Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
pQBmVoyRnw.exe

Overview

General Information

Sample name:pQBmVoyRnw.exe
renamed because original name is a hash value
Original sample name:16c7b2832ce255d5da4a5d85a4089758.exe
Analysis ID:1361720
MD5:16c7b2832ce255d5da4a5d85a4089758
SHA1:80ed8b75ae30bc4df6671c5bca8084aba2148ef4
SHA256:fd13ed8d469c4cb5507716feee5c7139c38957b48a4ebff2d40d7a9269884387
Tags:exenjratRAT
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Drops fake system file at system root drive
Snort IDS alert for network traffic
Yara detected Njrat
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to log keystrokes (.Net Source)
Creates autorun.inf (USB autostart)
Drops PE files to the user root directory
Drops PE files with benign system names
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Protects its processes via BreakOnTermination flag
Uses netsh to modify the Windows network and firewall settings
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Drops PE files
Drops PE files to the user directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • pQBmVoyRnw.exe (PID: 5408 cmdline: C:\Users\user\Desktop\pQBmVoyRnw.exe MD5: 16C7B2832CE255D5DA4A5D85A4089758)
    • System.exe (PID: 4488 cmdline: "C:\Users\user\System.exe" MD5: 16C7B2832CE255D5DA4A5D85A4089758)
      • netsh.exe (PID: 5764 cmdline: netsh firewall add allowedprogram "C:\Users\user\System.exe" "System.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • conhost.exe (PID: 2844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Host": "2.tcp.eu.ngrok.io", "Port": "18490", "Version": "im523", "Campaign ID": "GODLI", "Install Name": "System.exe", "Install Dir": "UserProfile"}
SourceRuleDescriptionAuthorStrings
pQBmVoyRnw.exeJoeSecurity_NjratYara detected NjratJoe Security
    pQBmVoyRnw.exeWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0x64c1:$a1: get_Registry
    • 0x7f08:$a3: Download ERROR
    • 0x81fa:$a5: netsh firewall delete allowedprogram "
    pQBmVoyRnw.exenjrat1Identify njRatBrian Wallace @botnet_hunter
    • 0x80f0:$a1: netsh firewall add allowedprogram
    • 0x82ea:$b1: [TAP]
    • 0x8290:$b2: & exit
    • 0x825c:$c1: md.exe /k ping 0 & del
    pQBmVoyRnw.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
    • 0x81fa:$s1: netsh firewall delete allowedprogram
    • 0x80f0:$s2: netsh firewall add allowedprogram
    • 0x825a:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
    • 0x7ee4:$s4: Execute ERROR
    • 0x7f44:$s4: Execute ERROR
    • 0x7f08:$s5: Download ERROR
    • 0x82a0:$s6: [kl]
    SourceRuleDescriptionAuthorStrings
    C:\svchost.exeJoeSecurity_NjratYara detected NjratJoe Security
      C:\svchost.exeWindows_Trojan_Njrat_30f3c220unknownunknown
      • 0x64c1:$a1: get_Registry
      • 0x7f08:$a3: Download ERROR
      • 0x81fa:$a5: netsh firewall delete allowedprogram "
      C:\svchost.exenjrat1Identify njRatBrian Wallace @botnet_hunter
      • 0x80f0:$a1: netsh firewall add allowedprogram
      • 0x82ea:$b1: [TAP]
      • 0x8290:$b2: & exit
      • 0x825c:$c1: md.exe /k ping 0 & del
      C:\svchost.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
      • 0x81fa:$s1: netsh firewall delete allowedprogram
      • 0x80f0:$s2: netsh firewall add allowedprogram
      • 0x825a:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
      • 0x7ee4:$s4: Execute ERROR
      • 0x7f44:$s4: Execute ERROR
      • 0x7f08:$s5: Download ERROR
      • 0x82a0:$s6: [kl]
      C:\Users\user\System.exeJoeSecurity_NjratYara detected NjratJoe Security
        Click to see the 3 entries
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.1651277682.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
          00000000.00000000.1651277682.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
          • 0x62c1:$a1: get_Registry
          • 0x7d08:$a3: Download ERROR
          • 0x7ffa:$a5: netsh firewall delete allowedprogram "
          00000000.00000000.1651277682.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
          • 0x7ef0:$a1: netsh firewall add allowedprogram
          • 0x80ea:$b1: [TAP]
          • 0x8090:$b2: & exit
          • 0x805c:$c1: md.exe /k ping 0 & del
          00000001.00000002.4111124324.0000000002E71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
            Process Memory Space: pQBmVoyRnw.exe PID: 5408JoeSecurity_NjratYara detected NjratJoe Security
              Click to see the 1 entries
              SourceRuleDescriptionAuthorStrings
              0.0.pQBmVoyRnw.exe.ee0000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
                0.0.pQBmVoyRnw.exe.ee0000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
                • 0x64c1:$a1: get_Registry
                • 0x7f08:$a3: Download ERROR
                • 0x81fa:$a5: netsh firewall delete allowedprogram "
                0.0.pQBmVoyRnw.exe.ee0000.0.unpacknjrat1Identify njRatBrian Wallace @botnet_hunter
                • 0x80f0:$a1: netsh firewall add allowedprogram
                • 0x82ea:$b1: [TAP]
                • 0x8290:$b2: & exit
                • 0x825c:$c1: md.exe /k ping 0 & del
                0.0.pQBmVoyRnw.exe.ee0000.0.unpackMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
                • 0x81fa:$s1: netsh firewall delete allowedprogram
                • 0x80f0:$s2: netsh firewall add allowedprogram
                • 0x825a:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
                • 0x7ee4:$s4: Execute ERROR
                • 0x7f44:$s4: Execute ERROR
                • 0x7f08:$s5: Download ERROR
                • 0x82a0:$s6: [kl]

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\System.exe, ProcessId: 4488, TargetFilename: C:\svchost.exe
                Timestamp:192.168.2.418.192.93.8649742184902814856 12/13/23-20:59:05.476604
                SID:2814856
                Source Port:49742
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649741184902814856 12/13/23-20:58:48.936323
                SID:2814856
                Source Port:49741
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949745184902814856 12/13/23-21:00:01.573922
                SID:2814856
                Source Port:49745
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949744184902814856 12/13/23-20:59:39.970423
                SID:2814856
                Source Port:49744
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649740184902814856 12/13/23-20:58:31.218361
                SID:2814856
                Source Port:49740
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949746184902814856 12/13/23-21:00:14.421142
                SID:2814856
                Source Port:49746
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949735184902033132 12/13/23-20:57:35.118070
                SID:2033132
                Source Port:49735
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949736184902033132 12/13/23-20:57:37.678304
                SID:2033132
                Source Port:49736
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949735184902825563 12/13/23-20:57:35.360179
                SID:2825563
                Source Port:49735
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849748184902033132 12/13/23-21:00:35.097288
                SID:2033132
                Source Port:49748
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949736184902825563 12/13/23-20:57:37.919447
                SID:2825563
                Source Port:49736
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949729184902814856 12/13/23-20:57:12.551556
                SID:2814856
                Source Port:49729
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949745184902814860 12/13/23-21:00:04.191355
                SID:2814860
                Source Port:49745
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949736184902825564 12/13/23-20:57:41.941315
                SID:2825564
                Source Port:49736
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949738184902825564 12/13/23-20:58:06.222500
                SID:2825564
                Source Port:49738
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849749184902033132 12/13/23-21:00:49.784107
                SID:2033132
                Source Port:49749
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949738184902825563 12/13/23-20:57:57.039800
                SID:2825563
                Source Port:49738
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949729184902033132 12/13/23-20:57:12.311856
                SID:2033132
                Source Port:49729
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649740184902814860 12/13/23-20:58:34.292329
                SID:2814860
                Source Port:49740
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849748184902825563 12/13/23-21:00:35.340154
                SID:2825563
                Source Port:49748
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949746184902814860 12/13/23-21:00:20.521339
                SID:2814860
                Source Port:49746
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949738184902033132 12/13/23-20:57:56.798992
                SID:2033132
                Source Port:49738
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649742184902814860 12/13/23-20:59:22.207993
                SID:2814860
                Source Port:49742
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849748184902825564 12/13/23-21:00:43.961202
                SID:2825564
                Source Port:49748
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949736184902814860 12/13/23-20:57:41.941315
                SID:2814860
                Source Port:49736
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949745184902825563 12/13/23-21:00:01.573922
                SID:2825563
                Source Port:49745
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649741184902814860 12/13/23-20:58:50.550982
                SID:2814860
                Source Port:49741
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649742184902033132 12/13/23-20:59:05.233882
                SID:2033132
                Source Port:49742
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949744184902825563 12/13/23-20:59:39.970423
                SID:2825563
                Source Port:49744
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949743184902825564 12/13/23-20:59:36.738003
                SID:2825564
                Source Port:49743
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949738184902814860 12/13/23-20:58:06.222500
                SID:2814860
                Source Port:49738
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949729184902814860 12/13/23-20:57:17.144904
                SID:2814860
                Source Port:49729
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649741184902033132 12/13/23-20:58:48.693931
                SID:2033132
                Source Port:49741
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949743184902825563 12/13/23-20:59:29.420656
                SID:2825563
                Source Port:49743
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649740184902033132 12/13/23-20:58:30.976409
                SID:2033132
                Source Port:49740
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849747184902825563 12/13/23-21:00:31.845369
                SID:2825563
                Source Port:49747
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849747184902825564 12/13/23-21:00:32.601428
                SID:2825564
                Source Port:49747
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849747184902814856 12/13/23-21:00:31.845369
                SID:2814856
                Source Port:49747
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949736184902814856 12/13/23-20:57:37.919447
                SID:2814856
                Source Port:49736
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649739184902814860 12/13/23-20:58:28.703174
                SID:2814860
                Source Port:49739
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949735184902814856 12/13/23-20:57:35.360179
                SID:2814856
                Source Port:49735
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949744184902033132 12/13/23-20:59:39.730343
                SID:2033132
                Source Port:49744
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949743184902033132 12/13/23-20:59:29.178728
                SID:2033132
                Source Port:49743
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949745184902033132 12/13/23-21:00:01.333423
                SID:2033132
                Source Port:49745
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949745184902825564 12/13/23-21:00:04.191355
                SID:2825564
                Source Port:49745
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949746184902033132 12/13/23-21:00:14.180570
                SID:2033132
                Source Port:49746
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849748184902814860 12/13/23-21:00:46.399246
                SID:2814860
                Source Port:49748
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949746184902825564 12/13/23-21:00:20.521339
                SID:2825564
                Source Port:49746
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649739184902814856 12/13/23-20:58:12.572286
                SID:2814856
                Source Port:49739
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949746184902825563 12/13/23-21:00:14.421142
                SID:2825563
                Source Port:49746
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949738184902814856 12/13/23-20:57:57.039800
                SID:2814856
                Source Port:49738
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649739184902825564 12/13/23-20:58:28.503388
                SID:2825564
                Source Port:49739
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949729184902825563 12/13/23-20:57:12.551556
                SID:2825563
                Source Port:49729
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949729184902825564 12/13/23-20:57:17.144904
                SID:2825564
                Source Port:49729
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949743184902814860 12/13/23-20:59:37.308006
                SID:2814860
                Source Port:49743
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849747184902814860 12/13/23-21:00:32.601428
                SID:2814860
                Source Port:49747
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849747184902033132 12/13/23-21:00:31.603382
                SID:2033132
                Source Port:49747
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649739184902033132 12/13/23-20:58:12.331562
                SID:2033132
                Source Port:49739
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649740184902825564 12/13/23-20:58:34.292329
                SID:2825564
                Source Port:49740
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649741184902825564 12/13/23-20:58:50.550982
                SID:2825564
                Source Port:49741
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649741184902825563 12/13/23-20:58:48.936323
                SID:2825563
                Source Port:49741
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649740184902825563 12/13/23-20:58:31.218361
                SID:2825563
                Source Port:49740
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849749184902814856 12/13/23-21:00:50.028478
                SID:2814856
                Source Port:49749
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.156.13.20949743184902814856 12/13/23-20:59:29.420656
                SID:2814856
                Source Port:49743
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649742184902825564 12/13/23-20:59:22.207993
                SID:2825564
                Source Port:49742
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849748184902814856 12/13/23-21:00:35.340154
                SID:2814856
                Source Port:49748
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649742184902825563 12/13/23-20:59:05.476604
                SID:2825563
                Source Port:49742
                Destination Port:18490
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: pQBmVoyRnw.exeAvira: detected
                Source: 2.tcp.eu.ngrok.ioAvira URL Cloud: Label: malware
                Source: C:\Users\user\System.exeAvira: detection malicious, Label: TR/ATRAPS.Gen
                Source: C:\svchost.exeAvira: detection malicious, Label: TR/ATRAPS.Gen
                Source: 00000001.00000002.4111124324.0000000002E71000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Njrat {"Host": "2.tcp.eu.ngrok.io", "Port": "18490", "Version": "im523", "Campaign ID": "GODLI", "Install Name": "System.exe", "Install Dir": "UserProfile"}
                Source: Yara matchFile source: pQBmVoyRnw.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.pQBmVoyRnw.exe.ee0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1651277682.0000000000EE2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4111124324.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: pQBmVoyRnw.exe PID: 5408, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: System.exe PID: 4488, type: MEMORYSTR
                Source: Yara matchFile source: C:\svchost.exe, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\System.exe, type: DROPPED
                Source: C:\Users\user\System.exeJoe Sandbox ML: detected
                Source: C:\svchost.exeJoe Sandbox ML: detected
                Source: pQBmVoyRnw.exeJoe Sandbox ML: detected
                Source: pQBmVoyRnw.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
                Source: pQBmVoyRnw.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Spreading

                barindex
                Source: C:\Users\user\System.exeFile created: C:\autorun.infJump to behavior
                Source: pQBmVoyRnw.exe, 00000000.00000002.1719583733.0000000003711000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
                Source: pQBmVoyRnw.exe, 00000000.00000002.1719583733.0000000003711000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
                Source: pQBmVoyRnw.exe, 00000000.00000000.1651277682.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: autorun.inf
                Source: pQBmVoyRnw.exe, 00000000.00000000.1651277682.0000000000EE2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: [autorun]
                Source: System.exe, 00000001.00000002.4111124324.0000000002E71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
                Source: System.exe, 00000001.00000002.4111124324.0000000002E71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
                Source: pQBmVoyRnw.exeBinary or memory string: autorun.inf
                Source: pQBmVoyRnw.exeBinary or memory string: [autorun]
                Source: autorun.inf.1.drBinary or memory string: [autorun]
                Source: System.exe.0.drBinary or memory string: autorun.inf
                Source: System.exe.0.drBinary or memory string: [autorun]
                Source: svchost.exe.1.drBinary or memory string: autorun.inf
                Source: svchost.exe.1.drBinary or memory string: [autorun]

                Networking

                barindex
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49729 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49729 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49729 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49729 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49729 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49735 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49735 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49735 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49736 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49736 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49736 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49736 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49736 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49738 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49738 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49738 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49738 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49738 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49739 -> 18.192.93.86:18490
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49739 -> 18.192.93.86:18490
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49739 -> 18.192.93.86:18490
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49739 -> 18.192.93.86:18490
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49740 -> 18.192.93.86:18490
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49740 -> 18.192.93.86:18490
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49740 -> 18.192.93.86:18490
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49740 -> 18.192.93.86:18490
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49740 -> 18.192.93.86:18490
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49741 -> 18.192.93.86:18490
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49741 -> 18.192.93.86:18490
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49741 -> 18.192.93.86:18490
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49741 -> 18.192.93.86:18490
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49741 -> 18.192.93.86:18490
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49742 -> 18.192.93.86:18490
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49742 -> 18.192.93.86:18490
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49742 -> 18.192.93.86:18490
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49742 -> 18.192.93.86:18490
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49742 -> 18.192.93.86:18490
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49743 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49743 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49743 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49743 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49743 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49744 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49744 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49744 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49745 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49745 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49745 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49745 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49745 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49746 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49746 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49746 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49746 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49746 -> 18.156.13.209:18490
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49747 -> 3.126.37.18:18490
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49747 -> 3.126.37.18:18490
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49747 -> 3.126.37.18:18490
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49747 -> 3.126.37.18:18490
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49747 -> 3.126.37.18:18490
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49748 -> 3.126.37.18:18490
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49748 -> 3.126.37.18:18490
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49748 -> 3.126.37.18:18490
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49748 -> 3.126.37.18:18490
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49748 -> 3.126.37.18:18490
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49749 -> 3.126.37.18:18490
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49749 -> 3.126.37.18:18490
                Source: Malware configuration extractorURLs: 2.tcp.eu.ngrok.io
                Source: global trafficTCP traffic: 18.192.93.86 ports 18490,0,1,4,8,9
                Source: global trafficTCP traffic: 18.156.13.209 ports 18490,0,1,4,8,9
                Source: global trafficTCP traffic: 3.126.37.18 ports 18490,0,1,4,8,9
                Source: global trafficTCP traffic: 192.168.2.4:49729 -> 18.156.13.209:18490
                Source: global trafficTCP traffic: 192.168.2.4:49739 -> 18.192.93.86:18490
                Source: global trafficTCP traffic: 192.168.2.4:49747 -> 3.126.37.18:18490
                Source: Joe Sandbox ViewIP Address: 18.156.13.209 18.156.13.209
                Source: Joe Sandbox ViewIP Address: 18.192.93.86 18.192.93.86
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownDNS traffic detected: queries for: 2.tcp.eu.ngrok.io
                Source: pQBmVoyRnw.exe, System.exe.0.dr, svchost.exe.1.drString found in binary or memory: https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: pQBmVoyRnw.exe, kl.cs.Net Code: VKCodeToUnicode
                Source: System.exe.0.dr, kl.cs.Net Code: VKCodeToUnicode
                Source: svchost.exe.1.dr, kl.cs.Net Code: VKCodeToUnicode

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: pQBmVoyRnw.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.pQBmVoyRnw.exe.ee0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1651277682.0000000000EE2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4111124324.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: pQBmVoyRnw.exe PID: 5408, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: System.exe PID: 4488, type: MEMORYSTR
                Source: Yara matchFile source: C:\svchost.exe, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\System.exe, type: DROPPED

                Operating System Destruction

                barindex
                Source: C:\Users\user\System.exeProcess information set: 01 00 00 00 Jump to behavior

                System Summary

                barindex
                Source: pQBmVoyRnw.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: pQBmVoyRnw.exe, type: SAMPLEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: pQBmVoyRnw.exe, type: SAMPLEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: 0.0.pQBmVoyRnw.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: 0.0.pQBmVoyRnw.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: 0.0.pQBmVoyRnw.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: 00000000.00000000.1651277682.0000000000EE2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: 00000000.00000000.1651277682.0000000000EE2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: C:\svchost.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: C:\svchost.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: C:\svchost.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: C:\Users\user\System.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: C:\Users\user\System.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: C:\Users\user\System.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: C:\Users\user\System.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\System.exeCode function: 1_2_00E7BEF2 NtSetInformationProcess,1_2_00E7BEF2
                Source: C:\Users\user\System.exeCode function: 1_2_00E7BED0 NtSetInformationProcess,1_2_00E7BED0
                Source: C:\Users\user\System.exeCode function: 1_2_053603CA NtQuerySystemInformation,1_2_053603CA
                Source: C:\Users\user\System.exeCode function: 1_2_0536038F NtQuerySystemInformation,1_2_0536038F
                Source: pQBmVoyRnw.exe, 00000000.00000002.1719025183.00000000013FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs pQBmVoyRnw.exe
                Source: pQBmVoyRnw.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: pQBmVoyRnw.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: pQBmVoyRnw.exe, type: SAMPLEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: pQBmVoyRnw.exe, type: SAMPLEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: 0.0.pQBmVoyRnw.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: 0.0.pQBmVoyRnw.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: 0.0.pQBmVoyRnw.exe.ee0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: 00000000.00000000.1651277682.0000000000EE2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: 00000000.00000000.1651277682.0000000000EE2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: C:\svchost.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: C:\svchost.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: C:\svchost.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: C:\Users\user\System.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: C:\Users\user\System.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: C:\Users\user\System.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: classification engineClassification label: mal100.spre.troj.spyw.evad.winEXE@6/7@4/3
                Source: C:\Users\user\System.exeCode function: 1_2_00E7BBA2 AdjustTokenPrivileges,1_2_00E7BBA2
                Source: C:\Users\user\System.exeCode function: 1_2_00E7BB6B AdjustTokenPrivileges,1_2_00E7BB6B
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeFile created: C:\Users\user\System.exeJump to behavior
                Source: C:\Users\user\System.exeMutant created: \Sessions\1\BaseNamedObjects\d5ffed427806ca0dc3382688f90c0697
                Source: C:\Users\user\System.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2844:120:WilError_03
                Source: pQBmVoyRnw.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: pQBmVoyRnw.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
                Source: C:\Users\user\System.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\System.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
                Source: C:\Users\user\System.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeFile read: C:\Users\user\Desktop\pQBmVoyRnw.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\pQBmVoyRnw.exe C:\Users\user\Desktop\pQBmVoyRnw.exe
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess created: C:\Users\user\System.exe "C:\Users\user\System.exe"
                Source: C:\Users\user\System.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\System.exe" "System.exe" ENABLE
                Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess created: C:\Users\user\System.exe "C:\Users\user\System.exe" Jump to behavior
                Source: C:\Users\user\System.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\System.exe" "System.exe" ENABLEJump to behavior
                Source: C:\Users\user\System.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                Source: C:\Users\user\System.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
                Source: pQBmVoyRnw.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
                Source: pQBmVoyRnw.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: pQBmVoyRnw.exe, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                Source: System.exe.0.dr, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                Source: svchost.exe.1.dr, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeCode function: 0_2_01872684 push dword ptr [edx]; retf 0_2_0187268E
                Source: C:\Users\user\System.exeCode function: 1_2_00E72FC5 push FFFFFFE4h; ret 1_2_00E73002
                Source: C:\Users\user\System.exeCode function: 1_2_00E72C21 pushad ; retf 1_2_00E72C2A
                Source: C:\Users\user\System.exeCode function: 1_2_00E73005 push edx; retf 1_2_00E7300E
                Source: C:\Users\user\System.exeCode function: 1_2_00E72684 push dword ptr [edx]; retf 1_2_00E7268E
                Source: C:\Users\user\System.exeCode function: 1_2_00E72F08 push esi; iretd 1_2_00E72F12

