ee4af657586739befdeed5be516b94a342993447ea03b6c3c04c7
                                                                                                    • Opcode Fuzzy Hash: 00aa2069626c5c2bff3eb8e71cd85e7bf60145638004562617949fbb33f69c35
                                                                                                    • Instruction Fuzzy Hash: A2218EB25043806FDB228F15DC44FA7BFBCEF46210F08849AE985CB652D264E948CB72
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 48 7ba646-7ba695 51 7ba69a-7ba6a3 48->51 52 7ba697 48->52 53 7ba6a8-7ba6b1 51->53 54 7ba6a5 51->54 52->51 55 7ba6b3-7ba6bb CreateMutexW 53->55 56 7ba702-7ba707 53->56 54->53 57 7ba6c1-7ba6d7 55->57 56->55 59 7ba709-7ba70e 57->59 60 7ba6d9-7ba6ff 57->60 59->60
                                                                                                    APIs
                                                                                                    • CreateMutexW.KERNELBASE(?,?), ref: 007BA6B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2065721018.00000000007BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 007BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_7ba000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateMutex
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964310414-0
                                                                                                    • Opcode ID: d9bb0935e6f48b6fd598cce21d56e96ad83f3c7472a1b6b6728bc8c5af3bf93f
                                                                                                    • Instruction ID: 23f6551c71a3dd8021967a2c164d6b1f2bca7031949318c39f6a7b780ef22930
                                                                                                    • Opcode Fuzzy Hash: d9bb0935e6f48b6fd598cce21d56e96ad83f3c7472a1b6b6728bc8c5af3bf93f
                                                                                                    • Instruction Fuzzy Hash: B121A4B1604244AFE720DF25CD85BAAFBE8EF04314F088469ED48CB741D775E909CA76
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 63 7ba710-7ba778 65 7ba77a-7ba782 FindCloseChangeNotification 63->65 66 7ba7b9-7ba7be 63->66 67 7ba788-7ba79a 65->67 66->65 69 7ba79c-7ba7b8 67->69 70 7ba7c0-7ba7c5 67->70 70->69
                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 007BA780
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2065721018.00000000007BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 007BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_7ba000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseFindNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 2591292051-0
                                                                                                    • Opcode ID: 335df7d4aba37c251884877d767a0f91162756240106e4265402cdbdf3dc74cb
                                                                                                    • Instruction ID: 7d5f5fbcec2a9f16f0ef90154c746bdce42a59517a30923a6090363dc35e0ded
                                                                                                    • Opcode Fuzzy Hash: 335df7d4aba37c251884877d767a0f91162756240106e4265402cdbdf3dc74cb
                                                                                                    • Instruction Fuzzy Hash: EF21F3B55093809FDB128F25DC85792BFB8EF02320F0880EBDC848B653D2259909CB62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 72 7ba392-7ba3cf 74 7ba3d1 72->74 75 7ba3d4-7ba3dd 72->75 74->75 76 7ba3df 75->76 77 7ba3e2-7ba3e8 75->77 76->77 78 7ba3ea 77->78 79 7ba3ed-7ba404 77->79 78->79 81 7ba43b-7ba440 79->81 82 7ba406-7ba419 RegQueryValueExW 79->82 81->82 83 7ba41b-7ba438 82->83 84 7ba442-7ba447 82->84 84->83
                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(?,00000E24,FB2AD30F,00000000,00000000,00000000,00000000), ref: 007BA40C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2065721018.00000000007BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 007BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_7ba000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: dc2e6138d9e4a68b4e15cb227035f54fe356ede5e7bc57d04aec07a6c8a51558
                                                                                                    • Instruction ID: 4e7017f4e44977579fb92be2a69db7e0a92992c9f58e8676b8cad3afaf39a45a
                                                                                                    • Opcode Fuzzy Hash: dc2e6138d9e4a68b4e15cb227035f54fe356ede5e7bc57d04aec07a6c8a51558
                                                                                                    • Instruction Fuzzy Hash: 1921AF75600644AFEB20DF15CC84FA6F7ECEF04710F18846AE949CB651D7A4E949CAB2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 88 7ba486-7ba4c3 90 7ba4c8-7ba4d4 88->90 91 7ba4c5 88->91 92 7ba4d9-7ba4f0 90->92 93 7ba4d6 90->93 91->90 95 7ba4f2-7ba505 RegSetValueExW 92->95 96 7ba527-7ba52c 92->96 93->92 97 7ba52e-7ba533 95->97 98 7ba507-7ba524 95->98 96->95 97->98
                                                                                                    APIs
                                                                                                    • RegSetValueExW.KERNELBASE(?,00000E24,FB2AD30F,00000000,00000000,00000000,00000000), ref: 007BA4F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2065721018.00000000007BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 007BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_7ba000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: 6616df3084d04e7a0c7515fc5a33fd893b1f5779bf0c8babcf0e7c9d3ad9024e