                Persistence and Installation Behavior

                barindex
                Source: C:\Users\user\System.exeFile created: C:\svchost.exeJump to dropped file
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeFile created: C:\Users\user\System.exeJump to dropped file
                Source: C:\Users\user\System.exeFile created: C:\svchost.exeJump to dropped file
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeFile created: C:\Users\user\System.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeFile created: C:\Users\user\System.exeJump to dropped file
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\System.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeCode function: 0_2_018B026D rdtsc 0_2_018B026D
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\System.exeWindow / User API: threadDelayed 3270Jump to behavior
                Source: C:\Users\user\System.exeWindow / User API: threadDelayed 5090Jump to behavior
                Source: C:\Users\user\System.exeWindow / User API: foregroundWindowGot 382Jump to behavior
                Source: C:\Users\user\System.exeWindow / User API: foregroundWindowGot 1368Jump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exe TID: 6784Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\System.exe TID: 2852Thread sleep time: -275000s >= -30000sJump to behavior
                Source: C:\Users\user\System.exe TID: 2852Thread sleep time: -5090000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: System.exe, 00000001.00000002.4110539339.000000000102F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWpersistenceProvider" type="System.ServiceModel.Configuration.PersistenceProviderElement, System.WorkflowServices, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35"/>
                Source: System.exe, 00000001.00000002.4110539339.000000000102F000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000003.00000002.1785140830.0000000000FD8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\System.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeCode function: 0_2_018B026D rdtsc 0_2_018B026D
                Source: C:\Users\user\System.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: pQBmVoyRnw.exe, kl.csReference to suspicious API methods: MapVirtualKey(a, 0u)
                Source: pQBmVoyRnw.exe, kl.csReference to suspicious API methods: GetAsyncKeyState(num2)
                Source: pQBmVoyRnw.exe, OK.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, 100, ref lpszVer, 100)
                Source: C:\Users\user\Desktop\pQBmVoyRnw.exeProcess created: C:\Users\user\System.exe "C:\Users\user\System.exe" Jump to behavior
                Source: System.exe, 00000001.00000002.4111124324.000000000326C000.00000004.00000800.00020000.00000000.sdmp, System.exe, 00000001.00000002.4111124324.00000000030D8000.00000004.00000800.00020000.00000000.sdmp, System.exe, 00000001.00000002.4111124324.0000000003212000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: System.exe, 00000001.00000002.4111124324.000000000309E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.*lL
                Source: System.exe, 00000001.00000002.4111124324.0000000002EDF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.*lP
                Source: System.exe, 00000001.00000002.4110539339.000000000102F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Rh Program Manager
                Source: System.exe, 00000001.00000002.4111124324.000000000326C000.00000004.00000800.00020000.00000000.sdmp, System.exe, 00000001.00000002.4111124324.00000000030D8000.00000004.00000800.00020000.00000000.sdmp, System.exe, 00000001.00000002.4111124324.0000000003212000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@9*l
                Source: System.exe, 00000001.00000002.4111124324.00000000030AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.*lt
                Source: System.exe, 00000001.00000002.4111124324.000000000326C000.00000004.00000800.00020000.00000000.sdmp, System.exe, 00000001.00000002.4111124324.00000000032A2000.00000004.00000800.00020000.00000000.sdmp, System.exe, 00000001.00000002.4111124324.0000000002EDF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program manager
                Source: System.exe, 00000001.00000002.4111124324.00000000030D8000.00000004.00000800.00020000.00000000.sdmp, System.exe, 00000001.00000002.4111124324.0000000003096000.00000004.00000800.00020000.00000000.sdmp, System.exe, 00000001.00000002.4111124324.0000000003168000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.*l
                Source: System.exe, 00000001.00000002.4111124324.0000000002EDF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.*lD
                Source: C:\Users\user\System.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\System.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\System.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\System.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\System.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\System.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\System.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Lowering of HIPS / PFW / Operating System Security Settings

                barindex
                Source: C:\Users\user\System.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\System.exe" "System.exe" ENABLE
                Source: C:\Users\user\System.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\System.exe" "System.exe" ENABLE

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: pQBmVoyRnw.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.pQBmVoyRnw.exe.ee0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1651277682.0000000000EE2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4111124324.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: pQBmVoyRnw.exe PID: 5408, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: System.exe PID: 4488, type: MEMORYSTR
                Source: Yara matchFile source: C:\svchost.exe, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\System.exe, type: DROPPED

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: pQBmVoyRnw.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.pQBmVoyRnw.exe.ee0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1651277682.0000000000EE2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4111124324.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: pQBmVoyRnw.exe PID: 5408, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: System.exe PID: 4488, type: MEMORYSTR
                Source: Yara matchFile source: C:\svchost.exe, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\System.exe, type: DROPPED
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
                11
                Replication Through Removable Media
                1
                Native API
                Path Interception1
                Access Token Manipulation
                211
                Masquerading
                1
                Input Capture
                11
                Security Software Discovery
                11
                Replication Through Removable Media
                1
                Input Capture
                Exfiltration Over Other Network Medium1
                Non-Standard Port
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
                Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts12
                Process Injection
                21
                Disable or Modify Tools
                LSASS Memory2
                Process Discovery
                Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                Non-Application Layer Protocol
                SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
                Domain AccountsAtLogon Script (Windows)Logon Script (Windows)21
                Virtualization/Sandbox Evasion
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration11
                Application Layer Protocol
                Data Encrypted for ImpactDNS ServerEmail Addresses
                Local AccountsCronLogin HookLogin Hook1
                Access Token Manipulation
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput CaptureTraffic DuplicationProtocol ImpersonationData DestructionVirtual Private ServerEmployee Names
                Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
                Process Injection
                LSA Secrets1
                Peripheral Device Discovery
                SSHKeyloggingScheduled TransferFallback ChannelsData Encrypted for ImpactServerGather Victim Network Information
                Replication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Obfuscated Files or Information
                Cached Domain Credentials1
                File and Directory Discovery
                VNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
                External Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Software Packing
                DCSync12
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                pQBmVoyRnw.exe100%AviraTR/ATRAPS.Gen
                pQBmVoyRnw.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\System.exe100%AviraTR/ATRAPS.Gen
                C:\svchost.exe100%AviraTR/ATRAPS.Gen
                C:\Users\user\System.exe100%Joe Sandbox ML
                C:\svchost.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                2.tcp.eu.ngrok.io100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                2.tcp.eu.ngrok.io
                18.156.13.209
                truetrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  2.tcp.eu.ngrok.iotrue
                  • Avira URL Cloud: malware
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0pQBmVoyRnw.exe, System.exe.0.dr, svchost.exe.1.drfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    18.156.13.209
                    2.tcp.eu.ngrok.ioUnited States
                    16509AMAZON-02UStrue
                    18.192.93.86
                    unknownUnited States
                    16509AMAZON-02UStrue
                    3.126.37.18
                    unknownUnited States
                    16509AMAZON-02UStrue
                    Joe Sandbox version:38.0.0 Ammolite
                    Analysis ID:1361720
                    Start date and time:2023-12-13 20:56:06 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 7m 2s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:9
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:pQBmVoyRnw.exe
                    renamed because original name is a hash value
                    Original Sample Name:16c7b2832ce255d5da4a5d85a4089758.exe
                    Detection:MAL
                    Classification:mal100.spre.troj.spyw.evad.winEXE@6/7@4/3
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 159
                    • Number of non-executed functions: 1
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: pQBmVoyRnw.exe
                    TimeTypeDescription
                    20:57:41API Interceptor165956x Sleep call for process: System.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    18.156.13.209http://www.sdrclm.cn/vendor/phpdocumentor/P800/P90GT_Invoice_Related_Property_Tax_P800.exeGet hashmaliciousRedLineBrowse
                    • 2.tcp.eu.ngrok.io:17685/
                    18.192.93.86P90GT_Invoice_Related_Property_Tax_P800.exeGet hashmaliciousRedLineBrowse
                    • 2.tcp.eu.ngrok.io:17685/
                    http://www.sdrclm.cn/vendor/phpdocumentor/P800/P90GT_Invoice_Related_Property_Tax_P800.exeGet hashmaliciousRedLineBrowse
                    • 2.tcp.eu.ngrok.io:17685/
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    2.tcp.eu.ngrok.ioRWqHoCWEPI.exeGet hashmaliciousNjratBrowse
                    • 18.192.93.86
                    EB4B6878310B1E2843C964E02EC1782AACB518E32777A.exeGet hashmaliciousNjratBrowse
                    • 18.192.93.86
                    NezbdhNgwG.exeGet hashmaliciousNjratBrowse
                    • 18.192.93.86
                    xdPdkPMD8u.exeGet hashmaliciousNjratBrowse
                    • 18.192.93.86
                    VBUXm77rfL.exeGet hashmaliciousNjratBrowse
                    • 18.192.93.86
                    1UGdjTlX5v.exeGet hashmaliciousNjratBrowse
                    • 18.157.68.73
                    kXghM8bJcm.exeGet hashmaliciousNjratBrowse
                    • 18.192.93.86
                    OUXkIxeP6k.exeGet hashmaliciousNjratBrowse
                    • 3.126.37.18
                    QzzmZiGinp.exeGet hashmaliciousNjratBrowse
                    • 18.156.13.209
                    eI43OwXSvq.exeGet hashmaliciousNjratBrowse
                    • 18.197.239.5
                    p0zYXkMETE.exeGet hashmaliciousNjratBrowse
                    • 18.157.68.73
                    i9z1c1OtFb.exeGet hashmaliciousNjratBrowse
                    • 18.157.68.73
                    aF73k2XwGj.exeGet hashmaliciousNjratBrowse
                    • 18.192.93.86
                    7XyFhq6BDj.exeGet hashmaliciousNjratBrowse
                    • 3.126.37.18
                    JYGc3o49WE.exeGet hashmaliciousNjratBrowse
                    • 18.157.68.73
                    J6VIiRgq3w.exeGet hashmaliciousNjratBrowse
                    • 3.126.37.18
                    cTUu5Po5Hy.exeGet hashmaliciousNjratBrowse
                    • 3.126.37.18
                    7JdbeSrZ6s.exeGet hashmaliciousNjratBrowse
                    • 3.127.138.57
                    KcWQQO3nZP.exeGet hashmaliciousNjratBrowse
                    • 3.126.37.18
                    zep8vTa4sg.exeGet hashmaliciousNjratBrowse
                    • 18.156.13.209
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    AMAZON-02UShttps://u4922463.ct.sendgrid.net/ls/click?upn=EB1qBpEZOb0BeY3tFaEyZfbXNl0dzqCPs4IuBvxtn-2F8-3DBHSV_h9nYqBb8GTsRYM3XAu-2F7B3Zz9iJrBjlG6gAH4RrjXu04CxVIgslWhpFkLLOpnrDIxZdKkXtB0dsi4uCFiwXe-2BQuDcHYiOhVmiiGVX2UJrKAriQ2bhMzb3GHHCkgidjzlGWZXL8e3C2KMNQf6Q9oOiJZG5kFCMY00KCJ589z8lox3yd2Wd4fgbhfYLKnoZmDbSrIN1z12kWhP-2FNNvM47oHj6AF02MfILuyLAatTZfpYA-3DGet hashmaliciousUnknownBrowse
                    • 18.141.17.51
                    https://u4922463.ct.sendgrid.net/ls/click?upn=EB1qBpEZOb0BeY3tFaEyZfbXNl0dzqCPs4IuBvxtn-2F8-3DBHSV_h9nYqBb8GTsRYM3XAu-2F7B3Zz9iJrBjlG6gAH4RrjXu04CxVIgslWhpFkLLOpnrDIxZdKkXtB0dsi4uCFiwXe-2BQuDcHYiOhVmiiGVX2UJrKAriQ2bhMzb3GHHCkgidjzlGWZXL8e3C2KMNQf6Q9oOiJZG5kFCMY00KCJ589z8lox3yd2Wd4fgbhfYLKnoZmDbSrIN1z12kWhP-2FNNvM47oHj6AF02MfILuyLAatTZfpYA-3DGet hashmaliciousUnknownBrowse
                    • 13.250.153.115
                    https://t.dripemail2.com/c/eyJhbGciOiJIUzI1NiJ9.eyJhdWQiOiJkZXRvdXIiLCJpc3MiOiJtb25vbGl0aCIsInN1YiI6ImRldG91cl9saW5rIiwiaWF0IjoxNzAyNDg0OTkzLCJuYmYiOjE3MDI0ODQ5OTMsImFjY291bnRfaWQiOiIxODU3MTU0IiwiZGVsaXZlcnlfaWQiOiJ2bWd1NDk3bzE4bHd2NHhwMG8xeSIsInVybCI6Imh0dHBzOi8vdmVyMWYtY2RpLXIudmVyY2VsLmFwcC8_X19zPW11ZXJ3NTZxc29wcnpkdmZtcGhjJnV0bV9zb3VyY2U9ZHJpcCZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1DYW4rd2UrZ2V0K3lvdXIrZGlnaXRzJTNGKyVFMiU5OCU4RSVFRiVCOCU4RiJ9.K-V9EywgyWnNsZeXCjIqP8VTrvXpXlkLvFaVr2xbnc0#YW5uYS55YXRlc0B6YmV0YS5jb20=Get hashmaliciousHTMLPhisherBrowse
                    • 76.76.21.164
                    https://hallmark.greetingsweb.com/08d8bbb695d1c570?l=30Get hashmaliciousUnknownBrowse
                    • 52.217.203.65
                    http://tracker.axsproductions.com/f/a/p1kBCojaDpnjnEXy1Uh7Dg~~/AAQn0QA~/RgRnWvrdPxRENGh0dHBzOi8vd3d3LmFnZW5jeWFjY2Vzcy5jb20vcHJlZmVyZW5jZXM_b3B0b3V0PXRydWVXA3NwY0IKZXPddXhliWF7klIcY2FybG9zLmdpcmFsZG9AYm9hcnNoZWFkLmNvbVgEAAADVw~~Get hashmaliciousHTMLPhisherBrowse
                    • 13.226.52.58
                    http://padlet.com/hobbs3/my-spreadsheet927_rich-hobbs638_dec23_crosbie-real-estate-gr-wc7qyx1bvhqn3t4tGet hashmaliciousUnknownBrowse
                    • 65.8.178.10
                    https://app.standards.site/loginGet hashmaliciousUnknownBrowse
                    • 65.8.178.47
                    https://repairit.wondershare.com/video-repair/cut-video-in-windows-media-player.htmlGet hashmaliciousUnknownBrowse
                    • 13.35.116.98
                    http://taxrxgroup.comGet hashmaliciousUnknownBrowse
                    • 108.157.162.124
                    https://cs.mytheresa.com/mix/c3/?tc_id=202311201201523757380094&tcs=3504&cid_vcms=6664627&ag=category&lg=2&tar=tgt&src=newsletter&cmp=mw_42_231016_category&tarea=07&csf=23350070&user_id=507fd0bb65c9f08e7b4b1a0ac732a5d6&kwd=mw&ptyp=namemyt&chn=email&url=//shabirsons.com/new/auth?register=raven@triton-partners.comGet hashmaliciousUnknownBrowse
                    • 35.181.29.184
                    https://cs.mytheresa.com/mix/c3/?tc_id=202311201201523757380094&tcs=3504&cid_vcms=6664627&ag=Category&lg=2&tar=TGT&src=newsletter&cmp=mw_42_231016_category&tarea=07&csf=23350070&user_id=507fd0bb65c9f08e7b4b1a0ac732a5d6&kwd=mw&ptyp=namemyt&chn=email&url=//baidu.com///link?url=vC4GC64ae4I9wzsoHp-V0ah20Me1UflwnvmnxUC9BRkuYSMm7qYp63-dMYBSTRdK&wd#.am9obm55X2RhdmlzQGFvLnVzY291cnRzLmdvdg==Get hashmaliciousUnknownBrowse
                    • 35.181.29.184
                    http://www.laapsa.com.arGet hashmaliciousUnknownBrowse
                    • 54.76.77.238
                    http://click.web.teachmecompliance.com/?qs=af20cf96ffd191e17d152373cdae26d0ed28e24c074a7e1033bca0a42143e91780d4be587d8ec066caddbb83143e7a87fcf8e2f86a2189e5fa34aac6211ab659Get hashmaliciousUnknownBrowse
                    • 65.8.184.131
                    https://link.mail.beehiiv.com/ss/c/SFMS2DGC_3bR2eTtelyfFUzhcGs9TWsEeQw8nQp279J9B9upNohe5IND2DzRg4GfFe3uzMCkwl0VCcFF4p9tdZ71PSC4SlxBXIoR6qgai_e9KXQu46yVwLcidRn-ax90dry5wHpUbN5t2kTBuqVHtjiUR148OM6f2kzv0FbM9-j2d8Pfv1aAiA8m-jIRZ1qPGcwv7cKHtg7zS7k4vguTCgqcLvbDJq61ZPMm3FUyJbd-2ROdV-1aYJVxlO48nGuxkYE6PJ8AjBLfTrwxiX4S2X3JBdpAgH-S1qPrWFIUFnwhW_rcr9w0IZhVJg2k6UwPe0XxcmVm_hXa3Zy0nKOCBvO11zW3IuzS0wT0aqoeUGhUZL_BJAovHWU-78ta_hn0kcmqrlBzh66Yb9lBLgDUfmEypG1yBWRlXPRZ1w7redaJaooKiPuwr2V5n8bXDS9_yWg2USHIOqCrcsTtBGYogmSv3HnV9rD8TCUiXo47xhMBVMzr7StZWjjgT4kZsxK7CX-zIn8YCCC8lkjyOEp6xgdXFjETIB4df5tQm7lBbPlCZ99btsVwezxOnJZ4MV1piJOH9CONfmhGD5405v_OGQ0ddDY5d31qqadrUj9T5uo/422/2hUrqrZHQZSMSqb_7MA2RQ/h1/bXAkiKjrMazQzzpENtDvosiaH2ZRcmZd0aMxcbDunvMGet hashmaliciousUnknownBrowse
                    • 35.163.144.222
                    SecuriteInfo.com.FileRepMalware.6852.1526.exeGet hashmaliciousUnknownBrowse
                    • 3.64.163.50
                    https://docsend.com/view/i29287mwb9t9qm96Get hashmaliciousHTMLPhisherBrowse
                    • 13.35.116.32
                    https://2fa.com-token-auth.com/XUnpsalIwZFhSekV3Ums0MVVWQndhVWd4VG1SamQxRk5XRkozZWtOd0wyNXVXVXhHVTBoR2RFaHhRVlZ0VkdkM09VWXdNbE0xUVVoa2MydzBNbE5aV0ZOR1dIaFlkMVpGTDFaTFExaEViMWM0WTBSSlQxZFhlVWhWZHpVeFNUWlVXVTl6TXl0YWVucG1MMDh4UkVrMFEzUmFlV1YwUzJWb1JuSjFTak5KVlVZM1VuSnlWa3hoTm5sSFZ5czVibk5yY21wd1drOW1SMHBtU1ZCQ2RHMDBibWROVTA0eFIwZzFSbTVrZEZWU1pUZDVlVWw1UXl0UFFXVjJNbEZpY1d4NGFFUXhkblpHTkZoQ2NFRldVMGxuU1dOMlZUUXJVVDA5TFMxUmNtcFVNbXRpWmxsVWRqVk5SRWR4T1ZBemRTOW5QVDA9LS1mNjBiNDI4NzljODhhYjI4ZTNlZTFjM2JiZGVhNTNiZjVkY2M2NGYz?cid=1839839752Get hashmaliciousUnknownBrowse
                    • 52.217.16.54
                    REnfXF7686.exeGet hashmaliciousPrivateLoader, RisePro StealerBrowse
                    • 108.157.162.69
                    https://demandtechreports.com/reports/Flexential-TheEvolved922Download.jspGet hashmaliciousUnknownBrowse
                    • 65.8.178.94
                    https://cocojonss.tumblr.com/Get hashmaliciousPorn ScamBrowse
                    • 76.223.105.51
                    AMAZON-02UShttps://u4922463.ct.sendgrid.net/ls/click?upn=EB1qBpEZOb0BeY3tFaEyZfbXNl0dzqCPs4IuBvxtn-2F8-3DBHSV_h9nYqBb8GTsRYM3XAu-2F7B3Zz9iJrBjlG6gAH4RrjXu04CxVIgslWhpFkLLOpnrDIxZdKkXtB0dsi4uCFiwXe-2BQuDcHYiOhVmiiGVX2UJrKAriQ2bhMzb3GHHCkgidjzlGWZXL8e3C2KMNQf6Q9oOiJZG5kFCMY00KCJ589z8lox3yd2Wd4fgbhfYLKnoZmDbSrIN1z12kWhP-2FNNvM47oHj6AF02MfILuyLAatTZfpYA-3DGet hashmaliciousUnknownBrowse
                    • 18.141.17.51
                    https://u4922463.ct.sendgrid.net/ls/click?upn=EB1qBpEZOb0BeY3tFaEyZfbXNl0dzqCPs4IuBvxtn-2F8-3DBHSV_h9nYqBb8GTsRYM3XAu-2F7B3Zz9iJrBjlG6gAH4RrjXu04CxVIgslWhpFkLLOpnrDIxZdKkXtB0dsi4uCFiwXe-2BQuDcHYiOhVmiiGVX2UJrKAriQ2bhMzb3GHHCkgidjzlGWZXL8e3C2KMNQf6Q9oOiJZG5kFCMY00KCJ589z8lox3yd2Wd4fgbhfYLKnoZmDbSrIN1z12kWhP-2FNNvM47oHj6AF02MfILuyLAatTZfpYA-3DGet hashmaliciousUnknownBrowse
                    • 13.250.153.115
                    https://t.dripemail2.com/c/eyJhbGciOiJIUzI1NiJ9.eyJhdWQiOiJkZXRvdXIiLCJpc3MiOiJtb25vbGl0aCIsInN1YiI6ImRldG91cl9saW5rIiwiaWF0IjoxNzAyNDg0OTkzLCJuYmYiOjE3MDI0ODQ5OTMsImFjY291bnRfaWQiOiIxODU3MTU0IiwiZGVsaXZlcnlfaWQiOiJ2bWd1NDk3bzE4bHd2NHhwMG8xeSIsInVybCI6Imh0dHBzOi8vdmVyMWYtY2RpLXIudmVyY2VsLmFwcC8_X19zPW11ZXJ3NTZxc29wcnpkdmZtcGhjJnV0bV9zb3VyY2U9ZHJpcCZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1DYW4rd2UrZ2V0K3lvdXIrZGlnaXRzJTNGKyVFMiU5OCU4RSVFRiVCOCU4RiJ9.K-V9EywgyWnNsZeXCjIqP8VTrvXpXlkLvFaVr2xbnc0#YW5uYS55YXRlc0B6YmV0YS5jb20=Get hashmaliciousHTMLPhisherBrowse
                    • 76.76.21.164
                    https://hallmark.greetingsweb.com/08d8bbb695d1c570?l=30Get hashmaliciousUnknownBrowse
                    • 52.217.203.65
                    http://tracker.axsproductions.com/f/a/p1kBCojaDpnjnEXy1Uh7Dg~~/AAQn0QA~/RgRnWvrdPxRENGh0dHBzOi8vd3d3LmFnZW5jeWFjY2Vzcy5jb20vcHJlZmVyZW5jZXM_b3B0b3V0PXRydWVXA3NwY0IKZXPddXhliWF7klIcY2FybG9zLmdpcmFsZG9AYm9hcnNoZWFkLmNvbVgEAAADVw~~Get hashmaliciousHTMLPhisherBrowse
                    • 13.226.52.58
                    http://padlet.com/hobbs3/my-spreadsheet927_rich-hobbs638_dec23_crosbie-real-estate-gr-wc7qyx1bvhqn3t4tGet hashmaliciousUnknownBrowse
                    • 65.8.178.10
                    https://app.standards.site/loginGet hashmaliciousUnknownBrowse
                    • 65.8.178.47
                    https://repairit.wondershare.com/video-repair/cut-video-in-windows-media-player.htmlGet hashmaliciousUnknownBrowse
                    • 13.35.116.98
                    http://taxrxgroup.comGet hashmaliciousUnknownBrowse
                    • 108.157.162.124
                    https://cs.mytheresa.com/mix/c3/?tc_id=202311201201523757380094&tcs=3504&cid_vcms=6664627&ag=category&lg=2&tar=tgt&src=newsletter&cmp=mw_42_231016_category&tarea=07&csf=23350070&user_id=507fd0bb65c9f08e7b4b1a0ac732a5d6&kwd=mw&ptyp=namemyt&chn=email&url=//shabirsons.com/new/auth?register=raven@triton-partners.comGet hashmaliciousUnknownBrowse
                    • 35.181.29.184
                    https://cs.mytheresa.com/mix/c3/?tc_id=202311201201523757380094&tcs=3504&cid_vcms=6664627&ag=Category&lg=2&tar=TGT&src=newsletter&cmp=mw_42_231016_category&tarea=07&csf=23350070&user_id=507fd0bb65c9f08e7b4b1a0ac732a5d6&kwd=mw&ptyp=namemyt&chn=email&url=//baidu.com///link?url=vC4GC64ae4I9wzsoHp-V0ah20Me1UflwnvmnxUC9BRkuYSMm7qYp63-dMYBSTRdK&wd#.am9obm55X2RhdmlzQGFvLnVzY291cnRzLmdvdg==Get hashmaliciousUnknownBrowse
                    • 35.181.29.184
                    http://www.laapsa.com.arGet hashmaliciousUnknownBrowse
                    • 54.76.77.238
                    http://click.web.teachmecompliance.com/?qs=af20cf96ffd191e17d152373cdae26d0ed28e24c074a7e1033bca0a42143e91780d4be587d8ec066caddbb83143e7a87fcf8e2f86a2189e5fa34aac6211ab659Get hashmaliciousUnknownBrowse
                    • 65.8.184.131
                    https://link.mail.beehiiv.com/ss/c/SFMS2DGC_3bR2eTtelyfFUzhcGs9TWsEeQw8nQp279J9B9upNohe5IND2DzRg4GfFe3uzMCkwl0VCcFF4p9tdZ71PSC4SlxBXIoR6qgai_e9KXQu46yVwLcidRn-ax90dry5wHpUbN5t2kTBuqVHtjiUR148OM6f2kzv0FbM9-j2d8Pfv1aAiA8m-jIRZ1qPGcwv7cKHtg7zS7k4vguTCgqcLvbDJq61ZPMm3FUyJbd-2ROdV-1aYJVxlO48nGuxkYE6PJ8AjBLfTrwxiX4S2X3JBdpAgH-S1qPrWFIUFnwhW_rcr9w0IZhVJg2k6UwPe0XxcmVm_hXa3Zy0nKOCBvO11zW3IuzS0wT0aqoeUGhUZL_BJAovHWU-78ta_hn0kcmqrlBzh66Yb9lBLgDUfmEypG1yBWRlXPRZ1w7redaJaooKiPuwr2V5n8bXDS9_yWg2USHIOqCrcsTtBGYogmSv3HnV9rD8TCUiXo47xhMBVMzr7StZWjjgT4kZsxK7CX-zIn8YCCC8lkjyOEp6xgdXFjETIB4df5tQm7lBbPlCZ99btsVwezxOnJZ4MV1piJOH9CONfmhGD5405v_OGQ0ddDY5d31qqadrUj9T5uo/422/2hUrqrZHQZSMSqb_7MA2RQ/h1/bXAkiKjrMazQzzpENtDvosiaH2ZRcmZd0aMxcbDunvMGet hashmaliciousUnknownBrowse
                    • 35.163.144.222
                    SecuriteInfo.com.FileRepMalware.6852.1526.exeGet hashmaliciousUnknownBrowse
                    • 3.64.163.50
                    https://docsend.com/view/i29287mwb9t9qm96Get hashmaliciousHTMLPhisherBrowse
                    • 13.35.116.32
                    https://2fa.com-token-auth.com/XUnpsalIwZFhSekV3Ums0MVVWQndhVWd4VG1SamQxRk5XRkozZWtOd0wyNXVXVXhHVTBoR2RFaHhRVlZ0VkdkM09VWXdNbE0xUVVoa2MydzBNbE5aV0ZOR1dIaFlkMVpGTDFaTFExaEViMWM0WTBSSlQxZFhlVWhWZHpVeFNUWlVXVTl6TXl0YWVucG1MMDh4UkVrMFEzUmFlV1YwUzJWb1JuSjFTak5KVlVZM1VuSnlWa3hoTm5sSFZ5czVibk5yY21wd1drOW1SMHBtU1ZCQ2RHMDBibWROVTA0eFIwZzFSbTVrZEZWU1pUZDVlVWw1UXl0UFFXVjJNbEZpY1d4NGFFUXhkblpHTkZoQ2NFRldVMGxuU1dOMlZUUXJVVDA5TFMxUmNtcFVNbXRpWmxsVWRqVk5SRWR4T1ZBemRTOW5QVDA9LS1mNjBiNDI4NzljODhhYjI4ZTNlZTFjM2JiZGVhNTNiZjVkY2M2NGYz?cid=1839839752Get hashmaliciousUnknownBrowse
                    • 52.217.16.54
                    REnfXF7686.exeGet hashmaliciousPrivateLoader, RisePro StealerBrowse
                    • 108.157.162.69
                    https://demandtechreports.com/reports/Flexential-TheEvolved922Download.jspGet hashmaliciousUnknownBrowse
                    • 65.8.178.94
                    https://cocojonss.tumblr.com/Get hashmaliciousPorn ScamBrowse
                    • 76.223.105.51
                    AMAZON-02UShttps://u4922463.ct.sendgrid.net/ls/click?upn=EB1qBpEZOb0BeY3tFaEyZfbXNl0dzqCPs4IuBvxtn-2F8-3DBHSV_h9nYqBb8GTsRYM3XAu-2F7B3Zz9iJrBjlG6gAH4RrjXu04CxVIgslWhpFkLLOpnrDIxZdKkXtB0dsi4uCFiwXe-2BQuDcHYiOhVmiiGVX2UJrKAriQ2bhMzb3GHHCkgidjzlGWZXL8e3C2KMNQf6Q9oOiJZG5kFCMY00KCJ589z8lox3yd2Wd4fgbhfYLKnoZmDbSrIN1z12kWhP-2FNNvM47oHj6AF02MfILuyLAatTZfpYA-3DGet hashmaliciousUnknownBrowse
                    • 18.141.17.51
                    https://u4922463.ct.sendgrid.net/ls/click?upn=EB1qBpEZOb0BeY3tFaEyZfbXNl0dzqCPs4IuBvxtn-2F8-3DBHSV_h9nYqBb8GTsRYM3XAu-2F7B3Zz9iJrBjlG6gAH4RrjXu04CxVIgslWhpFkLLOpnrDIxZdKkXtB0dsi4uCFiwXe-2BQuDcHYiOhVmiiGVX2UJrKAriQ2bhMzb3GHHCkgidjzlGWZXL8e3C2KMNQf6Q9oOiJZG5kFCMY00KCJ589z8lox3yd2Wd4fgbhfYLKnoZmDbSrIN1z12kWhP-2FNNvM47oHj6AF02MfILuyLAatTZfpYA-3DGet hashmaliciousUnknownBrowse
                    • 13.250.153.115
                    https://t.dripemail2.com/c/eyJhbGciOiJIUzI1NiJ9.eyJhdWQiOiJkZXRvdXIiLCJpc3MiOiJtb25vbGl0aCIsInN1YiI6ImRldG91cl9saW5rIiwiaWF0IjoxNzAyNDg0OTkzLCJuYmYiOjE3MDI0ODQ5OTMsImFjY291bnRfaWQiOiIxODU3MTU0IiwiZGVsaXZlcnlfaWQiOiJ2bWd1NDk3bzE4bHd2NHhwMG8xeSIsInVybCI6Imh0dHBzOi8vdmVyMWYtY2RpLXIudmVyY2VsLmFwcC8_X19zPW11ZXJ3NTZxc29wcnpkdmZtcGhjJnV0bV9zb3VyY2U9ZHJpcCZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj1DYW4rd2UrZ2V0K3lvdXIrZGlnaXRzJTNGKyVFMiU5OCU4RSVFRiVCOCU4RiJ9.K-V9EywgyWnNsZeXCjIqP8VTrvXpXlkLvFaVr2xbnc0#YW5uYS55YXRlc0B6YmV0YS5jb20=Get hashmaliciousHTMLPhisherBrowse
                    • 76.76.21.164
                    https://hallmark.greetingsweb.com/08d8bbb695d1c570?l=30Get hashmaliciousUnknownBrowse
                    • 52.217.203.65
                    http://tracker.axsproductions.com/f/a/p1kBCojaDpnjnEXy1Uh7Dg~~/AAQn0QA~/RgRnWvrdPxRENGh0dHBzOi8vd3d3LmFnZW5jeWFjY2Vzcy5jb20vcHJlZmVyZW5jZXM_b3B0b3V0PXRydWVXA3NwY0IKZXPddXhliWF7klIcY2FybG9zLmdpcmFsZG9AYm9hcnNoZWFkLmNvbVgEAAADVw~~Get hashmaliciousHTMLPhisherBrowse
                    • 13.226.52.58
                    http://padlet.com/hobbs3/my-spreadsheet927_rich-hobbs638_dec23_crosbie-real-estate-gr-wc7qyx1bvhqn3t4tGet hashmaliciousUnknownBrowse
                    • 65.8.178.10
                    https://app.standards.site/loginGet hashmaliciousUnknownBrowse
                    • 65.8.178.47
                    https://repairit.wondershare.com/video-repair/cut-video-in-windows-media-player.htmlGet hashmaliciousUnknownBrowse
                    • 13.35.116.98
                    http://taxrxgroup.comGet hashmaliciousUnknownBrowse
                    • 108.157.162.124
                    https://cs.mytheresa.com/mix/c3/?tc_id=202311201201523757380094&tcs=3504&cid_vcms=6664627&ag=category&lg=2&tar=tgt&src=newsletter&cmp=mw_42_231016_category&tarea=07&csf=23350070&user_id=507fd0bb65c9f08e7b4b1a0ac732a5d6&kwd=mw&ptyp=namemyt&chn=email&url=//shabirsons.com/new/auth?register=raven@triton-partners.comGet hashmaliciousUnknownBrowse
                    • 35.181.29.184
                    https://cs.mytheresa.com/mix/c3/?tc_id=202311201201523757380094&tcs=3504&cid_vcms=6664627&ag=Category&lg=2&tar=TGT&src=newsletter&cmp=mw_42_231016_category&tarea=07&csf=23350070&user_id=507fd0bb65c9f08e7b4b1a0ac732a5d6&kwd=mw&ptyp=namemyt&chn=email&url=//baidu.com///link?url=vC4GC64ae4I9wzsoHp-V0ah20Me1UflwnvmnxUC9BRkuYSMm7qYp63-dMYBSTRdK&wd#.am9obm55X2RhdmlzQGFvLnVzY291cnRzLmdvdg==Get hashmaliciousUnknownBrowse
                    • 35.181.29.184
                    http://www.laapsa.com.arGet hashmaliciousUnknownBrowse
                    • 54.76.77.238
                    http://click.web.teachmecompliance.com/?qs=af20cf96ffd191e17d152373cdae26d0ed28e24c074a7e1033bca0a42143e91780d4be587d8ec066caddbb83143e7a87fcf8e2f86a2189e5fa34aac6211ab659Get hashmaliciousUnknownBrowse
                    • 65.8.184.131
                    https://link.mail.beehiiv.com/ss/c/SFMS2DGC_3bR2eTtelyfFUzhcGs9TWsEeQw8nQp279J9B9upNohe5IND2DzRg4GfFe3uzMCkwl0VCcFF4p9tdZ71PSC4SlxBXIoR6qgai_e9KXQu46yVwLcidRn-ax90dry5wHpUbN5t2kTBuqVHtjiUR148OM6f2kzv0FbM9-j2d8Pfv1aAiA8m-jIRZ1qPGcwv7cKHtg7zS7k4vguTCgqcLvbDJq61ZPMm3FUyJbd-2ROdV-1aYJVxlO48nGuxkYE6PJ8AjBLfTrwxiX4S2X3JBdpAgH-S1qPrWFIUFnwhW_rcr9w0IZhVJg2k6UwPe0XxcmVm_hXa3Zy0nKOCBvO11zW3IuzS0wT0aqoeUGhUZL_BJAovHWU-78ta_hn0kcmqrlBzh66Yb9lBLgDUfmEypG1yBWRlXPRZ1w7redaJaooKiPuwr2V5n8bXDS9_yWg2USHIOqCrcsTtBGYogmSv3HnV9rD8TCUiXo47xhMBVMzr7StZWjjgT4kZsxK7CX-zIn8YCCC8lkjyOEp6xgdXFjETIB4df5tQm7lBbPlCZ99btsVwezxOnJZ4MV1piJOH9CONfmhGD5405v_OGQ0ddDY5d31qqadrUj9T5uo/422/2hUrqrZHQZSMSqb_7MA2RQ/h1/bXAkiKjrMazQzzpENtDvosiaH2ZRcmZd0aMxcbDunvMGet hashmaliciousUnknownBrowse
                    • 35.163.144.222
                    SecuriteInfo.com.FileRepMalware.6852.1526.exeGet hashmaliciousUnknownBrowse
                    • 3.64.163.50
                    https://docsend.com/view/i29287mwb9t9qm96Get hashmaliciousHTMLPhisherBrowse
                    • 13.35.116.32
                    https://2fa.com-token-auth.com/XUnpsalIwZFhSekV3Ums0MVVWQndhVWd4VG1SamQxRk5XRkozZWtOd0wyNXVXVXhHVTBoR2RFaHhRVlZ0VkdkM09VWXdNbE0xUVVoa2MydzBNbE5aV0ZOR1dIaFlkMVpGTDFaTFExaEViMWM0WTBSSlQxZFhlVWhWZHpVeFNUWlVXVTl6TXl0YWVucG1MMDh4UkVrMFEzUmFlV1YwUzJWb1JuSjFTak5KVlVZM1VuSnlWa3hoTm5sSFZ5czVibk5yY21wd1drOW1SMHBtU1ZCQ2RHMDBibWROVTA0eFIwZzFSbTVrZEZWU1pUZDVlVWw1UXl0UFFXVjJNbEZpY1d4NGFFUXhkblpHTkZoQ2NFRldVMGxuU1dOMlZUUXJVVDA5TFMxUmNtcFVNbXRpWmxsVWRqVk5SRWR4T1ZBemRTOW5QVDA9LS1mNjBiNDI4NzljODhhYjI4ZTNlZTFjM2JiZGVhNTNiZjVkY2M2NGYz?cid=1839839752Get hashmaliciousUnknownBrowse
                    • 52.217.16.54
                    REnfXF7686.exeGet hashmaliciousPrivateLoader, RisePro StealerBrowse
                    • 108.157.162.69
                    https://demandtechreports.com/reports/Flexential-TheEvolved922Download.jspGet hashmaliciousUnknownBrowse
                    • 65.8.178.94
                    https://cocojonss.tumblr.com/Get hashmaliciousPorn ScamBrowse
                    • 76.223.105.51
                    No context
                    No context
                    Process:C:\Users\user\Desktop\pQBmVoyRnw.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:modified
                    Size (bytes):525
                    Entropy (8bit):5.259753436570609
                    Encrypted:false
                    SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                    MD5:260E01CC001F9C4643CA7A62F395D747
                    SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                    SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                    SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                    Process:C:\Users\user\Desktop\pQBmVoyRnw.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):308224
                    Entropy (8bit):4.94206206452333
                    Encrypted:false
                    SSDEEP:3072:ONwjqcl+yJ516Vl5m7PF7OE7u/vDR1GK5WwiuGK36yUG9XV/VwMM:wwjqZxl5mQS+mwic3Xv/m
                    MD5:16C7B2832CE255D5DA4A5D85A4089758
                    SHA1:80ED8B75AE30BC4DF6671C5BCA8084ABA2148EF4
                    SHA-256:FD13ED8D469C4CB5507716FEEE5C7139C38957B48A4EBFF2D40D7A9269884387
                    SHA-512:65E6F8CE9F39FFCD6042CF0E39EDA1CF9423367F6F98025A896FE2B2D4804F080C70250F568D377DAFB4679CCFBAD98BE1A4974B49911F254E2EE918ACBD3139
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\System.exe, Author: Joe Security
                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\System.exe, Author: unknown
                    • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\System.exe, Author: Brian Wallace @botnet_hunter
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\System.exe, Author: ditekSHen
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ve.....................&.......... ........@.. ....................... ............@.....................................K........#........................................................................... ............... ..H............text....... ...................... ..`.rsrc....#.......$..................@..@.reloc..............................@..B........................H........e...E..........................................................&.(......**..(......*.s.........s.........s.........s..........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                    Process:C:\Users\user\Desktop\pQBmVoyRnw.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview:[ZoneTransfer]....ZoneId=0
                    Process:C:\Users\user\System.exe
                    File Type:Microsoft Windows Autorun file
                    Category:dropped
                    Size (bytes):50
                    Entropy (8bit):4.320240000427043
                    Encrypted:false
                    SSDEEP:3:It1KV2LKMACovK0x:e1KzxvD
                    MD5:5B0B50BADE67C5EC92D42E971287A5D9
                    SHA1:90D5C99143E7A56AD6E5EE401015F8ECC093D95A
                    SHA-256:04DDE2489D2D2E6846D42250D813AB90B5CA847D527F8F2C022E6C327DC6DB53
                    SHA-512:C064DC3C4185A38D1CAEBD069ACB9FDBB85DFB650D6A241036E501A09BC89FD06E267BE9D400D20E6C14B4068473D1C6557962E8D82FDFD191DB7EABB6E66821
                    Malicious:true
                    Reputation:moderate, very likely benign file
                    Preview:[autorun]..open=C:\svchost.exe..shellexecute=C:\..
                    Process:C:\Users\user\System.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):308224
                    Entropy (8bit):4.94206206452333
                    Encrypted:false
                    SSDEEP:3072:ONwjqcl+yJ516Vl5m7PF7OE7u/vDR1GK5WwiuGK36yUG9XV/VwMM:wwjqZxl5mQS+mwic3Xv/m
                    MD5:16C7B2832CE255D5DA4A5D85A4089758
                    SHA1:80ED8B75AE30BC4DF6671C5BCA8084ABA2148EF4
                    SHA-256:FD13ED8D469C4CB5507716FEEE5C7139C38957B48A4EBFF2D40D7A9269884387
                    SHA-512:65E6F8CE9F39FFCD6042CF0E39EDA1CF9423367F6F98025A896FE2B2D4804F080C70250F568D377DAFB4679CCFBAD98BE1A4974B49911F254E2EE918ACBD3139
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\svchost.exe, Author: Joe Security
                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\svchost.exe, Author: unknown
                    • Rule: njrat1, Description: Identify njRat, Source: C:\svchost.exe, Author: Brian Wallace @botnet_hunter
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\svchost.exe, Author: ditekSHen
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ve.....................&.......... ........@.. ....................... ............@.....................................K........#........................................................................... ............... ..H............text....... ...................... ..`.rsrc....#.......$..................@..@.reloc..............................@..B........................H........e...E..........................................................&.(......**..(......*.s.........s.........s.........s..........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                    Process:C:\Users\user\System.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:false
                    Preview:[ZoneTransfer]....ZoneId=0
                    Process:C:\Windows\SysWOW64\netsh.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):313
                    Entropy (8bit):4.971939296804078
                    Encrypted:false
                    SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
                    MD5:689E2126A85BF55121488295EE068FA1
                    SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
                    SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
                    SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
                    Malicious:false
                    Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):4.94206206452333
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    • Win32 Executable (generic) a (10002005/4) 49.78%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    • DOS Executable Generic (2002/1) 0.01%
                    File name:pQBmVoyRnw.exe
                    File size:308'224 bytes
                    MD5:16c7b2832ce255d5da4a5d85a4089758
                    SHA1:80ed8b75ae30bc4df6671c5bca8084aba2148ef4
                    SHA256:fd13ed8d469c4cb5507716feee5c7139c38957b48a4ebff2d40d7a9269884387
                    SHA512:65e6f8ce9f39ffcd6042cf0e39eda1cf9423367f6f98025a896fe2b2d4804f080c70250f568d377dafb4679ccfbad98be1a4974b49911f254e2ee918acbd3139
                    SSDEEP:3072:ONwjqcl+yJ516Vl5m7PF7OE7u/vDR1GK5WwiuGK36yUG9XV/VwMM:wwjqZxl5mQS+mwic3Xv/m
                    TLSH:3B643C572B5A8C87D13667FD0441E3B987132FC8782AC3129AF1EC63F5E2A472D5A6D0
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ve.....................&........... ........@.. ....................... ............@................................
                    Icon Hash:787150f4f8f9558e
                    Entrypoint:0x40abce
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x6576DAEF [Mon Dec 11 09:48:31 2023 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xab800x4b.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x4230c.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x500000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000x8bd40x8c00False0.4638113839285714data5.60518222440242IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0xc0000x4230c0x42400False0.36205778301886793data4.73198787741136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x500000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0xc0e80x42028Device independent bitmap graphic, 256 x 512 x 32, image size 262144, resolution 2834 x 2834 px/m0.3617665769151108
                    RT_GROUP_ICON0x4e1100x14data0.9
                    RT_MANIFEST0x4e1240x1e7XML 1.0 document, ASCII text, with CRLF line terminators0.5338809034907598
                    DLLImport
                    mscoree.dll_CorExeMain
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    192.168.2.418.192.93.8649742184902814856 12/13/23-20:59:05.476604TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974218490192.168.2.418.192.93.86
                    192.168.2.418.192.93.8649741184902814856 12/13/23-20:58:48.936323TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974118490192.168.2.418.192.93.86
                    192.168.2.418.156.13.20949745184902814856 12/13/23-21:00:01.573922TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974518490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949744184902814856 12/13/23-20:59:39.970423TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974418490192.168.2.418.156.13.209
                    192.168.2.418.192.93.8649740184902814856 12/13/23-20:58:31.218361TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974018490192.168.2.418.192.93.86
                    192.168.2.418.156.13.20949746184902814856 12/13/23-21:00:14.421142TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974618490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949735184902033132 12/13/23-20:57:35.118070TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973518490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949736184902033132 12/13/23-20:57:37.678304TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973618490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949735184902825563 12/13/23-20:57:35.360179TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4973518490192.168.2.418.156.13.209
                    192.168.2.43.126.37.1849748184902033132 12/13/23-21:00:35.097288TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974818490192.168.2.43.126.37.18
                    192.168.2.418.156.13.20949736184902825563 12/13/23-20:57:37.919447TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4973618490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949729184902814856 12/13/23-20:57:12.551556TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4972918490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949745184902814860 12/13/23-21:00:04.191355TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974518490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949736184902825564 12/13/23-20:57:41.941315TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4973618490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949738184902825564 12/13/23-20:58:06.222500TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4973818490192.168.2.418.156.13.209
                    192.168.2.43.126.37.1849749184902033132 12/13/23-21:00:49.784107TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974918490192.168.2.43.126.37.18
                    192.168.2.418.156.13.20949738184902825563 12/13/23-20:57:57.039800TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4973818490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949729184902033132 12/13/23-20:57:12.311856TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4972918490192.168.2.418.156.13.209
                    192.168.2.418.192.93.8649740184902814860 12/13/23-20:58:34.292329TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974018490192.168.2.418.192.93.86
                    192.168.2.43.126.37.1849748184902825563 12/13/23-21:00:35.340154TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974818490192.168.2.43.126.37.18
                    192.168.2.418.156.13.20949746184902814860 12/13/23-21:00:20.521339TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974618490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949738184902033132 12/13/23-20:57:56.798992TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973818490192.168.2.418.156.13.209
                    192.168.2.418.192.93.8649742184902814860 12/13/23-20:59:22.207993TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974218490192.168.2.418.192.93.86
                    192.168.2.43.126.37.1849748184902825564 12/13/23-21:00:43.961202TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974818490192.168.2.43.126.37.18
                    192.168.2.418.156.13.20949736184902814860 12/13/23-20:57:41.941315TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4973618490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949745184902825563 12/13/23-21:00:01.573922TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974518490192.168.2.418.156.13.209
                    192.168.2.418.192.93.8649741184902814860 12/13/23-20:58:50.550982TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974118490192.168.2.418.192.93.86
                    192.168.2.418.192.93.8649742184902033132 12/13/23-20:59:05.233882TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974218490192.168.2.418.192.93.86
                    192.168.2.418.156.13.20949744184902825563 12/13/23-20:59:39.970423TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974418490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949743184902825564 12/13/23-20:59:36.738003TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974318490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949738184902814860 12/13/23-20:58:06.222500TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4973818490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949729184902814860 12/13/23-20:57:17.144904TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4972918490192.168.2.418.156.13.209
                    192.168.2.418.192.93.8649741184902033132 12/13/23-20:58:48.693931TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974118490192.168.2.418.192.93.86
                    192.168.2.418.156.13.20949743184902825563 12/13/23-20:59:29.420656TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974318490192.168.2.418.156.13.209
                    192.168.2.418.192.93.8649740184902033132 12/13/23-20:58:30.976409TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974018490192.168.2.418.192.93.86
                    192.168.2.43.126.37.1849747184902825563 12/13/23-21:00:31.845369TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974718490192.168.2.43.126.37.18
                    192.168.2.43.126.37.1849747184902825564 12/13/23-21:00:32.601428TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974718490192.168.2.43.126.37.18
                    192.168.2.43.126.37.1849747184902814856 12/13/23-21:00:31.845369TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974718490192.168.2.43.126.37.18
                    192.168.2.418.156.13.20949736184902814856 12/13/23-20:57:37.919447TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973618490192.168.2.418.156.13.209
                    192.168.2.418.192.93.8649739184902814860 12/13/23-20:58:28.703174TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4973918490192.168.2.418.192.93.86
                    192.168.2.418.156.13.20949735184902814856 12/13/23-20:57:35.360179TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973518490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949744184902033132 12/13/23-20:59:39.730343TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974418490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949743184902033132 12/13/23-20:59:29.178728TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974318490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949745184902033132 12/13/23-21:00:01.333423TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974518490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949745184902825564 12/13/23-21:00:04.191355TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974518490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949746184902033132 12/13/23-21:00:14.180570TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974618490192.168.2.418.156.13.209
                    192.168.2.43.126.37.1849748184902814860 12/13/23-21:00:46.399246TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974818490192.168.2.43.126.37.18
                    192.168.2.418.156.13.20949746184902825564 12/13/23-21:00:20.521339TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974618490192.168.2.418.156.13.209
                    192.168.2.418.192.93.8649739184902814856 12/13/23-20:58:12.572286TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973918490192.168.2.418.192.93.86
                    192.168.2.418.156.13.20949746184902825563 12/13/23-21:00:14.421142TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974618490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949738184902814856 12/13/23-20:57:57.039800TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973818490192.168.2.418.156.13.209
                    192.168.2.418.192.93.8649739184902825564 12/13/23-20:58:28.503388TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4973918490192.168.2.418.192.93.86