                                                                                                    • Instruction ID: f96266775a64da2026bb1c3dac8e22b5a7715ed09e874ca85ed54c42639d018e
                                                                                                    • Opcode Fuzzy Hash: 6616df3084d04e7a0c7515fc5a33fd893b1f5779bf0c8babcf0e7c9d3ad9024e
                                                                                                    • Instruction Fuzzy Hash: 5811BEB2600644AFEB30DE15CC44FAABBECEF04710F04845AED498A651D364E9488AB2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 102 7ba74e-7ba778 103 7ba77a-7ba782 FindCloseChangeNotification 102->103 104 7ba7b9-7ba7be 102->104 105 7ba788-7ba79a 103->105 104->103 107 7ba79c-7ba7b8 105->107 108 7ba7c0-7ba7c5 105->108 108->107
                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 007BA780
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2065721018.00000000007BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 007BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_7ba000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseFindNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 2591292051-0
                                                                                                    • Opcode ID: cc3599a67dd9f794a6b32166fd67b0ea52354359fe8d98efa97428434a472e6e
                                                                                                    • Instruction ID: 48dd038ecaa9f49552423359d943fdaed75ae9f0f8b41bf774e7eeac92a76e7a
                                                                                                    • Opcode Fuzzy Hash: cc3599a67dd9f794a6b32166fd67b0ea52354359fe8d98efa97428434a472e6e
                                                                                                    • Instruction Fuzzy Hash: 5201DF71A04200AFEB10DF25D9847A6FBE4DF04320F08C4ABDD498B756D679E848CEA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 110 c9026d-c905b2 112 c905b4-c905be 110->112 113 c90607-c90620 110->113 114 c90626-c90643 113->114
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2066277033.0000000000C90000.00000040.00000020.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_c90000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a19a6083696d808abd87fbb439202754618b76d0bb2c5360e5d50fc232b28c55
                                                                                                    • Instruction ID: e7e499aae112c8cd34d996f91c6e37f311e6abcbcb0a53257e5b91ca3bbf3a60
                                                                                                    • Opcode Fuzzy Hash: a19a6083696d808abd87fbb439202754618b76d0bb2c5360e5d50fc232b28c55
                                                                                                    • Instruction Fuzzy Hash: CB31DDA244E3C04FD7038B359D65161BFB0AE53224B1E81DBD889CF5A3D26D980AC763
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 115 49a0310-49a0334 117 49a033e-49a0346 115->117 118 49a0336-49a0338 115->118 119 49a0348-49a034d 117->119 120 49a034e-49a0391 117->120 118->117 123 49a03d8-49a03ff 120->123 124 49a0393-49a03bb 120->124 130 49a040a-49a0418 123->130 129 49a03ce 124->129 129->123 131 49a041a 130->131 132 49a041f-49a0434 130->132 131->132 134 49a046b-49a0523 132->134 135 49a0436-49a0460 132->135 154 49a0570-49a0587 134->154 155 49a0525-49a0569 134->155 135->134 156 49a058d-49a05bf 154->156 157 49a0880 154->157 155->154 156->157
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2066564745.00000000049A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_49a0000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 01fa9ce566ac033187116d9ef320e18f244aa9c4c7315445038bc0c1e44b4c12
                                                                                                    • Instruction ID: edd2d4a1c0e61a9234b10b3454cc8cad8e9967be5c792f45629ea3355c0cd632
                                                                                                    • Opcode Fuzzy Hash: 01fa9ce566ac033187116d9ef320e18f244aa9c4c7315445038bc0c1e44b4c12
                                                                                                    • Instruction Fuzzy Hash: 72512330B042008FC718EB798854ABD77E7AF85304B148579E006DB7D5EF39ED0A97A2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 168 49a03bd-49a0418 176 49a041a 168->176 177 49a041f-49a0434 168->177 176->177 179 49a046b-49a0523 177->179 180 49a0436-49a0460 177->180 199 49a0570-49a0587 179->199 200 49a0525-49a0569 179->200 180->179 201 49a058d-49a05bf 199->201 202 49a0880 199->202 200->199 201->202
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2066564745.00000000049A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_49a0000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 33a6db632e6a06f6a65d0f5fcd79f3cbc1ef4f9632374316c1b937b398ea88eb
                                                                                                    • Instruction ID: fb88c49fee49221851866b945ae84e55ac948c6763b4539beabd5cce390e41e4
                                                                                                    • Opcode Fuzzy Hash: 33a6db632e6a06f6a65d0f5fcd79f3cbc1ef4f9632374316c1b937b398ea88eb
                                                                                                    • Instruction Fuzzy Hash: 5241E330B046108BDB18BBBD84187BD76D79FC53487048469E006EB795EF29DD0A97E3