                    192.168.2.418.156.13.20949729184902825563 12/13/23-20:57:12.551556TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4972918490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949729184902825564 12/13/23-20:57:17.144904TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4972918490192.168.2.418.156.13.209
                    192.168.2.418.156.13.20949743184902814860 12/13/23-20:59:37.308006TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974318490192.168.2.418.156.13.209
                    192.168.2.43.126.37.1849747184902814860 12/13/23-21:00:32.601428TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974718490192.168.2.43.126.37.18
                    192.168.2.43.126.37.1849747184902033132 12/13/23-21:00:31.603382TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974718490192.168.2.43.126.37.18
                    192.168.2.418.192.93.8649739184902033132 12/13/23-20:58:12.331562TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973918490192.168.2.418.192.93.86
                    192.168.2.418.192.93.8649740184902825564 12/13/23-20:58:34.292329TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974018490192.168.2.418.192.93.86
                    192.168.2.418.192.93.8649741184902825564 12/13/23-20:58:50.550982TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974118490192.168.2.418.192.93.86
                    192.168.2.418.192.93.8649741184902825563 12/13/23-20:58:48.936323TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974118490192.168.2.418.192.93.86
                    192.168.2.418.192.93.8649740184902825563 12/13/23-20:58:31.218361TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974018490192.168.2.418.192.93.86
                    192.168.2.43.126.37.1849749184902814856 12/13/23-21:00:50.028478TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974918490192.168.2.43.126.37.18
                    192.168.2.418.156.13.20949743184902814856 12/13/23-20:59:29.420656TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974318490192.168.2.418.156.13.209
                    192.168.2.418.192.93.8649742184902825564 12/13/23-20:59:22.207993TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974218490192.168.2.418.192.93.86
                    192.168.2.43.126.37.1849748184902814856 12/13/23-21:00:35.340154TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974818490192.168.2.43.126.37.18
                    192.168.2.418.192.93.8649742184902825563 12/13/23-20:59:05.476604TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974218490192.168.2.418.192.93.86
                    TimestampSource PortDest PortSource IPDest IP
                    Dec 13, 2023 20:57:10.901509047 CET4972918490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:11.140928984 CET184904972918.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:11.141118050 CET4972918490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:12.311856031 CET4972918490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:12.551337004 CET184904972918.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:12.551556110 CET4972918490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:12.791157007 CET184904972918.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:17.144903898 CET4972918490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:17.384371042 CET184904972918.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:32.473526001 CET184904972918.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:32.473622084 CET4972918490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:32.846924067 CET184904972918.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:32.847234964 CET4972918490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:34.864824057 CET4972918490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:34.867604017 CET4973518490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:35.104500055 CET184904972918.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:35.109445095 CET184904973518.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:35.109545946 CET4973518490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:35.118069887 CET4973518490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:35.359971046 CET184904973518.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:35.360178947 CET4973518490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:35.422393084 CET184904973518.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:35.422519922 CET4973518490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:35.601978064 CET184904973518.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:35.664186954 CET184904973518.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:37.429878950 CET4973618490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:37.671168089 CET184904973618.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:37.671314001 CET4973618490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:37.678303957 CET4973618490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:37.919182062 CET184904973618.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:37.919446945 CET4973618490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:38.160406113 CET184904973618.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:41.941314936 CET4973618490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:42.182235956 CET184904973618.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:54.543812037 CET184904973618.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:54.543926001 CET4973618490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:56.550579071 CET4973618490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:56.553515911 CET4973818490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:56.792188883 CET184904973618.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:56.793601990 CET184904973818.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:56.793713093 CET4973818490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:56.798991919 CET4973818490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:57.039700985 CET184904973818.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:57.039799929 CET4973818490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:57.280219078 CET184904973818.156.13.209192.168.2.4
                    Dec 13, 2023 20:57:58.863471031 CET4973818490192.168.2.418.156.13.209
                    Dec 13, 2023 20:57:59.103889942 CET184904973818.156.13.209192.168.2.4
                    Dec 13, 2023 20:58:04.363184929 CET4973818490192.168.2.418.156.13.209
                    Dec 13, 2023 20:58:04.603060961 CET184904973818.156.13.209192.168.2.4
                    Dec 13, 2023 20:58:06.222500086 CET4973818490192.168.2.418.156.13.209
                    Dec 13, 2023 20:58:06.462677002 CET184904973818.156.13.209192.168.2.4
                    Dec 13, 2023 20:58:09.930974007 CET184904973818.156.13.209192.168.2.4
                    Dec 13, 2023 20:58:09.931065083 CET4973818490192.168.2.418.156.13.209
                    Dec 13, 2023 20:58:11.941078901 CET4973818490192.168.2.418.156.13.209
                    Dec 13, 2023 20:58:12.082947969 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:12.181025982 CET184904973818.156.13.209192.168.2.4
                    Dec 13, 2023 20:58:12.323684931 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:12.323796988 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:12.331562042 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:12.572069883 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:12.572285891 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:12.812907934 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:13.254117966 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:13.494761944 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:13.494853020 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:13.736146927 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:13.736285925 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:13.977941990 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:13.978131056 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:14.219233036 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:14.219398022 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:14.460613012 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:14.460778952 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:14.704790115 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:14.713036060 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:14.713182926 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:14.945477962 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:14.945533991 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:14.945681095 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:14.953753948 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:15.169796944 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:15.186440945 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:15.186701059 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:15.411144018 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:15.411273003 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:15.411288977 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:15.428788900 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:15.429052114 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:15.651911974 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:15.652097940 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:15.669529915 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:15.669610023 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:15.875209093 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:15.895200968 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:15.895339966 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:15.912581921 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:15.912646055 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:16.115864038 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:16.115992069 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:16.136182070 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:16.136260033 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:16.153175116 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:16.153268099 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:16.356880903 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:16.357135057 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:16.377103090 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:16.377217054 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:16.396172047 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:16.396264076 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:16.597929955 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:16.598118067 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:16.618135929 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:16.618225098 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:16.637366056 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:16.637554884 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:16.840553045 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:16.840733051 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:16.859939098 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:16.860069036 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:16.879261971 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:16.879466057 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:17.081577063 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:17.081705093 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:17.100591898 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:17.100653887 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:17.119883060 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:17.119942904 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:17.322976112 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:17.323148966 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:17.341845989 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:17.342066050 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:17.360528946 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:17.360615015 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:17.563947916 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:17.564084053 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:17.582652092 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:17.582748890 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:17.601597071 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:17.601758957 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:17.804864883 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:17.805177927 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:17.823177099 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:17.823322058 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:17.842518091 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:17.842931986 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:18.045799017 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:18.045902014 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:18.063874006 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:18.064205885 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:18.083477974 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:18.083571911 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:18.287249088 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:18.287336111 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:18.305883884 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:18.305943012 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:18.325047016 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:18.325105906 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:18.527883053 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:18.528121948 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:18.546380997 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:18.546479940 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:18.565574884 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:18.565661907 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:18.768918037 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:18.769098997 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:18.787081957 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:18.787230968 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:18.806224108 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:18.806302071 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:19.009768009 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:19.009862900 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:19.027837992 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:19.027959108 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:19.046871901 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:19.047060966 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:19.250597954 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:19.250861883 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:19.268507004 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:19.268666029 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:19.287642956 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:19.287801981 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:19.491650105 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:19.491739988 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:19.509202003 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:19.509254932 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:19.528373957 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:19.528429985 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:19.732462883 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:19.732661009 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:19.749831915 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:19.749968052 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:19.768881083 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:19.769110918 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:19.973423004 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:19.973664999 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:19.990678072 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:19.990915060 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:20.009567022 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:20.009706020 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:20.214232922 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:20.214411974 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:20.231498003 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:20.231774092 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:20.250241995 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:20.250543118 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:20.454951048 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:20.455291986 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:20.472173929 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:20.472347975 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:20.491067886 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:20.491255045 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:20.695822954 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:20.696114063 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:20.712800026 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:20.712934017 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:20.732532024 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:20.732749939 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:20.936767101 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:20.936976910 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:20.953495979 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:20.953753948 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:20.973351002 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:20.973526001 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:21.177566051 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:21.177783012 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:21.194268942 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:21.214154959 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:21.214209080 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:21.419270039 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:21.419375896 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:21.456235886 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:21.456384897 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:21.663800001 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:21.663945913 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:21.697432041 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:21.697525978 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:21.943638086 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:21.974059105 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:21.974059105 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:22.003432035 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:22.215030909 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:22.215055943 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:22.243927956 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:22.244132996 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:22.479509115 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:22.484718084 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:22.720546007 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:22.720797062 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:22.962318897 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:22.962424040 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:23.203275919 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:23.203389883 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:23.444027901 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:23.444197893 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:23.685127974 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:23.685334921 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:23.926203012 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:23.926666975 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:24.167313099 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:24.167428017 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:24.408118010 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:24.408329010 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:24.635047913 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:24.649152994 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:24.649255991 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:24.876024961 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:24.876210928 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:24.889792919 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:24.889883041 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:25.117310047 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:25.117429018 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:25.130394936 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:25.130472898 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:25.358213902 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:25.358364105 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:25.371115923 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:25.371239901 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:25.599272013 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:25.599622011 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:25.612026930 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:25.612112045 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:25.840692043 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:25.840806961 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:25.852587938 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:25.852657080 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:26.082458973 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:26.082570076 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:26.094795942 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:26.094885111 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:26.323868036 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:26.323992968 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:26.336225033 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:26.336324930 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:26.564932108 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:26.565049887 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:26.576931953 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:26.577002048 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:26.805849075 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:26.805984974 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:26.817564011 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:26.817636013 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:27.046698093 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:27.046801090 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:27.058078051 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:27.058144093 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:27.287436008 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:27.287564993 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:27.298739910 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:27.298860073 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:27.528306961 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:27.528445959 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:27.539463997 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:27.539546967 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:27.769156933 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:27.769339085 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:27.780323982 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:27.780452013 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:28.010613918 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:28.010725021 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:28.021961927 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:28.022041082 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:28.251516104 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:28.251691103 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:28.262594938 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:28.262722015 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:28.492284060 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:28.492415905 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:28.503184080 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:28.503387928 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:28.703078985 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:28.703174114 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:28.733028889 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:28.744060040 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:28.943855047 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:29.057013988 CET184904973918.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:29.057101965 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:30.722616911 CET4973918490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:30.726398945 CET4974018490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:30.967379093 CET184904974018.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:30.967760086 CET4974018490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:30.976408958 CET4974018490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:31.218096018 CET184904974018.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:31.218360901 CET4974018490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:31.460079908 CET184904974018.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:34.292329073 CET4974018490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:34.533658028 CET184904974018.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:46.426465988 CET184904974018.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:46.426562071 CET4974018490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:48.441021919 CET4974018490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:48.444349051 CET4974118490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:48.681973934 CET184904974018.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:48.686448097 CET184904974118.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:48.686599016 CET4974118490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:48.693931103 CET4974118490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:48.936124086 CET184904974118.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:48.936322927 CET4974118490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:49.178491116 CET184904974118.192.93.86192.168.2.4
                    Dec 13, 2023 20:58:50.550981998 CET4974118490192.168.2.418.192.93.86
                    Dec 13, 2023 20:58:50.793252945 CET184904974118.192.93.86192.168.2.4
                    Dec 13, 2023 20:59:02.885438919 CET184904974118.192.93.86192.168.2.4
                    Dec 13, 2023 20:59:02.885561943 CET4974118490192.168.2.418.192.93.86
                    Dec 13, 2023 20:59:04.894279957 CET4974118490192.168.2.418.192.93.86
                    Dec 13, 2023 20:59:04.896042109 CET4974218490192.168.2.418.192.93.86
                    Dec 13, 2023 20:59:05.135585070 CET184904974118.192.93.86192.168.2.4
                    Dec 13, 2023 20:59:05.138145924 CET184904974218.192.93.86192.168.2.4
                    Dec 13, 2023 20:59:05.138245106 CET4974218490192.168.2.418.192.93.86
                    Dec 13, 2023 20:59:05.233881950 CET4974218490192.168.2.418.192.93.86
                    Dec 13, 2023 20:59:05.476506948 CET184904974218.192.93.86192.168.2.4
                    Dec 13, 2023 20:59:05.476603985 CET4974218490192.168.2.418.192.93.86
                    Dec 13, 2023 20:59:05.718575001 CET184904974218.192.93.86192.168.2.4
                    Dec 13, 2023 20:59:07.394262075 CET4974218490192.168.2.418.192.93.86
                    Dec 13, 2023 20:59:07.636317968 CET184904974218.192.93.86192.168.2.4
                    Dec 13, 2023 20:59:18.519399881 CET4974218490192.168.2.418.192.93.86
                    Dec 13, 2023 20:59:18.761509895 CET184904974218.192.93.86192.168.2.4
                    Dec 13, 2023 20:59:22.207993031 CET4974218490192.168.2.418.192.93.86
                    Dec 13, 2023 20:59:22.449979067 CET184904974218.192.93.86192.168.2.4
                    Dec 13, 2023 20:59:26.756757975 CET184904974218.192.93.86192.168.2.4
                    Dec 13, 2023 20:59:26.756860018 CET4974218490192.168.2.418.192.93.86
                    Dec 13, 2023 20:59:28.769045115 CET4974218490192.168.2.418.192.93.86
                    Dec 13, 2023 20:59:28.931339979 CET4974318490192.168.2.418.156.13.209
                    Dec 13, 2023 20:59:29.011313915 CET184904974218.192.93.86192.168.2.4
                    Dec 13, 2023 20:59:29.173384905 CET184904974318.156.13.209192.168.2.4
                    Dec 13, 2023 20:59:29.173489094 CET4974318490192.168.2.418.156.13.209
                    Dec 13, 2023 20:59:29.178728104 CET4974318490192.168.2.418.156.13.209
                    Dec 13, 2023 20:59:29.420447111 CET184904974318.156.13.209192.168.2.4
                    Dec 13, 2023 20:59:29.420655966 CET4974318490192.168.2.418.156.13.209
                    Dec 13, 2023 20:59:29.662597895 CET184904974318.156.13.209192.168.2.4
                    Dec 13, 2023 20:59:30.005098104 CET4974318490192.168.2.418.156.13.209
                    Dec 13, 2023 20:59:30.247769117 CET184904974318.156.13.209192.168.2.4
                    Dec 13, 2023 20:59:33.707458973 CET4974318490192.168.2.418.156.13.209
                    Dec 13, 2023 20:59:33.949954033 CET184904974318.156.13.209192.168.2.4
                    Dec 13, 2023 20:59:34.191294909 CET4974318490192.168.2.418.156.13.209
                    Dec 13, 2023 20:59:34.433254957 CET184904974318.156.13.209192.168.2.4
                    Dec 13, 2023 20:59:35.737833023 CET4974318490192.168.2.418.156.13.209
                    Dec 13, 2023 20:59:35.979918003 CET184904974318.156.13.209192.168.2.4
                    Dec 13, 2023 20:59:35.980032921 CET4974318490192.168.2.418.156.13.209
                    Dec 13, 2023 20:59:36.222721100 CET184904974318.156.13.209192.168.2.4
                    Dec 13, 2023 20:59:36.738003016 CET4974318490192.168.2.418.156.13.209
                    Dec 13, 2023 20:59:37.065881968 CET4974318490192.168.2.418.156.13.209
                    Dec 13, 2023 20:59:37.307743073 CET184904974318.156.13.209192.168.2.4
                    Dec 13, 2023 20:59:37.308006048 CET4974318490192.168.2.418.156.13.209
                    Dec 13, 2023 20:59:37.402365923 CET184904974318.156.13.209192.168.2.4
                    Dec 13, 2023 20:59:37.402462006 CET4974318490192.168.2.418.156.13.209
                    Dec 13, 2023 20:59:37.550308943 CET184904974318.156.13.209192.168.2.4
                    Dec 13, 2023 20:59:37.628462076 CET4974318490192.168.2.418.156.13.209
                    Dec 13, 2023 20:59:37.644243002 CET184904974318.156.13.209192.168.2.4
                    Dec 13, 2023 20:59:37.870446920 CET184904974318.156.13.209192.168.2.4
                    Dec 13, 2023 20:59:39.411741018 CET4974418490192.168.2.418.156.13.209
                    Dec 13, 2023 20:59:39.651463032 CET184904974418.156.13.209192.168.2.4
                    Dec 13, 2023 20:59:39.651768923 CET4974418490192.168.2.418.156.13.209
                    Dec 13, 2023 20:59:39.730343103 CET4974418490192.168.2.418.156.13.209
                    Dec 13, 2023 20:59:39.970319033 CET184904974418.156.13.209192.168.2.4
                    Dec 13, 2023 20:59:39.970422983 CET4974418490192.168.2.418.156.13.209
                    Dec 13, 2023 20:59:40.212121010 CET184904974418.156.13.209192.168.2.4
                    Dec 13, 2023 20:59:55.213386059 CET184904974418.156.13.209192.168.2.4
                    Dec 13, 2023 20:59:55.213572979 CET4974418490192.168.2.418.156.13.209
                    Dec 13, 2023 20:59:58.721664906 CET184904974418.156.13.209192.168.2.4
                    Dec 13, 2023 20:59:58.769035101 CET4974418490192.168.2.418.156.13.209
                    Dec 13, 2023 21:00:01.081789970 CET4974418490192.168.2.418.156.13.209
                    Dec 13, 2023 21:00:01.086968899 CET4974518490192.168.2.418.156.13.209
                    Dec 13, 2023 21:00:01.327130079 CET184904974518.156.13.209192.168.2.4
                    Dec 13, 2023 21:00:01.327264071 CET4974518490192.168.2.418.156.13.209
                    Dec 13, 2023 21:00:01.333422899 CET4974518490192.168.2.418.156.13.209
                    Dec 13, 2023 21:00:01.573710918 CET184904974518.156.13.209192.168.2.4
                    Dec 13, 2023 21:00:01.573921919 CET4974518490192.168.2.418.156.13.209
                    Dec 13, 2023 21:00:01.814137936 CET184904974518.156.13.209192.168.2.4
                    Dec 13, 2023 21:00:04.191354990 CET4974518490192.168.2.418.156.13.209
                    Dec 13, 2023 21:00:04.431564093 CET184904974518.156.13.209192.168.2.4
                    Dec 13, 2023 21:00:11.912884951 CET184904974518.156.13.209192.168.2.4
                    Dec 13, 2023 21:00:11.912955999 CET4974518490192.168.2.418.156.13.209
                    Dec 13, 2023 21:00:13.925451994 CET4974518490192.168.2.418.156.13.209
                    Dec 13, 2023 21:00:13.928412914 CET4974618490192.168.2.418.156.13.209
                    Dec 13, 2023 21:00:14.165858984 CET184904974518.156.13.209192.168.2.4
                    Dec 13, 2023 21:00:14.167917967 CET184904974618.156.13.209192.168.2.4
                    Dec 13, 2023 21:00:14.168024063 CET4974618490192.168.2.418.156.13.209
                    Dec 13, 2023 21:00:14.180569887 CET4974618490192.168.2.418.156.13.209
                    Dec 13, 2023 21:00:14.420924902 CET184904974618.156.13.209192.168.2.4
                    Dec 13, 2023 21:00:14.421142101 CET4974618490192.168.2.418.156.13.209
                    Dec 13, 2023 21:00:14.661237001 CET184904974618.156.13.209192.168.2.4
                    Dec 13, 2023 21:00:20.521338940 CET4974618490192.168.2.418.156.13.209
                    Dec 13, 2023 21:00:20.761042118 CET184904974618.156.13.209192.168.2.4
                    Dec 13, 2023 21:00:29.184673071 CET184904974618.156.13.209192.168.2.4
                    Dec 13, 2023 21:00:29.184756994 CET4974618490192.168.2.418.156.13.209
                    Dec 13, 2023 21:00:31.190916061 CET4974618490192.168.2.418.156.13.209
                    Dec 13, 2023 21:00:31.353108883 CET4974718490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:31.431098938 CET184904974618.156.13.209192.168.2.4
                    Dec 13, 2023 21:00:31.595365047 CET18490497473.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:31.595617056 CET4974718490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:31.603382111 CET4974718490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:31.845268011 CET18490497473.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:31.845369101 CET4974718490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:32.086793900 CET18490497473.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:32.601428032 CET4974718490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:32.841470003 CET18490497473.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:32.841579914 CET4974718490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:32.842941046 CET18490497473.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:33.083548069 CET18490497473.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:34.849711895 CET4974818490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:35.092462063 CET18490497483.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:35.092634916 CET4974818490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:35.097287893 CET4974818490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:35.340032101 CET18490497483.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:35.340153933 CET4974818490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:35.582632065 CET18490497483.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:41.535398960 CET4974818490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:41.778038979 CET18490497483.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:41.878498077 CET4974818490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:42.120965004 CET18490497483.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:43.175329924 CET4974818490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:43.419249058 CET18490497483.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:43.419365883 CET4974818490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:43.662395954 CET18490497483.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:43.961201906 CET4974818490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:44.203645945 CET18490497483.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:44.203722954 CET4974818490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:44.449342966 CET18490497483.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:44.449475050 CET4974818490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:44.692234039 CET18490497483.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:44.692385912 CET4974818490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:44.935211897 CET18490497483.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:44.935384035 CET4974818490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:45.180768013 CET18490497483.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:45.180900097 CET4974818490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:45.424686909 CET18490497483.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:45.424896002 CET4974818490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:45.667386055 CET18490497483.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:45.667541981 CET4974818490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:45.913842916 CET18490497483.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:45.913932085 CET4974818490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:46.156513929 CET18490497483.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:46.156629086 CET4974818490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:46.399116993 CET18490497483.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:46.399245977 CET4974818490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:46.431412935 CET18490497483.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:46.431587934 CET4974818490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:46.641813993 CET18490497483.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:46.674055099 CET18490497483.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:48.443794012 CET4974918490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:48.685277939 CET18490497493.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:48.685491085 CET4974918490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:49.784106970 CET4974918490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:50.028388977 CET18490497493.126.37.18192.168.2.4
                    Dec 13, 2023 21:00:50.028477907 CET4974918490192.168.2.43.126.37.18
                    Dec 13, 2023 21:00:50.270064116 CET18490497493.126.37.18192.168.2.4
                    TimestampSource PortDest PortSource IPDest IP
                    Dec 13, 2023 20:57:10.771677971 CET5585753192.168.2.41.1.1.1
                    Dec 13, 2023 20:57:10.898550987 CET53558571.1.1.1192.168.2.4
                    Dec 13, 2023 20:58:11.942609072 CET5723153192.168.2.41.1.1.1
                    Dec 13, 2023 20:58:12.081834078 CET53572311.1.1.1192.168.2.4
                    Dec 13, 2023 20:59:28.770751953 CET6264953192.168.2.41.1.1.1
                    Dec 13, 2023 20:59:28.930294037 CET53626491.1.1.1192.168.2.4
                    Dec 13, 2023 21:00:31.193830013 CET5027853192.168.2.41.1.1.1
                    Dec 13, 2023 21:00:31.351510048 CET53502781.1.1.1192.168.2.4
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Dec 13, 2023 20:57:10.771677971 CET192.168.2.41.1.1.10xb08cStandard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                    Dec 13, 2023 20:58:11.942609072 CET192.168.2.41.1.1.10x7630Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                    Dec 13, 2023 20:59:28.770751953 CET192.168.2.41.1.1.10x2154Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                    Dec 13, 2023 21:00:31.193830013 CET192.168.2.41.1.1.10x88edStandard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Dec 13, 2023 20:57:10.898550987 CET1.1.1.1192.168.2.40xb08cNo error (0)2.tcp.eu.ngrok.io18.156.13.209A (IP address)IN (0x0001)false
                    Dec 13, 2023 20:58:12.081834078 CET1.1.1.1192.168.2.40x7630No error (0)2.tcp.eu.ngrok.io18.192.93.86A (IP address)IN (0x0001)false
                    Dec 13, 2023 20:59:28.930294037 CET1.1.1.1192.168.2.40x2154No error (0)2.tcp.eu.ngrok.io18.156.13.209A (IP address)IN (0x0001)false
                    Dec 13, 2023 21:00:31.351510048 CET1.1.1.1192.168.2.40x88edNo error (0)2.tcp.eu.ngrok.io3.126.37.18A (IP address)IN (0x0001)false

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:20:56:54
                    Start date:13/12/2023
                    Path:C:\Users\user\Desktop\pQBmVoyRnw.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\Desktop\pQBmVoyRnw.exe
                    Imagebase:0xee0000
                    File size:308'224 bytes
                    MD5 hash:16C7B2832CE255D5DA4A5D85A4089758
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.1651277682.0000000000EE2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000000.1651277682.0000000000EE2000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                    • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000000.1651277682.0000000000EE2000.00000002.00000001.01000000.00000003.sdmp, Author: Brian Wallace @botnet_hunter
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:20:57:01
                    Start date:13/12/2023
                    Path:C:\Users\user\System.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\System.exe"
                    Imagebase:0x820000
                    File size:308'224 bytes
                    MD5 hash:16C7B2832CE255D5DA4A5D85A4089758
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000001.00000002.4111124324.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\System.exe, Author: Joe Security
                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\System.exe, Author: unknown
                    • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\System.exe, Author: Brian Wallace @botnet_hunter
                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\System.exe, Author: ditekSHen
                    Antivirus matches:
                    • Detection: 100%, Avira
                    • Detection: 100%, Joe Sandbox ML
                    Reputation:low
                    Has exited:false

                    Target ID:3
                    Start time:20:57:07
                    Start date:13/12/2023
                    Path:C:\Windows\SysWOW64\netsh.exe
                    Wow64 process (32bit):true
                    Commandline:netsh firewall add allowedprogram "C:\Users\user\System.exe" "System.exe" ENABLE
                    Imagebase:0x1560000
                    File size:82'432 bytes
                    MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate
                    Has exited:true

                    Target ID:4
                    Start time:20:57:07
                    Start date:13/12/2023
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7699e0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:9.5%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:37
                      Total number of Limit Nodes:1
                      execution_graph 1731 187aa07 1732 187aa3e CopyFileW 1731->1732 1734 187aa8e 1732->1734 1707 187a8c6 1708 187a8ef SetFileAttributesW 1707->1708 1710 187a90b 1708->1710 1711 187ac46 1712 187ac6c ShellExecuteExW 1711->1712 1714 187ac88 1712->1714 1715 187a646 1717 187a67e CreateMutexW 1715->1717 1718 187a6c1 1717->1718 1739 187a8a4 1742 187a8c6 SetFileAttributesW 1739->1742 1741 187a90b 1742->1741 1743 187ac24 1745 187ac46 ShellExecuteExW 1743->1745 1746 187ac88 1745->1746 1751 187a462 1752 187a486 RegSetValueExW 1751->1752 1754 187a507 1752->1754 1755 187a361 1756 187a392 RegQueryValueExW 1755->1756 1758 187a41b 1756->1758 1735 187a612 1737 187a646 CreateMutexW 1735->1737 1738 187a6c1 1737->1738 1747 187a2d2 1748 187a2d6 SetErrorMode 1747->1748 1750 187a33f 1748->1750 1723 187a2fe 1724 187a353 1723->1724 1725 187a32a SetErrorMode 1723->1725 1724->1725 1726 187a33f 1725->1726 1727 187aa3e 1728 187aa67 CopyFileW 1727->1728 1730 187aa8e 1728->1730

                      Callgraph

                      • Executed
                      • Not Executed
                      • Opacity -> Relevance
                      • Disassembly available
                      callgraph 0 Function_01872B86 1 Function_0187A486 2 Function_01872684 3 Function_05830080 4 Function_05830889 53 Function_018B0606 4->53 5 Function_05830C8D 6 Function_01872194 7 Function_0187A392 8 Function_01872691 9 Function_0583069B 10 Function_0187AB9E 11 Function_05830D98 12 Function_0187A09A 13 Function_01872699 14 Function_01872098 15 Function_018724A6 16 Function_0187A8A4 17 Function_05830BA8 18 Function_018729B4 19 Function_018B05BF 20 Function_018723BC 21 Function_058303BD 21->53 84 Function_05830958 21->84 22 Function_018728B8 23 Function_0187A7C7 24 Function_0187ACC7 25 Function_0187A8C6 26 Function_018B05CF 27 Function_01872BC1 28 Function_018729C0 29 Function_0187AACF 30 Function_018727C9 31 Function_018727D5 32 Function_018726D4 33 Function_0187A2D2 34 Function_018720D0 35 Function_018729E6 36 Function_018726E4 37 Function_0187AAE1 38 Function_018727EE 39 Function_018723F4 40 Function_018725F4 41 Function_0187A1F4 42 Function_018721F0 43 Function_0187A2FE 44 Function_0187ACFA 45 Function_05830B03 46 Function_0187AA07 47 Function_0187AB06 48 Function_05830301 48->53 48->84 49 Function_0187A005 50 Function_05830007 50->21 50->48 50->53 54 Function_05830310 50->54 51 Function_05830F05 52 Function_018B0000 54->53 54->84 55 Function_0187A612 56 Function_0187AC11 57 Function_0187A710 58 Function_0187A81E 59 Function_0187201C 60 Function_05830C22 61 Function_0187AC24 62 Function_01872621 63 Function_0187A120 64 Function_0187A02E 65 Function_018B003A 66 Function_05830630 67 Function_01872430 68 Function_0187AA3E 69 Function_0187253D 70 Function_0187213C 71 Function_05830938 72 Function_0187A23C 73 Function_0187A646 74 Function_0187AC46 75 Function_05830D40 76 Function_018B0648 88 Function_018B066A 76->88 77 Function_0187A540 78 Function_0187A74E 79 Function_018B0740 80 Function_0583084F 81 Function_0187A952 82 Function_05830E55 83 Function_0187A25E 84->53 85 Function_05830F58 86 Function_0187A45C 87 Function_01872458 89 Function_05830761 90 Function_01872364 91 Function_01872264 92 Function_0187A462 93 Function_018B026D 94 Function_0187A361 95 Function_0583076B 96 Function_0187A56E 97 Function_01872675 98 Function_0187AB74 99 Function_018B067F 100 Function_0187A172 101 Function_0187A97E 102 Function_01872678 103 Function_018B0074 104 Function_0187A078