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 213 49a0080-49a00ad 216 49a00b8-49a02f9 213->216
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2066564745.00000000049A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_49a0000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 54865c8288d39b93c0d8a85d57848eb820eca20b2f45bab5e4b3e3646600a54e
                                                                                                    • Instruction ID: 5257b49dcaf7318d66061e1f210132024aa535ad947cbcdba45dcc02a27eb32c
                                                                                                    • Opcode Fuzzy Hash: 54865c8288d39b93c0d8a85d57848eb820eca20b2f45bab5e4b3e3646600a54e
                                                                                                    • Instruction Fuzzy Hash: A1511130616A46CBC704FF7DE59998A77F2BB85208700CAADD0448B76EDF34595ECB82
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 254 c905e0-c90606 256 c90607-c90620 254->256 257 c90626-c90643 256->257
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2066277033.0000000000C90000.00000040.00000020.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_c90000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a66c68a39310c52adf7f123b8f92d0fc48d038c827523b43af8b72f3ddfd11a7
                                                                                                    • Instruction ID: 928ef855f3228dfc3c6ac0d52b67ae683b42bae703035df7df3af75be72c398d
                                                                                                    • Opcode Fuzzy Hash: a66c68a39310c52adf7f123b8f92d0fc48d038c827523b43af8b72f3ddfd11a7
                                                                                                    • Instruction Fuzzy Hash: 5F0186B650D7806FD7118B06AD40862FFB8EF8662070984DFEC498B652D225A808CB76
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 258 49a0006-49a0076
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2066564745.00000000049A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049A0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_49a0000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a1fe574b94ee739ceaf6b060472efd3eba34e4ab1d82b386fc0efb06800d51d8
                                                                                                    • Instruction ID: b4fe6358ddd36010a0a097d87d512e5ffb81ab43056ec46e2c413991e7eb10d2
                                                                                                    • Opcode Fuzzy Hash: a1fe574b94ee739ceaf6b060472efd3eba34e4ab1d82b386fc0efb06800d51d8
                                                                                                    • Instruction Fuzzy Hash: 6201FE8544E3C25FE70743701C789947FB0AE47105B4A81DBD990CB9A7D54C298AD762
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 261 c90606-c90620 263 c90626-c90643 261->263
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2066277033.0000000000C90000.00000040.00000020.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_c90000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 62d6db7e43667e2a06cb294b35b439d6add704b0e01bb56cc5bb66e6c8a1d1ec
                                                                                                    • Instruction ID: 41aeda7d43d9f0bbfb4b20181e1ecc93d4e7e8eed42368d79575b20c294678e9
                                                                                                    • Opcode Fuzzy Hash: 62d6db7e43667e2a06cb294b35b439d6add704b0e01bb56cc5bb66e6c8a1d1ec
                                                                                                    • Instruction Fuzzy Hash: 2FE092B6A046044BD650DF0AED81452F7D8EB84630718C07FDC0D8B711D635B508CEA6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2065703116.00000000007B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 007B2000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_7b2000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f2aef786ce693c3d126bd91b4d0eae3dcffcb0fe924688e22641edf619e9383d
                                                                                                    • Instruction ID: 23e2a45a7fad48db60053356d80f01158362849de4ef0d34415c1414ee5cb0a1
                                                                                                    • Opcode Fuzzy Hash: f2aef786ce693c3d126bd91b4d0eae3dcffcb0fe924688e22641edf619e9383d
                                                                                                    • Instruction Fuzzy Hash: 75D02E793026C04FD3128A0CC2A8BC53BD4AF40704F0A00F9A8008BB63C72CDCC6C200
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2065703116.00000000007B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 007B2000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_7b2000_QsKtlzYaKF.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 70fc87ee2b636c064b6ad0cb9b0f30bea8c2d2b44495404c5e717f2ed12bc844
                                                                                                    • Instruction ID: ad10fde49838663adcd3372d7a2669f13ba491b954095a94261684a72f566f5f
                                                                                                    • Opcode Fuzzy Hash: 70fc87ee2b636c064b6ad0cb9b0f30bea8c2d2b44495404c5e717f2ed12bc844
                                                                                                    • Instruction Fuzzy Hash: 14D05E342016814BC715DA0CC2D4F9937D4AB44714F1A44E8BC108B762C7BCD8C6CA00
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%