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 5830310-5830334 2 5830336-5830338 0->2 3 583033e-5830346 0->3 2->3 4 5830348-583034d 3->4 5 583034e-5830391 3->5 8 5830393-58303ce 5->8 9 58303d8-5830418 5->9 8->9 16 583041a 9->16 17 583041f 9->17 16->17 53 583041f call 5830958 17->53 54 583041f call 18b0606 17->54 18 5830425-5830434 19 5830436-5830460 18->19 20 583046b-5830523 18->20 19->20 39 5830570-5830587 20->39 40 5830525-5830569 20->40 41 5830880 39->41 42 583058d-58305bf 39->42 40->39 42->41 53->18 54->18
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1719687379.0000000005830000.00000040.00000800.00020000.00000000.sdmp, Offset: 05830000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5830000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID:
                      • String ID: [4k^$-[4k^$2*l$2*l$2*l$=[4k^
                      • API String ID: 0-2407101900
                      • Opcode ID: 8c6e40f1e62e8637664915de84ea5c8f2b14aca0506c099b8742cdc7d6c68f5c
                      • Instruction ID: 07aaaabf1cb4ea166773daf28ce6aa9425c7d87d78468f1a92665b946feb0342
                      • Opcode Fuzzy Hash: 8c6e40f1e62e8637664915de84ea5c8f2b14aca0506c099b8742cdc7d6c68f5c
                      • Instruction Fuzzy Hash: 1C5102307002058BC718EB7D94156BE77E7FB89208B548069E806DF7D5DF39DE0A8BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 55 58303bd-5830418 63 583041a 55->63 64 583041f 55->64 63->64 100 583041f call 5830958 64->100 101 583041f call 18b0606 64->101 65 5830425-5830434 66 5830436-5830460 65->66 67 583046b-5830523 65->67 66->67 86 5830570-5830587 67->86 87 5830525-5830569 67->87 88 5830880 86->88 89 583058d-58305bf 86->89 87->86 89->88 100->65 101->65
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1719687379.0000000005830000.00000040.00000800.00020000.00000000.sdmp, Offset: 05830000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5830000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID:
                      • String ID: [4k^$-[4k^$2*l$2*l$2*l$=[4k^
                      • API String ID: 0-2407101900
                      • Opcode ID: a79b7060878d4a6cd99b84879b8911524584636483c001dfb24286a14e17be15
                      • Instruction ID: 08d6ea051206514f29248ecde04bb46bd3ed599c13b1d27e7f41e8f716754026
                      • Opcode Fuzzy Hash: a79b7060878d4a6cd99b84879b8911524584636483c001dfb24286a14e17be15
                      • Instruction Fuzzy Hash: FB41B430B002558BCB08A77D90152FD72D7AFC9648B548029D906DF7D4DF29CE0A8BE6
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 102 5830958-5830993 104 5830999-5830a24 call 18b0606 102->104 105 5830a2e-5830a30 102->105 147 5830a2a-5830a2c 104->147 106 5830a37-5830a3c 105->106 108 5830a42-5830a7a 106->108 109 5830b1e-5830bc2 106->109 125 5830aa1-5830afc 108->125 126 5830a7c-5830a9a 108->126 145 5830bc8-5830c8b 109->145 146 5830c9e-5830ca7 109->146 165 5830b01 125->165 126->125 145->146 148 5830d51-5830d5a 146->148 149 5830cad-5830d3e 146->149 147->105 151 5830a32 147->151 153 5830d7a-5830d83 148->153 154 5830d5c-5830d73 148->154 149->148 151->106 155 5830d85-5830d96 153->155 156 5830da9-5830db2 153->156 154->153 155->156 160 5830f33-5830f3a 156->160 161 5830db8-5830e06 156->161 182 5830f1c-5830f2d 161->182 165->109 182->160 184 5830e0b-5830e14 182->184 187 5830f40-5830fd1 184->187 188 5830e1a-5830f1a 184->188 218 5830fd7-5830fe8 187->218 219 58310ca 187->219 188->182 236 5830f3b 188->236 225 5830fea-583100b 218->225 221 58310cc-58310d3 219->221 234 5831012-5831048 225->234 235 583100d 225->235 242 583104a 234->242 243 583104f-5831077 234->243 235->234 236->187 242->243 247 5831079-583107b 243->247 248 583107d-58310a1 243->248 247->221 251 58310a3-58310a8 248->251 252 58310aa-58310b4 248->252 251->221 253 58310b6-58310b8 252->253 254 58310ba-58310c4 252->254 253->221 254->219 254->225
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1719687379.0000000005830000.00000040.00000800.00020000.00000000.sdmp, Offset: 05830000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5830000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID:
                      • String ID: \O*l
                      • API String ID: 0-4030088352
                      • Opcode ID: 316844f3c312a967ffe82204a0371bbf86c518c7cac36550c598c291b1feda0f
                      • Instruction ID: f137ae00b2d7d4f923a002da8c8d5b2ad882d3375424631dcb3469b39a9ae7b0
                      • Opcode Fuzzy Hash: 316844f3c312a967ffe82204a0371bbf86c518c7cac36550c598c291b1feda0f
                      • Instruction Fuzzy Hash: FC027A30701204CFCB58EB78E455BAE77E6EF88208F608568D906DB7A5DF399C46CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 256 187a612-187a695 260 187a697 256->260 261 187a69a-187a6a3 256->261 260->261 262 187a6a5 261->262 263 187a6a8-187a6b1 261->263 262->263 264 187a6b3-187a6d7 CreateMutexW 263->264 265 187a702-187a707 263->265 268 187a709-187a70e 264->268 269 187a6d9-187a6ff 264->269 265->264 268->269
                      APIs
                      • CreateMutexW.KERNELBASE(?,?), ref: 0187A6B9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1719287915.000000000187A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0187A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_187a000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID: CreateMutex
                      • String ID:
                      • API String ID: 1964310414-0
                      • Opcode ID: 33afe6a25dd71b5638c31bd8331dad94eb82636393a97a708c6012de62b4469d
                      • Instruction ID: a0554a0f5611e076710f8f431bc7cf13716550521707631f41203bc342a1f25f
                      • Opcode Fuzzy Hash: 33afe6a25dd71b5638c31bd8331dad94eb82636393a97a708c6012de62b4469d
                      • Instruction Fuzzy Hash: 6A318FB55093806FE712CB65DC85B96BFF8EF06310F08849AE984CB292D365E909C761
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 272 187a361-187a3cf 275 187a3d4-187a3dd 272->275 276 187a3d1 272->276 277 187a3e2-187a3e8 275->277 278 187a3df 275->278 276->275 279 187a3ed-187a404 277->279 280 187a3ea 277->280 278->277 282 187a406-187a419 RegQueryValueExW 279->282 283 187a43b-187a440 279->283 280->279 284 187a442-187a447 282->284 285 187a41b-187a438 282->285 283->282 284->285
                      APIs
                      • RegQueryValueExW.KERNELBASE(?,00000E24,A7F2C20D,00000000,00000000,00000000,00000000), ref: 0187A40C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1719287915.000000000187A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0187A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_187a000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: a911314adee2f3901886db479946ae54d5613a8383bb3f8fa60e728e5f2eed20
                      • Instruction ID: 2c5b01349a7ecc367be03cc16b9c24d948e93eebc4c61ab1307ce672dce506f3
                      • Opcode Fuzzy Hash: a911314adee2f3901886db479946ae54d5613a8383bb3f8fa60e728e5f2eed20
                      • Instruction Fuzzy Hash: 87315E75509780AFE722CF15DC84FA6BBF8EF06710F08849AE945CB292D364E949CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 289 187a462-187a4c3 292 187a4c5 289->292 293 187a4c8-187a4d4 289->293 292->293 294 187a4d6 293->294 295 187a4d9-187a4f0 293->295 294->295 297 187a527-187a52c 295->297 298 187a4f2-187a505 RegSetValueExW 295->298 297->298 299 187a507-187a524 298->299 300 187a52e-187a533 298->300 300->299
                      APIs
                      • RegSetValueExW.KERNELBASE(?,00000E24,A7F2C20D,00000000,00000000,00000000,00000000), ref: 0187A4F8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1719287915.000000000187A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0187A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_187a000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID: Value
                      • String ID:
                      • API String ID: 3702945584-0
                      • Opcode ID: 895c380ec64dc2a24b8a715fe181465ffafabaae0d498433ef226d69ac792ada
                      • Instruction ID: e27df3363cce7c15005753328cdede63075d709cbf42d3e64987859bb4b85068
                      • Opcode Fuzzy Hash: 895c380ec64dc2a24b8a715fe181465ffafabaae0d498433ef226d69ac792ada
                      • Instruction Fuzzy Hash: 972192B65043806FD7228F55DC44FA7BFB8DF45310F08849AE945CB692D365E948C771
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 319 187aa07-187aa65 321 187aa67 319->321 322 187aa6a-187aa70 319->322 321->322 323 187aa75-187aa7e 322->323 324 187aa72 322->324 325 187aac1-187aac6 323->325 326 187aa80-187aaa0 CopyFileW 323->326 324->323 325->326 329 187aaa2-187aabe 326->329 330 187aac8-187aacd 326->330 330->329
                      APIs
                      • CopyFileW.KERNELBASE(?,?,?), ref: 0187AA86
                      Memory Dump Source
                      • Source File: 00000000.00000002.1719287915.000000000187A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0187A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_187a000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID: CopyFile
                      • String ID:
                      • API String ID: 1304948518-0
                      • Opcode ID: 7fe92be6d366e8823227164bf71373c3c5a5e26e2f9a2d1a8356704c32fd00c1
                      • Instruction ID: e661d4bdc315c5d4ef048a95f9ee099c26dcd9a1706322acedbe7e4c49b3dd45
                      • Opcode Fuzzy Hash: 7fe92be6d366e8823227164bf71373c3c5a5e26e2f9a2d1a8356704c32fd00c1
                      • Instruction Fuzzy Hash: C12171B25053809FE711CB25DD45B56BFF8EF06310F0D84DAE984CB163D264DA08CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 304 187a646-187a695 307 187a697 304->307 308 187a69a-187a6a3 304->308 307->308 309 187a6a5 308->309 310 187a6a8-187a6b1 308->310 309->310 311 187a6b3-187a6bb CreateMutexW 310->311 312 187a702-187a707 310->312 314 187a6c1-187a6d7 311->314 312->311 315 187a709-187a70e 314->315 316 187a6d9-187a6ff 314->316 315->316
                      APIs
                      • CreateMutexW.KERNELBASE(?,?), ref: 0187A6B9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1719287915.000000000187A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0187A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_187a000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID: CreateMutex
                      • String ID:
                      • API String ID: 1964310414-0
                      • Opcode ID: 08f17ecd655c1c2403e7c684da2cb5bf95958c8fd239d386f2d4ee64dc9db321
                      • Instruction ID: 8cfa819ab66b9a21c37ddda914acb0163ee8b1a95e9fb51e060f3bfef5075ba5
                      • Opcode Fuzzy Hash: 08f17ecd655c1c2403e7c684da2cb5bf95958c8fd239d386f2d4ee64dc9db321
                      • Instruction Fuzzy Hash: E921B0756042449FE714DB25DC85BAAFBE8EF04324F08C46AE945CB741E375E909CA61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 332 187a392-187a3cf 334 187a3d4-187a3dd 332->334 335 187a3d1 332->335 336 187a3e2-187a3e8 334->336 337 187a3df 334->337 335->334 338 187a3ed-187a404 336->338 339 187a3ea 336->339 337->336 341 187a406-187a419 RegQueryValueExW 338->341 342 187a43b-187a440 338->342 339->338 343 187a442-187a447 341->343 344 187a41b-187a438 341->344 342->341 343->344
                      APIs
                      • RegQueryValueExW.KERNELBASE(?,00000E24,A7F2C20D,00000000,00000000,00000000,00000000), ref: 0187A40C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1719287915.000000000187A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0187A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_187a000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: 60825f74934ca2bf01e03521218dcc3ee9d8278e597b612a8684c0be197819c6
                      • Instruction ID: 25c9d470fa12af3b790bdfaee000fc6c94c7a1a49052e535ae1c44690def71de
                      • Opcode Fuzzy Hash: 60825f74934ca2bf01e03521218dcc3ee9d8278e597b612a8684c0be197819c6
                      • Instruction Fuzzy Hash: 82219075600604AFE721CF15DC84FAAF7ECEF04724F08C49AE945CB651D765EA09CAB1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 348 187a486-187a4c3 350 187a4c5 348->350 351 187a4c8-187a4d4 348->351 350->351 352 187a4d6 351->352 353 187a4d9-187a4f0 351->353 352->353 355 187a527-187a52c 353->355 356 187a4f2-187a505 RegSetValueExW 353->356 355->356 357 187a507-187a524 356->357 358 187a52e-187a533 356->358 358->357
                      APIs
                      • RegSetValueExW.KERNELBASE(?,00000E24,A7F2C20D,00000000,00000000,00000000,00000000), ref: 0187A4F8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1719287915.000000000187A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0187A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_187a000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID: Value
                      • String ID:
                      • API String ID: 3702945584-0
                      • Opcode ID: 24657492acc85309a007f9086f22d697fcf90a1b0e308af0e725cf93a98804e1
                      • Instruction ID: 05fccd295790f679725037373f83cbd38571748fa73c80b26b42e54526066734
                      • Opcode Fuzzy Hash: 24657492acc85309a007f9086f22d697fcf90a1b0e308af0e725cf93a98804e1
                      • Instruction Fuzzy Hash: 8E11AFB6500604AFE7218F55DC84FAABBE8EF04724F08845AE945CB691D361E548CAB1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 362 187a2d2-187a2d4 363 187a2d6-187a2dd 362->363 364 187a2de-187a328 362->364 363->364 366 187a353-187a358 364->366 367 187a32a-187a33d SetErrorMode 364->367 366->367 368 187a33f-187a352 367->368 369 187a35a-187a35f 367->369 369->368
                      APIs
                      • SetErrorMode.KERNELBASE(?), ref: 0187A330
                      Memory Dump Source
                      • Source File: 00000000.00000002.1719287915.000000000187A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0187A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_187a000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID: ErrorMode
                      • String ID:
                      • API String ID: 2340568224-0
                      • Opcode ID: 6d0bd85e8f6edc24394e0b2c036053ca1732df929f35cdd8b4f56c43fc313c68
                      • Instruction ID: 5968c6199ec5fdb9bbbac7487c80e67c99300aa376169849f891660dac32aa90
                      • Opcode Fuzzy Hash: 6d0bd85e8f6edc24394e0b2c036053ca1732df929f35cdd8b4f56c43fc313c68
                      • Instruction Fuzzy Hash: 0221297540E3C0AFD7138B259C54A56BFB49F47220F0D80DBED848F2A3C269A908DB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 372 187ac24-187ac6a 374 187ac6f-187ac78 372->374 375 187ac6c 372->375 376 187ac7a-187ac9a ShellExecuteExW 374->376 377 187acb9-187acbe 374->377 375->374 380 187acc0-187acc5 376->380 381 187ac9c-187acb8 376->381 377->376 380->381
                      APIs
                      • ShellExecuteExW.SHELL32(?), ref: 0187AC80
                      Memory Dump Source
                      • Source File: 00000000.00000002.1719287915.000000000187A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0187A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_187a000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID: ExecuteShell
                      • String ID:
                      • API String ID: 587946157-0
                      • Opcode ID: 452cac0e555c3dc5c229c46107ce9276f72bd30d1a44ebdaa04689ee57f58162
                      • Instruction ID: 38b9a23975adb5b9f5bf05fa659ec6ff604f66d8abed7986ad538ea5122fefd3
                      • Opcode Fuzzy Hash: 452cac0e555c3dc5c229c46107ce9276f72bd30d1a44ebdaa04689ee57f58162
                      • Instruction Fuzzy Hash: C9115E75509380AFD712CB65DC94B56BFA8DF46220F0884EAED45CB252D265E908CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 383 187a8a4-187a8ed 385 187a8f2-187a8fb 383->385 386 187a8ef 383->386 387 187a8fd-187a91d SetFileAttributesW 385->387 388 187a93c-187a941 385->388 386->385 391 187a943-187a948 387->391 392 187a91f-187a93b 387->392 388->387 391->392
                      APIs
                      • SetFileAttributesW.KERNELBASE(?,?), ref: 0187A903
                      Memory Dump Source
                      • Source File: 00000000.00000002.1719287915.000000000187A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0187A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_187a000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID: AttributesFile
                      • String ID:
                      • API String ID: 3188754299-0
                      • Opcode ID: 547230958c8cbb1bdb30544473de43f560003715f586e9ffd440f049e44615bd
                      • Instruction ID: 5475603733979c19a1218147e8d57b8189c5f62249662a488693ffb6140da6a4
                      • Opcode Fuzzy Hash: 547230958c8cbb1bdb30544473de43f560003715f586e9ffd440f049e44615bd
                      • Instruction Fuzzy Hash: 6911B2755043809FDB15CF25DC84B56BFE8EF46320F0D84AAED85CB252D278E948CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 394 187aa3e-187aa65 395 187aa67 394->395 396 187aa6a-187aa70 394->396 395->396 397 187aa75-187aa7e 396->397 398 187aa72 396->398 399 187aac1-187aac6 397->399 400 187aa80-187aa88 CopyFileW 397->400 398->397 399->400 401 187aa8e-187aaa0 400->401 403 187aaa2-187aabe 401->403 404 187aac8-187aacd 401->404 404->403
                      APIs
                      • CopyFileW.KERNELBASE(?,?,?), ref: 0187AA86
                      Memory Dump Source
                      • Source File: 00000000.00000002.1719287915.000000000187A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0187A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_187a000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID: CopyFile
                      • String ID:
                      • API String ID: 1304948518-0
                      • Opcode ID: 4c25b8346011010e215c30b15862f08622ad661b118d50e7ca3fb54b53103e3a
                      • Instruction ID: 5746d3898976fbdc3099c01466fe4fad03bfca0376902781abdb00f6cea1cc71
                      • Opcode Fuzzy Hash: 4c25b8346011010e215c30b15862f08622ad661b118d50e7ca3fb54b53103e3a
                      • Instruction Fuzzy Hash: F31165756002409FEB14DF59D985B5AFBE8EF04320F0C84AAED49CB752D775E604CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 406 187a8c6-187a8ed 407 187a8f2-187a8fb 406->407 408 187a8ef 406->408 409 187a8fd-187a905 SetFileAttributesW 407->409 410 187a93c-187a941 407->410 408->407 411 187a90b-187a91d 409->411 410->409 413 187a943-187a948 411->413 414 187a91f-187a93b 411->414 413->414
                      APIs
                      • SetFileAttributesW.KERNELBASE(?,?), ref: 0187A903
                      Memory Dump Source
                      • Source File: 00000000.00000002.1719287915.000000000187A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0187A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_187a000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID: AttributesFile
                      • String ID:
                      • API String ID: 3188754299-0
                      • Opcode ID: 96bb42321b0527e7505aa74824946719c2fb96eac7b00491026c92dd18100207
                      • Instruction ID: d561d0732868585cbf15a274cc667eb78176ef7690fdc93b71cf27c8ccc5d03b
                      • Opcode Fuzzy Hash: 96bb42321b0527e7505aa74824946719c2fb96eac7b00491026c92dd18100207
                      • Instruction Fuzzy Hash: 570192766002449FEB14CF29D88476AFBE4EF04324F0C84AADD59CB752E375E648CAA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ShellExecuteExW.SHELL32(?), ref: 0187AC80
                      Memory Dump Source
                      • Source File: 00000000.00000002.1719287915.000000000187A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0187A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_187a000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID: ExecuteShell
                      • String ID:
                      • API String ID: 587946157-0
                      • Opcode ID: 2f77a24c8b7952716f8cf2d94e215b56c486c6fc8d7bf246a0831cf5480cb7f4
                      • Instruction ID: cc1b93b3931fae343dcefec2fce05b41318989959f1cca14a8f129f2c7285e5c
                      • Opcode Fuzzy Hash: 2f77a24c8b7952716f8cf2d94e215b56c486c6fc8d7bf246a0831cf5480cb7f4
                      • Instruction Fuzzy Hash: C7018075A042449FEB10CF59D98476ABBD8DF44324F0CC4AAED49CB652D375E608CAA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetErrorMode.KERNELBASE(?), ref: 0187A330
                      Memory Dump Source
                      • Source File: 00000000.00000002.1719287915.000000000187A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0187A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_187a000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID: ErrorMode
                      • String ID:
                      • API String ID: 2340568224-0
                      • Opcode ID: 0f598bd95d84376869811e92a9b182fb715370dcb22f531a0f8576f3ff7a89a7
                      • Instruction ID: dd9b37d452dafd837e5e37e3637aad2451b52c2666aec5726df15a0ef7c060bf
                      • Opcode Fuzzy Hash: 0f598bd95d84376869811e92a9b182fb715370dcb22f531a0f8576f3ff7a89a7
                      • Instruction Fuzzy Hash: B1F08C358042449FDB10CF19E884B69FBE0EF04324F0CC09ADD598B752D3B9E648CAA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1719687379.0000000005830000.00000040.00000800.00020000.00000000.sdmp, Offset: 05830000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5830000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 899d0a1303d1f4bd15caffe42e08bdae86244fb383f81ecebff9dd260a507c75
                      • Instruction ID: 7a19d02578ef347ed9b142a8f7f9e5faffb0a9f1293d89c9faecc75fa9f96cf6
                      • Opcode Fuzzy Hash: 899d0a1303d1f4bd15caffe42e08bdae86244fb383f81ecebff9dd260a507c75
                      • Instruction Fuzzy Hash: C35101702062828BCB04DB7CE5549DEB7A6FF84208741C979D5058B779DB38AD4ACB92
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1719687379.0000000005830000.00000040.00000800.00020000.00000000.sdmp, Offset: 05830000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5830000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 519973a37305ae10496df6ccbbeabdc545e7ef01d77e77a6905df9f65ab3d54c
                      • Instruction ID: bb946f70be5aa8099283bea3c73201f1e1530555c6ee0cb4843aaf4910e78774
                      • Opcode Fuzzy Hash: 519973a37305ae10496df6ccbbeabdc545e7ef01d77e77a6905df9f65ab3d54c
                      • Instruction Fuzzy Hash: E601526540E7C18FDB538778A8A87903FB0AF17224F0E42CBC4D0CA4A7D21C890ACB22
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1719687379.0000000005830000.00000040.00000800.00020000.00000000.sdmp, Offset: 05830000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5830000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7dd2757a77ce72b01b57ad1f826ff855989755fefad7eef7bca8ad73492a7018
                      • Instruction ID: c5ffb906cce3d09e5d25a0b917d1a041f6793fcb9469e942e82d16062bb1f4bd
                      • Opcode Fuzzy Hash: 7dd2757a77ce72b01b57ad1f826ff855989755fefad7eef7bca8ad73492a7018
                      • Instruction Fuzzy Hash: C901AD74605283CBCB44EB78D05859DBBE2EF84309F54C86DE589CB354EB759A088F53
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1719370657.00000000018B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fe5f0673a90024fc79c7bdc587c314007af8c9f41e4647705779a9672d231299
                      • Instruction ID: d844fc0f023c6e55a45e65140f2742afdc7da2b63c5849e02595315c1436ef1f
                      • Opcode Fuzzy Hash: fe5f0673a90024fc79c7bdc587c314007af8c9f41e4647705779a9672d231299
                      • Instruction Fuzzy Hash: 3AE092B66006444B9750CF0AFC41852F7D8EB88630B18C07FDC0D8B701D636B508CAE5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1719274278.0000000001872000.00000040.00000800.00020000.00000000.sdmp, Offset: 01872000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1872000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ed2f5c85b5f6238e920bcf9051b0968fb2e86573b0de6002bf782a52d0c06559
                      • Instruction ID: dce67a9c0241d73b52cc9f24243831c1f3b005a4ce51856facaa220d47dc5ee9
                      • Opcode Fuzzy Hash: ed2f5c85b5f6238e920bcf9051b0968fb2e86573b0de6002bf782a52d0c06559
                      • Instruction Fuzzy Hash: 57D05E7A2056C18FE316DE1CC1A4B953BE5BB51714F4A44F9A800CB763C768D681D600
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1719274278.0000000001872000.00000040.00000800.00020000.00000000.sdmp, Offset: 01872000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1872000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f3d0675087771ae154ae604a6fd0874e89382b16caca2825eb84462e9e87e5ee
                      • Instruction ID: 06df0905ca732663e65ed846f7e994ce63f4c58bce19747b263496ddb3dc33ad
                      • Opcode Fuzzy Hash: f3d0675087771ae154ae604a6fd0874e89382b16caca2825eb84462e9e87e5ee
                      • Instruction Fuzzy Hash: FED05E343406814BD715DE0CC2D4F593BD5AB40B15F0644ECAC10CB772C7A8DAC0CA00
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.1719370657.00000000018B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 018B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_18b0000_pQBmVoyRnw.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e88cdce71f0303887a0b316fccd49f233d7718550ed8d8a7471854355c4f917b
                      • Instruction ID: 4f51b7a287a025ccd08ddb3532ff97456854f8ac589504ec28e9cf047c392c50
                      • Opcode Fuzzy Hash: e88cdce71f0303887a0b316fccd49f233d7718550ed8d8a7471854355c4f917b
                      • Instruction Fuzzy Hash: BC11E9A254E3C04FD70387308CB52947F709E17208B1E45EBD4C5CE0E3E219480ECB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Execution Graph

                      Execution Coverage:18.9%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:7.4%
                      Total number of Nodes:190
                      Total number of Limit Nodes:9
                      execution_graph 7098 53614b2 7099 53614ea ConvertStringSecurityDescriptorToSecurityDescriptorW 7098->7099 7101 536152b 7099->7101 7198 5360472 7199 53604b0 DuplicateHandle 7198->7199 7200 53604e8 7198->7200 7201 53604be 7199->7201 7200->7199 7102 5030006 7103 5030016 7102->7103 7106 5030076 7103->7106 7109 5030301 7103->7109 7113 50303bd 7103->7113 7117 5030509 7103->7117 7121 5030310 7103->7121 7111 5030310 7109->7111 7110 5030348 7110->7106 7111->7110 7125 5031eaf 7111->7125 7115 50303c4 7113->7115 7114 50305bf 7114->7106 7115->7114 7116 5031eaf 2 API calls 7115->7116 7116->7114 7119 5030510 7117->7119 7118 50305bf 7118->7106 7119->7118 7120 5031eaf 2 API calls 7119->7120 7120->7118 7123 5030322 7121->7123 7122 5030348 7122->7106 7123->7122 7124 5031eaf 2 API calls 7123->7124 7124->7122 7126 5031ee4 7125->7126 7127 5031f01 7126->7127 7130 e7bef2 7126->7130 7134 e7bed0 7126->7134 7127->7110 7131 e7bf27 NtSetInformationProcess 7130->7131 7132 e7bf52 7130->7132 7133 e7bf3c 7131->7133 7132->7131 7133->7127 7135 e7bef2 NtSetInformationProcess 7134->7135 7137 e7bf3c 7135->7137 7137->7127 7138 e7b162 7141 e7b197 GetFileType 7138->7141 7140 e7b1c4 7141->7140 7202 e7bba2 7203 e7bbd1 AdjustTokenPrivileges 7202->7203 7205 e7bbf3 7203->7205 7206 e7b222 7209 e7b257 WriteFile 7206->7209 7208 e7b289 7209->7208 7210 e7ba22 7212 e7ba4b LookupPrivilegeValueW 7210->7212 7213 e7ba72 7212->7213 7214 e7ae22 7215 e7ae80 7214->7215 7216 e7ae4e FindClose 7214->7216 7215->7216 7217 e7ae63 7216->7217 7218 e7aaae 7219 e7ab10 7218->7219 7220 e7aada OleInitialize 7218->7220 7219->7220 7221 e7aae8 7220->7221 7142 5361da2 7143 5361dd7 WSAConnect 7142->7143 7145 5361df6 7143->7145 7222 5361662 7223 536169a MapViewOfFile 7222->7223 7225 53616e9 7223->7225 7226 5362fee 7229 5363023 ioctlsocket 7226->7229 7228 536304f 7229->7228 7150 e7a2fe 7151 e7a353 7150->7151 7152 e7a32a SetErrorMode 7150->7152 7151->7152 7153 e7a33f 7152->7153 7154 536212a 7156 5362165 LoadLibraryA 7154->7156 7157 53621a2 7156->7157 7233 5361ad6 7235 5361b0b GetProcessTimes 7233->7235 7236 5361b3d 7235->7236 7158 e7a646 7160 e7a67e CreateMutexW 7158->7160 7161 e7a6c1 7160->7161 7237 e7a486 7238 e7a4bb RegSetValueExW 7237->7238 7240 e7a507 7238->7240 7241 e7aa06 7242 e7aa35 WaitForInputIdle 7241->7242 7243 e7aa6b 7241->7243 7244 e7aa43 7242->7244 7243->7242 7245 e7b306 7247 e7b33e RegOpenKeyExW 7245->7247 7248 e7b394 7247->7248 7249 50318e0 7250 503152a 7249->7250 7255 50319b7 7250->7255 7264 5031999 7250->7264 7273 5031929 7250->7273 7282 50319ca 7250->7282 7256 50319be 7255->7256 7257 5030310 2 API calls 7256->7257 7258 5031a85 7257->7258 7259 5030310 2 API calls 7258->7259 7260 5031aee 7259->7260 7261 5031b14 7260->7261 7291 5032757 7260->7291 7295 50327b8 7260->7295 7265 50319a0 7264->7265 7266 5030310 2 API calls 7265->7266 7267 5031a85 7266->7267 7268 5030310 2 API calls 7267->7268 7269 5031aee 7268->7269 7270 5031b14 7269->7270 7271 5032757 2 API calls 7269->7271 7272 50327b8 2 API calls 7269->7272 7271->7270 7272->7270 7274 5031963 7273->7274 7275 5030310 2 API calls 7274->7275 7276 5031a85 7275->7276 7277 5030310 2 API calls 7276->7277 7278 5031aee 7277->7278 7279 5031b14 7278->7279 7280 5032757 2 API calls 7278->7280 7281 50327b8 2 API calls 7278->7281 7280->7279 7281->7279 7283 50319d1 7282->7283 7284 5030310 2 API calls 7283->7284 7285 5031a85 7284->7285 7286 5030310 2 API calls 7285->7286 7287 5031aee 7286->7287 7288 5031b14 7287->7288 7289 5032757 2 API calls 7287->7289 7290 50327b8 2 API calls 7287->7290 7289->7288 7290->7288 7292 5032760 7291->7292 7293 503278c 7292->7293 7299 5032dd0 7292->7299 7293->7261 7296 50327e3 7295->7296 7297 503282b 7296->7297 7298 5032dd0 2 API calls 7296->7298 7297->7261 7298->7297 7300 5032e05 7299->7300 7304 5361e2e 7300->7304 7308 5361e9e 7300->7308 7301 5032e40 7301->7293 7305 5361e9e GetVolumeInformationA 7304->7305 7307 5361ef6 7305->7307 7307->7301 7309 5361eee GetVolumeInformationA 7308->7309 7310 5361ef6 7309->7310 7310->7301 7311 e7af82 7312 e7afab CopyFileW 7311->7312 7314 e7afd2 7312->7314 7162 5362e1e 7163 5362e56 RegCreateKeyExW 7162->7163 7165 5362ec8 7163->7165 7166 536319e 7168 53631d3 GetProcessWorkingSetSize 7166->7168 7169 53631ff 7168->7169 7170 e7a74e 7171 e7a77a FindCloseChangeNotification 7170->7171 7172 e7a7b9 7170->7172 7173 e7a788 7171->7173 7172->7171 7174 e7b04a 7176 e7b082 CreateFileW 7174->7176 7177 e7b0d1 7176->7177 7178 5361906 7179 536193b shutdown 7178->7179 7181 5361964 7179->7181 7182 5360306 7184 5360332 K32EnumProcesses 7182->7184 7185 536034e 7184->7185 7186 5361086 7188 53610be WSASocketW 7186->7188 7189 53610fa 7188->7189 7319 e7be16 7320 e7be4b GetExitCodeProcess 7319->7320 7322 e7be74 7320->7322 7190 5363282 7192 53632b7 SetProcessWorkingSetSize 7190->7192 7193 53632e3 7192->7193 7323 5361bc2 7325 5361bfd getaddrinfo 7323->7325 7326 5361c6f 7325->7326 7194 e7ab52 7195 e7ab7b SetFileAttributesW 7194->7195 7197 e7ab97 7195->7197 7327 e7a392 7328 e7a3c7 RegQueryValueExW 7327->7328 7330 e7a41b 7328->7330 7331 53630ca 7332 53630f3 select 7331->7332 7334 5363128 7332->7334 7335 53603ca 7336 53603ff NtQuerySystemInformation 7335->7336 7337 536042a 7335->7337 7338 5360414 7336->7338 7337->7336 7339 e7a09a 7340 e7a0cf send 7339->7340 7342 e7a107 7339->7342 7341 e7a0dd 7340->7341 7342->7340
                      APIs
                      • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 00E7BBEB
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: AdjustPrivilegesToken
                      • String ID:
                      • API String ID: 2874748243-0
                      • Opcode ID: 773285f8a027990c8caa4fade2ed0cf7ff946c3e154660077f29a7aedede80c5
                      • Instruction ID: 5cd911f37f3d8ea0aeebf4407313267023bfe5323b25c9ca60683f2ecbd6d68c
                      • Opcode Fuzzy Hash: 773285f8a027990c8caa4fade2ed0cf7ff946c3e154660077f29a7aedede80c5
                      • Instruction Fuzzy Hash: 54219F75509780AFDB228F25DC44B92BFB4EF16314F0884DAE9858B563D375A908CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • NtQuerySystemInformation.NTDLL ref: 05360405
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: InformationQuerySystem
                      • String ID:
                      • API String ID: 3562636166-0
                      • Opcode ID: aeccecf38b616ca78725d78ce5396175854b409958d2d1613102066328f38017
                      • Instruction ID: 8342246ee3208ab389d957ca215c0d96394e1c1d72d95fef9c13d832577c0f30
                      • Opcode Fuzzy Hash: aeccecf38b616ca78725d78ce5396175854b409958d2d1613102066328f38017
                      • Instruction Fuzzy Hash: F621AE754097C0AFDB238B21DC55A52FFB0EF16314F0980DBE9848B1A3D265A91DCB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 00E7BBEB
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: AdjustPrivilegesToken
                      • String ID:
                      • API String ID: 2874748243-0
                      • Opcode ID: 559dca858c04757b41ea7ba9868d74f0b3b929b5cb9d80a62f23317708dc2161
                      • Instruction ID: 8eb27b601125c7dd75087a0770d87fbb04f4c64b7a095967ebcdf4faf2343007
                      • Opcode Fuzzy Hash: 559dca858c04757b41ea7ba9868d74f0b3b929b5cb9d80a62f23317708dc2161
                      • Instruction Fuzzy Hash: 4411A0755002409FDB21CF15D884BA6FBE4EF04320F08C4AAED498B665D735E418DB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • NtSetInformationProcess.NTDLL ref: 00E7BF2D
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: InformationProcess
                      • String ID:
                      • API String ID: 1801817001-0
                      • Opcode ID: 5549819fd675606c9c4e546900206d13f006c9c058559c8a006468da263a4224
                      • Instruction ID: 55476aac219501e2a7ac340322123953e41542dc7ff1265a2569bd5dda3786ea
                      • Opcode Fuzzy Hash: 5549819fd675606c9c4e546900206d13f006c9c058559c8a006468da263a4224
                      • Instruction Fuzzy Hash: C211A071409380AFCB228F15DC44B52FFB4EF16324F09C49AED884B662D275A918DB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • NtSetInformationProcess.NTDLL ref: 00E7BF2D
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: InformationProcess
                      • String ID:
                      • API String ID: 1801817001-0
                      • Opcode ID: 3061f0e017a317061c88d0c0fdc4dc5cf643bf218c4ce7cd89b786ddea6a117f
                      • Instruction ID: dfa26be7392158f432f75bc074287a4ca4b5d857334c661010cfa13c4180f05c
                      • Opcode Fuzzy Hash: 3061f0e017a317061c88d0c0fdc4dc5cf643bf218c4ce7cd89b786ddea6a117f
                      • Instruction Fuzzy Hash: 59018B359002409FDB208F05DC84B66FBE0FF18725F08C09AEE494B662D375E818DF62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • NtQuerySystemInformation.NTDLL ref: 05360405
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: InformationQuerySystem
                      • String ID:
                      • API String ID: 3562636166-0
                      • Opcode ID: f163e31c8c566b0b6f92e5f6225306cb5336a5485f07886e09b39f0bced5639a
                      • Instruction ID: 06f0cf7994347da6d488884719c938ea8a10a34e38632610b00f8f12a4461590
                      • Opcode Fuzzy Hash: f163e31c8c566b0b6f92e5f6225306cb5336a5485f07886e09b39f0bced5639a
                      • Instruction Fuzzy Hash: 28018F354002449FDB21CF05D849B65FBE5EF04321F08C09EDD450B666D3B5E418CF62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 5030310-5030334 2 5030336-5030338 0->2 3 503033e-5030346 0->3 2->3 4 5030348-503034d 3->4 5 503034e-503035c 3->5 7 5030362-5030391 5->7 8 503035e-5030360 5->8 10 5030393-50303ce 7->10 11 50303d8-5030418 7->11 8->7 10->11 18 503041a 11->18 19 503041f 11->19 18->19 55 503041f call 1260606 19->55 56 503041f call 5030b03 19->56 57 503041f call 5030c22 19->57 58 503041f call 5030d40 19->58 59 503041f call 12605e0 19->59 60 503041f call 5030f05 19->60 61 503041f call 5030e55 19->61 62 503041f call 5030958 19->62 63 503041f call 5030d98 19->63 64 503041f call 5030ba8 19->64 65 503041f call 5030c8d 19->65 20 5030425-5030434 21 5030436-5030460 20->21 22 503046b-5030523 20->22 21->22 41 5030570-5030587 22->41 42 5030525-5030531 22->42 43 5030880 41->43 44 503058d-50305b9 call 5031eaf 41->44 66 5030533 call 1260606 42->66 67 5030533 call 12605e0 42->67 52 50305bf 44->52 47 5030539-5030569 47->41 52->43 55->20 56->20 57->20 58->20 59->20 60->20 61->20 62->20 63->20 64->20 65->20 66->47 67->47
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID: 2*l$2*l$2*l
                      • API String ID: 0-1651321300
                      • Opcode ID: 909dd3438bdf586c0f1d44b96602ef7a931fceb09af5635b99020d1809975571
                      • Instruction ID: c3da250045aa7a9deb15a9678bb913f699c0c8e473f68cc9a6f9522b6802f568
                      • Opcode Fuzzy Hash: 909dd3438bdf586c0f1d44b96602ef7a931fceb09af5635b99020d1809975571
                      • Instruction Fuzzy Hash: B25148307002158FDB0CEB35A4256BD77E7AF85304B058169E406DB3E5DF35CD0A9BA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 69 50303bd-5030418 77 503041a 69->77 78 503041f 69->78 77->78 117 503041f call 1260606 78->117 118 503041f call 5030b03 78->118 119 503041f call 5030c22 78->119 120 503041f call 5030d40 78->120 121 503041f call 12605e0 78->121 122 503041f call 5030f05 78->122 123 503041f call 5030e55 78->123 124 503041f call 5030958 78->124 125 503041f call 5030d98 78->125 126 503041f call 5030ba8 78->126 127 503041f call 5030c8d 78->127 79 5030425-5030434 80 5030436-5030460 79->80 81 503046b-5030523 79->81 80->81 100 5030570-5030587 81->100 101 5030525-5030531 81->101 102 5030880 100->102 103 503058d-50305b9 call 5031eaf 100->103 114 5030533 call 1260606 101->114 115 5030533 call 12605e0 101->115 111 50305bf 103->111 106 5030539-5030569 106->100 111->102 114->106 115->106 117->79 118->79 119->79 120->79 121->79 122->79 123->79 124->79 125->79 126->79 127->79
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID: 2*l$2*l$2*l
                      • API String ID: 0-1651321300
                      • Opcode ID: 3cad1f8b6f1da709e1dfd34157501a36e7ecfe3e0b07bed23ba59c7a35f0c370
                      • Instruction ID: 842fb6b14d3d8dc48eda016a2544f5639f074d4d56dd46a470cbab6a8c912b86
                      • Opcode Fuzzy Hash: 3cad1f8b6f1da709e1dfd34157501a36e7ecfe3e0b07bed23ba59c7a35f0c370
                      • Instruction Fuzzy Hash: 74411830B002154BDB4CF77994252BD72D7AFC5248B488029E806EB7D5DF29CD0AA7E6
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 128 5031f3f-5031f4a 130 5031f4c-5031f56 128->130 318 5031f56 call e7aee6 130->318 319 5031f56 call e7ae8e 130->319 132 5031f5b-5031f67 133 50323b6 132->133 134 5031f6d-5031f88 132->134 133->130 134->133 136 5031f8e-5031fa1 134->136 138 5031fa3-5031fa9 136->138 139 5031fab-5031fba 136->139 140 503200c-5032019 138->140 143 5031fc0-5031fca 139->143 144 50323bb 139->144 148 5032020-503203a 140->148 145 5031fd0 143->145 146 5031fcc-5031fce 143->146 147 50323c0-503242c 144->147 149 5031fd3-5031ff9 145->149 146->149 167 5032442-5032448 147->167 168 503242e-5032432 147->168 156 5032041-503208f 148->156 157 503203c 148->157 158 5032003-503200a 149->158 159 5031ffb-5032001 149->159 193 5032091 156->193 194 5032096-50320e7 156->194 157->156 158->140 159->140 171 5032453 167->171 172 503244a-503244d 167->172 169 5032434-5032439 168->169 170 503243b 168->170 169->167 170->167 174 5032458-503245d 171->174 172->171 173 503244f-5032451 172->173 173->174 176 5032491-5032497 174->176 177 503245f-503248c 174->177 179 503249d-50324a3 176->179 180 503251c 176->180 189 503267d-5032686 177->189 179->180 181 50324a5-50324ab 179->181 182 5032521-5032526 180->182 181->180 184 50324ad-50324b0 181->184 185 5032533-503253e 182->185 186 5032528-503252e 182->186 184->180 188 50324b2-50324b8 184->188 190 5032540-5032546 185->190 191 503254b-503254e 185->191 186->189 188->180 195 50324ba-50324bd 188->195 190->189 196 5032550-5032553 191->196 197 5032559 191->197 193->194 239 50320e9 194->239 240 50320ee-5032134 194->240 195->180 199 50324bf-50324c5 195->199 196->197 200 5032555-5032557 196->200 202 503255e-5032563 197->202 199->180 203 50324c7-50324cd 199->203 200->202 204 5032593-503259e 202->204 205 5032565-503257b 202->205 203->180 209 50324cf-50324d5 203->209 207 50325a0-50325a6 204->207 208 50325ab-50325af 204->208 214 5032588-503258e 205->214 215 503257d-5032583 205->215 207->189 211 50325f2-50325f8 208->211 212 50325b1-50325b7 208->212 209->180 213 50324d7-50324da 209->213 216 5032606-503261f 211->216 217 50325fa 211->217 212->216 219 50325b9-50325ed 212->219 213->180 220 50324dc-50324df 213->220 214->189 215->189 237 5032621-503264e 216->237 238 5032650-5032678 216->238 320 50325fc call 5032687 217->320 321 50325fc call 5032698 217->321 219->189 220->180 221 50324e1-50324e4 220->221 221->180 226 50324e6-50324e9 221->226 222 5032602-5032604 222->189 226->180 227 50324eb-50324ee 226->227 227->180 231 50324f0-50324f3 227->231 231->180 232 50324f5-50324f8 231->232 232->180 236 50324fa-50324fd 232->236 236->180 241 50324ff-5032502 236->241 237->189 238->189 239->240 264 5032136 240->264 265 503213b-503216b 240->265 241->180 243 5032504-5032507 241->243 243->180 245 5032509-503250c 243->245 245->180 249 503250e-5032511 245->249 249->180 251 5032513-5032516 249->251 251->180 254 5032518-503251a 251->254 254->182 264->265 265->133 270 5032171-50321a1 265->270 274 5032330-503233e 270->274 275 50321a6-50321ac 274->275 276 5032344-5032366 274->276 275->147 278 50321b2-50321e1 275->278 276->133 277 5032368-503236c 276->277 279 5032373-503237a 277->279 280 503236e 277->280 278->144 285 50321e7-5032210 278->285 279->147 281 503237c-503238a 279->281 280->279 286 5032391-5032398 281->286 287 503238c 281->287 292 5032212 285->292 293 5032217-5032242 285->293 286->147 288 503239a-50323ac 286->288 287->286 288->133 292->293 297 5032244-503224d 293->297 298 503227a-5032295 293->298 299 503225b-503226a 297->299 300 503224f-5032253 297->300 304 5032297 298->304 305 503229c-50322e3 298->305 299->147 301 5032270-5032277 299->301 300->299 301->298 304->305 311 50322e5 305->311 312 50322ea-503231b 305->312 311->312 316 5032327-503232a 312->316 317 503231d-5032321 312->317 316->144 316->274 317->144 317->316 318->132 319->132 320->222 321->222
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID: L.*l
                      • API String ID: 0-3912938024
                      • Opcode ID: 1dac6086ed73dee76eaf103e9ef0f72855558c535f69ee7987ed5b8d736da218
                      • Instruction ID: bb912dc82be69b36c235f6231367ae74d50b183d2b24eda3240c9c81ea9ef77d
                      • Opcode Fuzzy Hash: 1dac6086ed73dee76eaf103e9ef0f72855558c535f69ee7987ed5b8d736da218
                      • Instruction Fuzzy Hash: 7312E535A002168FDB68EB79E4567BE72E6BF44304F148438D806EB391DB39DD85CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 322 5030958-5030993 324 5030999-5030a22 322->324 325 5030a2e-5030a30 322->325 475 5030a24 call 1260606 324->475 476 5030a24 call 12605e0 324->476 326 5030a37-5030a3c 325->326 327 5030a42-5030a7a 326->327 328 5030b1e-5030bc2 326->328 345 5030aa1-5030b01 327->345 346 5030a7c-5030a9a 327->346 365 5030bc8-5030c8b 328->365 366 5030c9e-5030ca7 328->366 345->328 346->345 365->366 370 5030d51-5030d5a 366->370 371 5030cad-5030d3e 366->371 367 5030a2a-5030a2c 367->325 368 5030a32 367->368 368->326 372 5030d7a-5030d83 370->372 373 5030d5c-5030d73 370->373 371->370 375 5030d85-5030d8c 372->375 376 5030da9-5030db2 372->376 373->372 388 5030d96 375->388 379 5030f33-5030f3a 376->379 380 5030db8-5030dd6 376->380 477 5030dd8 call 1260606 380->477 478 5030dd8 call 12605e0 380->478 387 5030dde-5030e06 402 5030f1c-5030f2d 387->402 388->376 402->379 404 5030e0b-5030e14 402->404 406 5030f40-5030fd1 404->406 407 5030e1a-5030efb 404->407 438 5030fd7-5030fe8 406->438 439 50310ca 406->439 452 5030f03-5030f1a 407->452 445 5030fea-503100b 438->445 441 50310cc-50310d3 439->441 454 5031012-5031048 445->454 455 503100d 445->455 452->402 456 5030f3b 452->456 462 503104a 454->462 463 503104f-5031077 454->463 455->454 456->406 462->463 467 5031079-503107b 463->467 468 503107d-50310a1 463->468 467->441 471 50310a3-50310a8 468->471 472 50310aa-50310b4 468->472 471->441 473 50310b6-50310b8 472->473 474 50310ba-50310c4 472->474 473->441 474->439 474->445 475->367 476->367 477->387 478->387
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID: \O*l
                      • API String ID: 0-4030088352
                      • Opcode ID: 7d050866534afc442e8af2777f49fc7fa271dcb9baf39eb4aab75d5e02a4e057
                      • Instruction ID: f137c5267627854b422e799ffdc4b08f62478eddd34b819c60a734fe1930f236
                      • Opcode Fuzzy Hash: 7d050866534afc442e8af2777f49fc7fa271dcb9baf39eb4aab75d5e02a4e057
                      • Instruction Fuzzy Hash: ED02AE347002148FCB48EB79E465BAE73E6AF88308F104579D906EB7A9DF359C46CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 479 5362df2-5362e76 483 5362e7b-5362e87 479->483 484 5362e78 479->484 485 5362e8c-5362e95 483->485 486 5362e89 483->486 484->483 487 5362e97 485->487 488 5362e9a-5362eb1 485->488 486->485 487->488 490 5362ef3-5362ef8 488->490 491 5362eb3-5362ec6 RegCreateKeyExW 488->491 490->491 492 5362efa-5362eff 491->492 493 5362ec8-5362ef0 491->493 492->493
                      APIs
                      • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 05362EB9
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: 3d1ea14bd4e64d9559970fe5b49e0b30bc3b57bd6df8aace86770898d7bfb075
                      • Instruction ID: 1e0bed3e10b707849d7c00b0cc90d1cf05e5ee7a4951911ce2fcb7fd4045e602
                      • Opcode Fuzzy Hash: 3d1ea14bd4e64d9559970fe5b49e0b30bc3b57bd6df8aace86770898d7bfb075
                      • Instruction Fuzzy Hash: E7319076504344AFE722CB65DC44FA7BFFCEF05210F08859AF9858B652E364E908CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 498 5360f73-5360f93 499 5360fb5-5360fe7 498->499 500 5360f95-5360fb4 498->500 504 5360fea-5361042 RegQueryValueExW 499->504 500->499 506 5361048-536105e 504->506
                      APIs
                      • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 0536103A
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: e69e1344de218105830422deb6b36f658be5e09d53c4939e7c69d992e1aa097e
                      • Instruction ID: a21d7478f0026bca1b8cc3c8b723b6b96c58e84b05e562e35f64dc40f4819dc8
                      • Opcode Fuzzy Hash: e69e1344de218105830422deb6b36f658be5e09d53c4939e7c69d992e1aa097e
                      • Instruction Fuzzy Hash: 19317C7510E7C06FD3138B258C65A61BFB4EF47610B0E85CBD8C48F6A3D269A949C7B2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 507 5361ba0-5361c5f 513 5361cb1-5361cb6 507->513 514 5361c61-5361c69 getaddrinfo 507->514 513->514 515 5361c6f-5361c81 514->515 517 5361c83-5361cae 515->517 518 5361cb8-5361cbd 515->518 518->517
                      APIs
                      • getaddrinfo.WS2_32(?,00000E24), ref: 05361C67
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: getaddrinfo
                      • String ID:
                      • API String ID: 300660673-0
                      • Opcode ID: 509c895d9bdf095072fcce18a883af7a615af4a23e9991b1378adc2041e4baa1
                      • Instruction ID: f50382f09597db8ff9b6c814ca28c8a956b771328bbc4fdab3c1fa3a44db83a7
                      • Opcode Fuzzy Hash: 509c895d9bdf095072fcce18a883af7a615af4a23e9991b1378adc2041e4baa1
                      • Instruction Fuzzy Hash: 673191B1504344AFE721CB50DC44FA7FBACEB04314F04889AFA499B691E3B5A948CB71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 522 5361e2e-5361ef0 GetVolumeInformationA 525 5361ef6-5361f1f 522->525
                      APIs
                      • GetVolumeInformationA.KERNELBASE(?,00000E24,?,?), ref: 05361EEE
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: InformationVolume
                      • String ID:
                      • API String ID: 2039140958-0
                      • Opcode ID: a04e3abb574a8fdbf77f996740fcb5cd50be9c3a472b4919db5de0bef261a6d7
                      • Instruction ID: 60ae3c62667e8bd591bdb1ac9548744c9a2b2bbb94f31b2c592490c950d28ac3
                      • Opcode Fuzzy Hash: a04e3abb574a8fdbf77f996740fcb5cd50be9c3a472b4919db5de0bef261a6d7
                      • Instruction Fuzzy Hash: 57316E7150E3C06FD3138B359C61AA2BFB8AF47210F1981DBD8C4DF5A3D225A959C7A2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 527 e7b2cb-e7b361 531 e7b366-e7b37d 527->531 532 e7b363 527->532 534 e7b3bf-e7b3c4 531->534 535 e7b37f-e7b392 RegOpenKeyExW 531->535 532->531 534->535 536 e7b3c6-e7b3cb 535->536 537 e7b394-e7b3bc 535->537 536->537
                      APIs
                      • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 00E7B385
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: Open
                      • String ID:
                      • API String ID: 71445658-0
                      • Opcode ID: 563450d2097f17d43cda814fcff9f5fe87687b8df3886097e99fd3a12b82f5da
                      • Instruction ID: e004d5d45ee4a3f58649bdf68cdf07f2b188bde8f08bfc5d3d12913f3a634894
                      • Opcode Fuzzy Hash: 563450d2097f17d43cda814fcff9f5fe87687b8df3886097e99fd3a12b82f5da
                      • Instruction Fuzzy Hash: 843191724083846FE722CB55DC84FA7BFBCEF05314F08849AE9849B653D364A948C771
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 542 e7a612-e7a695 546 e7a697 542->546 547 e7a69a-e7a6a3 542->547 546->547 548 e7a6a5 547->548 549 e7a6a8-e7a6b1 547->549 548->549 550 e7a6b3-e7a6d7 CreateMutexW 549->550 551 e7a702-e7a707 549->551 554 e7a709-e7a70e 550->554 555 e7a6d9-e7a6ff 550->555 551->550 554->555
                      APIs
                      • CreateMutexW.KERNELBASE(?,?), ref: 00E7A6B9
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: CreateMutex
                      • String ID:
                      • API String ID: 1964310414-0
                      • Opcode ID: 89a05e817b154afdb4c8c2a85ed6b78b9e245df09863dda6fd394b1fd3ef7ae2
                      • Instruction ID: aef0aad6a1efb2e7235cc3267db9d5aca46d9ec901d71a47ffb487c24f986094
                      • Opcode Fuzzy Hash: 89a05e817b154afdb4c8c2a85ed6b78b9e245df09863dda6fd394b1fd3ef7ae2
                      • Instruction Fuzzy Hash: 013193755093806FE712CB65DC45B96BFF8EF06314F08C4AAE984CF292D365E909C762
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 573 5361a98-5361b2d 578 5361b2f-5361b37 GetProcessTimes 573->578 579 5361b7a-5361b7f 573->579 581 5361b3d-5361b4f 578->581 579->578 582 5361b81-5361b86 581->582 583 5361b51-5361b77 581->583 582->583
                      APIs
                      • GetProcessTimes.KERNELBASE(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 05361B35
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: ProcessTimes
                      • String ID:
                      • API String ID: 1995159646-0
                      • Opcode ID: e30299e9ff7213917d52c4f123f44c223b3919e77465e79c7f6b912887b7708e
                      • Instruction ID: 3608a1acc89877a3d7f5a7f9858db3665c1fc0d5556483b47f6048f7f8b6892c
                      • Opcode Fuzzy Hash: e30299e9ff7213917d52c4f123f44c223b3919e77465e79c7f6b912887b7708e
                      • Instruction Fuzzy Hash: BA31F7725093806FD712CF60DC45FA6BFB8EF06310F08849EE9858B153D3659509CB71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 558 536148c-536150d 562 5361512-536151b 558->562 563 536150f 558->563 564 5361573-5361578 562->564 565 536151d-5361525 ConvertStringSecurityDescriptorToSecurityDescriptorW 562->565 563->562 564->565 567 536152b-536153d 565->567 568 536153f-5361570 567->568 569 536157a-536157f 567->569 569->568
                      APIs
                      • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 05361523
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: DescriptorSecurity$ConvertString
                      • String ID:
                      • API String ID: 3907675253-0
                      • Opcode ID: eb130c07bcce92b2d6dbc88774deceb073127cd8433cea3215d888f8726df092
                      • Instruction ID: de4bf7c509ef7ca8db48b0cf503385cc20b393c872c17673814902497aa67dc9
                      • Opcode Fuzzy Hash: eb130c07bcce92b2d6dbc88774deceb073127cd8433cea3215d888f8726df092
                      • Instruction Fuzzy Hash: E23161725083846FE721CB65DC45FA7BFA8EF45210F08849AE945DB652D364E908CB71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 602 e7bdd8-e7be64 606 e7be66-e7be6e GetExitCodeProcess 602->606 607 e7beaf-e7beb4 602->607 608 e7be74-e7be86 606->608 607->606 610 e7beb6-e7bebb 608->610 611 e7be88-e7beae 608->611 610->611
                      APIs
                      • GetExitCodeProcess.KERNELBASE(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 00E7BE6C
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: CodeExitProcess
                      • String ID:
                      • API String ID: 3861947596-0
                      • Opcode ID: 21257ed7078ca53bff2527c3015c82e82a32247586629c751380d5078d14a92a
                      • Instruction ID: 2da69530ae503cd66d93353cf4da90a1881cde075b645bf9438c885070bfc277
                      • Opcode Fuzzy Hash: 21257ed7078ca53bff2527c3015c82e82a32247586629c751380d5078d14a92a
                      • Instruction Fuzzy Hash: 2121B4B55093806FE7128B20DC45BA6BFB8EF46324F0884DBE944DF293D364A909C761
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 586 e7b025-e7b0a2 590 e7b0a7-e7b0b3 586->590 591 e7b0a4 586->591 592 e7b0b5 590->592 593 e7b0b8-e7b0c1 590->593 591->590 592->593 594 e7b0c3-e7b0e7 CreateFileW 593->594 595 e7b112-e7b117 593->595 598 e7b119-e7b11e 594->598 599 e7b0e9-e7b10f 594->599 595->594 598->599
                      APIs
                      • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00E7B0C9
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: 4dfab1ac93b29e778fef8724809a3ba93bdea928d751a880b2e1009a1f364b90
                      • Instruction ID: a15d73f4031716c3c74605f880b2c787f00b23afd811b1b87bc9fd96c4bac95d
                      • Opcode Fuzzy Hash: 4dfab1ac93b29e778fef8724809a3ba93bdea928d751a880b2e1009a1f364b90
                      • Instruction Fuzzy Hash: 3831B171504384AFE721CF65DC85F52BBF8EF05314F08849EE9899B652D365E908CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 614 5362e1e-5362e76 617 5362e7b-5362e87 614->617 618 5362e78 614->618 619 5362e8c-5362e95 617->619 620 5362e89 617->620 618->617 621 5362e97 619->621 622 5362e9a-5362eb1 619->622 620->619 621->622 624 5362ef3-5362ef8 622->624 625 5362eb3-5362ec6 RegCreateKeyExW 622->625 624->625 626 5362efa-5362eff 625->626 627 5362ec8-5362ef0 625->627 626->627
                      APIs
                      • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 05362EB9
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: 693a3c6c37a44fc51199c18defffbce43d4c1415339816b1b25c85c0c5c8db31
                      • Instruction ID: 998755a858b6d8ca18820acfba2defdfd97060d6bcaae5378921e99d8d63349b
                      • Opcode Fuzzy Hash: 693a3c6c37a44fc51199c18defffbce43d4c1415339816b1b25c85c0c5c8db31
                      • Instruction Fuzzy Hash: 6821AD76600204AFEB21CF55DC44FA7BBECEF08614F08856AF945CBA51E770E508CAB1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegQueryValueExW.KERNELBASE(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 00E7A40C
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: c9ff521e6de40e778748a90b44b530c73480c6d85b0647718be24f2dad8b4a94
                      • Instruction ID: a14f2f66aa7001dc86f335b6c861878c6131e7f3cc28478a9b0e2e5b5f6c86d5
                      • Opcode Fuzzy Hash: c9ff521e6de40e778748a90b44b530c73480c6d85b0647718be24f2dad8b4a94
                      • Instruction Fuzzy Hash: 55318F75509780AFE722CF11CC84F96BBF8EF46314F08C49AE9459B292D364E909CB72
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetProcessWorkingSetSize.KERNEL32(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 053631F7
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: ProcessSizeWorking
                      • String ID:
                      • API String ID: 3584180929-0
                      • Opcode ID: 67b00cd2ff69b76d07abf68478743a7abb186e8dc592dc97db8d911f41fa3bf6
                      • Instruction ID: 90fcab7a0c195dc3b2df545c79f783376dc30a74032c4a573e797e16c4ed2318
                      • Opcode Fuzzy Hash: 67b00cd2ff69b76d07abf68478743a7abb186e8dc592dc97db8d911f41fa3bf6
                      • Instruction Fuzzy Hash: 6821A5715093C46FE713CB20DC55BA6BFB8AF46214F08C4DBE9448F293D265A909C771
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • getaddrinfo.WS2_32(?,00000E24), ref: 05361C67
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: getaddrinfo
                      • String ID:
                      • API String ID: 300660673-0
                      • Opcode ID: 7600d2503ec09945528f04515829363239fdb04e6be787e9477d607f303e0770
                      • Instruction ID: 0f5db8ce14c0db979eafd57ddd2da4095bd7fd09b91ea1e6b6c35b6daac0db72
                      • Opcode Fuzzy Hash: 7600d2503ec09945528f04515829363239fdb04e6be787e9477d607f303e0770
                      • Instruction Fuzzy Hash: 2F21B571500204AEE721DF50DC84FAAF7ACEF04714F04889AFA49DB685D7B5E548CB71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID: \O*l
                      • API String ID: 0-4030088352
                      • Opcode ID: 0eb0f74c56c10ad0908a9891ebfaa0910aeb9b239b07b6522ba347e257624cca
                      • Instruction ID: 3287a4a351119e7a5cd163e088dd0019360853e02c28982ffca728d30164c8c5
                      • Opcode Fuzzy Hash: 0eb0f74c56c10ad0908a9891ebfaa0910aeb9b239b07b6522ba347e257624cca
                      • Instruction Fuzzy Hash: CEC183707002648BDB09EB76E8227BE37E7AB8C308F10452AD506D7798DF399D46DB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetFileType.KERNELBASE(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 00E7B1B5
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: FileType
                      • String ID:
                      • API String ID: 3081899298-0
                      • Opcode ID: e804f219381a73239d75bbd2cc1bb52787a2629da24d464a544d5e6ee219f6e8
                      • Instruction ID: 86f86504de8cc42f331d287abdcd30442efd503d5abb6dfad9f3dd93f9b248af
                      • Opcode Fuzzy Hash: e804f219381a73239d75bbd2cc1bb52787a2629da24d464a544d5e6ee219f6e8
                      • Instruction Fuzzy Hash: 3821F5B54097806FE7128B259C45BA2BFBCEF07724F09C0D6E9848B293D264A909C7B1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: select
                      • String ID:
                      • API String ID: 1274211008-0
                      • Opcode ID: 4145059ea43e9d889f16a766fbc173d920b1505814e17a5e8fb09c6da9dc15de
                      • Instruction ID: 054baa2dc0b0ecd34c64088274e71847b900f45b9b7a6d4aef8fa50d4d6b1b03
                      • Opcode Fuzzy Hash: 4145059ea43e9d889f16a766fbc173d920b1505814e17a5e8fb09c6da9dc15de
                      • Instruction Fuzzy Hash: 892171755093849FD712CF25DC44B52BFF8EF06210F0888DAE984CB263D365E909CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegSetValueExW.KERNELBASE(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 00E7A4F8
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: Value
                      • String ID:
                      • API String ID: 3702945584-0
                      • Opcode ID: 436eb25f5ec7550c9b696f4b7cf02658d4e53cdb98906c50b2f4b304cb68f77c
                      • Instruction ID: f03d74fa65697a88136cdfec1e21290c6042bab3f55ce61c2511be276c9f3275
                      • Opcode Fuzzy Hash: 436eb25f5ec7550c9b696f4b7cf02658d4e53cdb98906c50b2f4b304cb68f77c
                      • Instruction Fuzzy Hash: 7B2192B65043806FD7228F51DC44FA7BFB8DF45214F08849AE945DB692D364E948C771
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • WSASocketW.WS2_32(?,?,?,?,?), ref: 053610F2
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: Socket
                      • String ID:
                      • API String ID: 38366605-0
                      • Opcode ID: a2733beca0fae84f9478bef354efacbb746bec540a62134e8f66aec61c4d60d8
                      • Instruction ID: 56b2cd0ac6975b73ae637305f984dbae8ed4c6dd54fd1e7572b9183cc13f3a18
                      • Opcode Fuzzy Hash: a2733beca0fae84f9478bef354efacbb746bec540a62134e8f66aec61c4d60d8
                      • Instruction Fuzzy Hash: 70219E71509380AFE722CF51DC44FA6FFB8EF05220F08889EE9858B652D375A509CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: FileView
                      • String ID:
                      • API String ID: 3314676101-0
                      • Opcode ID: b60d9b8ab71c6f1824df48c3965139c62df645c34f9999684105cb3ee5bfe2d2
                      • Instruction ID: 315a84a3e4439be648ccbc400cf6a27bc331c3e2a89e90d2856a71a76911ec68
                      • Opcode Fuzzy Hash: b60d9b8ab71c6f1824df48c3965139c62df645c34f9999684105cb3ee5bfe2d2
                      • Instruction Fuzzy Hash: 4F21D171409380AFE722CF15DC45FA6FFF8EF09224F08849EE9858B652D365E508CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00E7B0C9
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: b4fc232b69e486f8bbe3cd54ba47679bd9dd942b4857adc7975b229481b94c2b
                      • Instruction ID: 96bb81365e57dd052adf801cf6c497648b2b9107f5dc4bba9f1d8b0878e0e872
                      • Opcode Fuzzy Hash: b4fc232b69e486f8bbe3cd54ba47679bd9dd942b4857adc7975b229481b94c2b
                      • Instruction Fuzzy Hash: 8321AE71600244AFEB20DF65DC45BA6FBE8EF08324F08C89DE9499B651D371E809CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 05361523
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: DescriptorSecurity$ConvertString
                      • String ID:
                      • API String ID: 3907675253-0
                      • Opcode ID: 72c03976509c0d2a42d3bfcd06de590a144940c5e0089a5a75520f73e5fa0d61
                      • Instruction ID: 2b103762e53c3420eda0ba077489ad58529354c27c8e6de8f39e8237bc08ca7a
                      • Opcode Fuzzy Hash: 72c03976509c0d2a42d3bfcd06de590a144940c5e0089a5a75520f73e5fa0d61
                      • Instruction Fuzzy Hash: 4121C272504204AFEB20DF25DC45FAAFBACEF04224F08C46AE945DB655E774E508CA71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegQueryValueExW.KERNELBASE(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 05361438
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: 5ea4534ca95b0e9ec135643d51bf7d15c3e1a2215587cf7d70f9aea5ab23d1e3
                      • Instruction ID: 854fa593a0d2cb32a292ce36cc3593e434bade7bb09dbc45fd8cbb6166b081ca
                      • Opcode Fuzzy Hash: 5ea4534ca95b0e9ec135643d51bf7d15c3e1a2215587cf7d70f9aea5ab23d1e3
                      • Instruction Fuzzy Hash: 8F219F72508380AFD722CB11CC44FA7BFF8AF45310F08C49AE9459B692D365E918CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • K32EnumProcesses.KERNEL32(?,?,?,BA751A35,00000000,?,?,?,?,?,?,?,?,6CBD3C58), ref: 05360346
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: EnumProcesses
                      • String ID:
                      • API String ID: 84517404-0
                      • Opcode ID: 62c46f1732e63c65775157a4a8708b6db671fa32711670499643101336c4f7f3
                      • Instruction ID: 74569ff4c32d9fffaad401df9b9b0fedcc7b75bb86a2110c91e8ebdd183b689b
                      • Opcode Fuzzy Hash: 62c46f1732e63c65775157a4a8708b6db671fa32711670499643101336c4f7f3
                      • Instruction Fuzzy Hash: 3B216B715093C09FD712CB65DC99A92BFB8AF07220F0D84DBE984CF1A3D2649918CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • WriteFile.KERNELBASE(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 00E7B281
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: FileWrite
                      • String ID:
                      • API String ID: 3934441357-0
                      • Opcode ID: ec8140c3d71f675ee2d0f5892e0503ddd2fc3445c41f1d0944d5b73505023c02
                      • Instruction ID: 720a2d3ab73ae1cf4cfc4af33b722f857598ea7e5879edf34602e5afefbcdd71
                      • Opcode Fuzzy Hash: ec8140c3d71f675ee2d0f5892e0503ddd2fc3445c41f1d0944d5b73505023c02
                      • Instruction Fuzzy Hash: FB219071409380AFD7228B51DC44FA6BFB8EF46314F08C49BE9849B663D365A909CB72
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 00E7B385
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: Open
                      • String ID:
                      • API String ID: 71445658-0
                      • Opcode ID: 6f82afeec9bd2d55403cb1727ed12622065aaa1fd816f543ea1d721b78896e91
                      • Instruction ID: fb1a9397dbb46924fe15c22b664de2a5ee445c15713d458880a8e8d612b8a36b
                      • Opcode Fuzzy Hash: 6f82afeec9bd2d55403cb1727ed12622065aaa1fd816f543ea1d721b78896e91
                      • Instruction Fuzzy Hash: 2E21AE72500204AEE721DF55DC84FABFBECEF14324F08C45AEA459B651E774E9488BB1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetProcessWorkingSetSize.KERNEL32(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 053632DB
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: ProcessSizeWorking
                      • String ID:
                      • API String ID: 3584180929-0
                      • Opcode ID: 040566992c451ac44f514bd0b4344d2cc290911d063f88d518dde0a567510bbd
                      • Instruction ID: 918f324e396cda0bd4bb3b7c3b7f4d874e31eba1d043291318609dd32cb978f8
                      • Opcode Fuzzy Hash: 040566992c451ac44f514bd0b4344d2cc290911d063f88d518dde0a567510bbd
                      • Instruction Fuzzy Hash: 3521C2715093806FD712CF55DC44FA7BFA8EF45220F08C49AE944CB252D364E908CB75
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateMutexW.KERNELBASE(?,?), ref: 00E7A6B9
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: CreateMutex
                      • String ID:
                      • API String ID: 1964310414-0
                      • Opcode ID: dc0fa3df56cf513efffb9a57bea0ac4c95c591bb8d0f9e59178bb4a49fca2672
                      • Instruction ID: 899f44ff00293d67d844f893ca6d7c1666badcfa647d6cbbef406abc15b59c85
                      • Opcode Fuzzy Hash: dc0fa3df56cf513efffb9a57bea0ac4c95c591bb8d0f9e59178bb4a49fca2672
                      • Instruction Fuzzy Hash: 1A21C2756042409FE720DF65DC45BAAFBE8EF44324F08C4AAED489B741E375E909CA72
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • shutdown.WS2_32(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 0536195C
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: shutdown
                      • String ID:
                      • API String ID: 2510479042-0
                      • Opcode ID: 1b0a3a7193a52775e989cfdeef0ad242caa37b03e145f3609b7eec8aaf3427ed
                      • Instruction ID: f7bfb23b4ac23ac5a722a1501ec4b53d4be53455dc5a7308858a2e16f0d0a357
                      • Opcode Fuzzy Hash: 1b0a3a7193a52775e989cfdeef0ad242caa37b03e145f3609b7eec8aaf3427ed
                      • Instruction Fuzzy Hash: 332192B1409384AFD712CB10DC44FA6BFB8EF46220F08C4DBE9849F252D368A548CBB1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 00E7BA6A
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: LookupPrivilegeValue
                      • String ID:
                      • API String ID: 3899507212-0
                      • Opcode ID: 389e5d2ad37edd59042fc0090b1328b89c7a988efcf2bd9e02520d16bb6977be
                      • Instruction ID: 300c57304ea51d8f7f7f52c1351b40a00e1434cff45bfb50ed6b871750993273
                      • Opcode Fuzzy Hash: 389e5d2ad37edd59042fc0090b1328b89c7a988efcf2bd9e02520d16bb6977be
                      • Instruction Fuzzy Hash: 78216F715093805FEB22CF25DC54B62BFF8EF56214F0884DAE985DF252D365E808CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegQueryValueExW.KERNELBASE(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 00E7A40C
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: cc5cdeec4f3c4591eb6b0516a6cb1e7f296f09d0f0190558e359d51834d5a8e3
                      • Instruction ID: fc5bc3c2c128a943ec9afec31673aedab01178751b29ef2d62f4cbe6f8d44f0e
                      • Opcode Fuzzy Hash: cc5cdeec4f3c4591eb6b0516a6cb1e7f296f09d0f0190558e359d51834d5a8e3
                      • Instruction Fuzzy Hash: D121C075600204AFE720CF15DC84FABF7ECEF44724F08C4AAE9499B651E360E809CA72
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ioctlsocket.WS2_32(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 05363047
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: ioctlsocket
                      • String ID:
                      • API String ID: 3577187118-0
                      • Opcode ID: e356284e3f0cb96e32c3a37dbe67a14d0bbb96cf09abe9be73c2bb1587f4a659
                      • Instruction ID: 9b358031af439e270d5af215faa3c931fd35ac8539510ee23e282b9b365f3d84
                      • Opcode Fuzzy Hash: e356284e3f0cb96e32c3a37dbe67a14d0bbb96cf09abe9be73c2bb1587f4a659
                      • Instruction Fuzzy Hash: E621C0714093846FDB22CF10DC44FA6BFB8EF45220F08C89BE9859B692D375A508CBB1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • FindCloseChangeNotification.KERNELBASE(?), ref: 00E7BCA4
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: ChangeCloseFindNotification
                      • String ID:
                      • API String ID: 2591292051-0
                      • Opcode ID: 91de8776dee9409555504c27c4c5a74f7aff40497fb464a95a644c2403cb1197
                      • Instruction ID: b046ee2ec48ff6436d8beaa0c9e412929a092fc980c842cf24e3088b97fefca8
                      • Opcode Fuzzy Hash: 91de8776dee9409555504c27c4c5a74f7aff40497fb464a95a644c2403cb1197
                      • Instruction Fuzzy Hash: 1621AEB25093C05FDB128B25DC94792BFB4AF17324F0984DAE8858F663D264A908CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetFileAttributesW.KERNELBASE(?,?), ref: 00E7AB8F
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: AttributesFile
                      • String ID:
                      • API String ID: 3188754299-0
                      • Opcode ID: 5c86fbfa9458f2d7025e0d1934aeedba8dc3a8b70361d76f96885739a3666c5a
                      • Instruction ID: eb359d2cb319e11506d9cee2f005fe508b4bef1b04fadecf03de8c406ce12bce
                      • Opcode Fuzzy Hash: 5c86fbfa9458f2d7025e0d1934aeedba8dc3a8b70361d76f96885739a3666c5a
                      • Instruction Fuzzy Hash: D921A1755093C05FDB128B65DC94B96BFF4EF47210F0D84EAD884CF263D265A909CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 05361DEE
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: Connect
                      • String ID:
                      • API String ID: 3144859779-0
                      • Opcode ID: d67989e2aab4f771ac65e476eeaaf16c93ed7819a5dc6dd17efb039427c1626a
                      • Instruction ID: 0ef00649b1b1484c475a4e96ff9ed1be9a5af7dfef44dc982f2d076a59c656c2
                      • Opcode Fuzzy Hash: d67989e2aab4f771ac65e476eeaaf16c93ed7819a5dc6dd17efb039427c1626a
                      • Instruction Fuzzy Hash: DF218B71408380AFDB228F55DC54B62FFF8EF0A210F08849AE9858B662D375E818DB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: FileView
                      • String ID:
                      • API String ID: 3314676101-0
                      • Opcode ID: 304c3d29905e7678dbac3cf912e8939ec9dec702b1e4aed9c4596657ab1c928f
                      • Instruction ID: 57ffc967a4db81dd343ab69bf67e7e2707ec9eabcc27c358e00a98cc00d0054f
                      • Opcode Fuzzy Hash: 304c3d29905e7678dbac3cf912e8939ec9dec702b1e4aed9c4596657ab1c928f
                      • Instruction Fuzzy Hash: DC21DC71504240AFE721CF15DC85FAAFBE8EF08324F08C49EE9458BA51E375E408CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • WSASocketW.WS2_32(?,?,?,?,?), ref: 053610F2
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: Socket
                      • String ID:
                      • API String ID: 38366605-0
                      • Opcode ID: 7f1ec8c01d8be15c83e6b3a5ed8685bfb545e2815eb7ee5509499427b6e4503c
                      • Instruction ID: 1a5ea6ba84736d8c7ebb71fd3ec3fd8cb37de588c9473f48152dc017826ed6b7
                      • Opcode Fuzzy Hash: 7f1ec8c01d8be15c83e6b3a5ed8685bfb545e2815eb7ee5509499427b6e4503c
                      • Instruction Fuzzy Hash: DF21CF71504240AFEB21CF55DC45BA6FBE9EF08324F04C89EE9458B651D376E409CB72
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CopyFileW.KERNELBASE(?,?,?), ref: 00E7AFCA
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: CopyFile
                      • String ID:
                      • API String ID: 1304948518-0
                      • Opcode ID: 01e71971f2d9841dd8d6d8ca590c457ba315a3e85a96ba2ae332ef7fc2b3f2d3
                      • Instruction ID: aef91f3ba0be2c3c76bf29e69a2a8ba1a3a609e12bddceaacaae0f6205a69869
                      • Opcode Fuzzy Hash: 01e71971f2d9841dd8d6d8ca590c457ba315a3e85a96ba2ae332ef7fc2b3f2d3
                      • Instruction Fuzzy Hash: 612193716093809FD721CF65DC85B57BFF8EF46220F0C84AAE989DB652D364E808CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • FindCloseChangeNotification.KERNELBASE(?), ref: 00E7A780
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: ChangeCloseFindNotification
                      • String ID:
                      • API String ID: 2591292051-0
                      • Opcode ID: c441af85c9a7a643300a2cc60df831e4504737db21624c84ca174c2e3512f423
                      • Instruction ID: 0cf4df8e56f1b5a79113da724409375a346f0b9cda93dba481130668ceae51a0
                      • Opcode Fuzzy Hash: c441af85c9a7a643300a2cc60df831e4504737db21624c84ca174c2e3512f423
                      • Instruction Fuzzy Hash: 9221C3B55043809FD7118F25D885752BFB4EF42324F0884ABED858B653D3359909CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryA.KERNELBASE(?,00000E24), ref: 05362193
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: ae312a1d0f83b3b643e336172095d0437425e85bc4d9d558c6f94a3884195747
                      • Instruction ID: 9f280145ae1f8046a24127693a9e3ca474b6c2b272d89c77918c9aa15c85bacd
                      • Opcode Fuzzy Hash: ae312a1d0f83b3b643e336172095d0437425e85bc4d9d558c6f94a3884195747
                      • Instruction Fuzzy Hash: B311E4755083806FE721CB11DC85FA6FFB8DF05320F04809AFA448B292D3A8A948CB71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegSetValueExW.KERNELBASE(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 00E7A4F8
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: Value
                      • String ID:
                      • API String ID: 3702945584-0
                      • Opcode ID: 8ba6b6cb3c762ea5031efb8b767ba3d72f7fdcd71c191564c9466d8077884c9b
                      • Instruction ID: b182d579c2ab95b3ade6f5a40cf28eb088cdff8e3a8499fc25076cd41261d238
                      • Opcode Fuzzy Hash: 8ba6b6cb3c762ea5031efb8b767ba3d72f7fdcd71c191564c9466d8077884c9b
                      • Instruction Fuzzy Hash: 2811B475500600AFE7218F11DC44FABBBECEF44714F08C46AED499B751E360E808CA72
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegQueryValueExW.KERNELBASE(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 05361438
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: 15e9d8c14cec6cfcade053d882947301fcfa12f001c4e154996ca1550ebd6526
                      • Instruction ID: 8c9a1176804afd2df3d4bd6764d6e4f7abd9c3d93cdbcff62fc02b972c5efeed
                      • Opcode Fuzzy Hash: 15e9d8c14cec6cfcade053d882947301fcfa12f001c4e154996ca1550ebd6526
                      • Instruction Fuzzy Hash: B011B176504204AFE722CF16DC84FA6FBFCEF04724F08C45AE9458BA51D764E418CAB1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetProcessTimes.KERNELBASE(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 05361B35
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: ProcessTimes
                      • String ID:
                      • API String ID: 1995159646-0
                      • Opcode ID: 1b0e6c41be44f0ff0bf21fbbe319b8252329b64565467a4e78f266f277c99882
                      • Instruction ID: a29aadd0abd06dbc689b1f30df905956854794e17842a625515e65dcfe3d44fd
                      • Opcode Fuzzy Hash: 1b0e6c41be44f0ff0bf21fbbe319b8252329b64565467a4e78f266f277c99882
                      • Instruction Fuzzy Hash: 1511DD72500200AFEB21CF55DC45FAAFBA8EF44220F08C4AAE9458BA55E374E508CBB1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetProcessWorkingSetSize.KERNEL32(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 053631F7
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: ProcessSizeWorking
                      • String ID:
                      • API String ID: 3584180929-0
                      • Opcode ID: a06f91e6266ece3cf4826b9dea58df1fe1baab969ebabd2086771f8374497a3e
                      • Instruction ID: cc5c0c19de840bff9628f526920e645dd8fb341417d54f4419002fabe0f6c79a
                      • Opcode Fuzzy Hash: a06f91e6266ece3cf4826b9dea58df1fe1baab969ebabd2086771f8374497a3e
                      • Instruction Fuzzy Hash: 0911C471500240AFE721CF55DC45BAABBECEF04624F08C46AEA05CB645D774E508CAB5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetProcessWorkingSetSize.KERNEL32(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 053632DB
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: ProcessSizeWorking
                      • String ID:
                      • API String ID: 3584180929-0
                      • Opcode ID: a06f91e6266ece3cf4826b9dea58df1fe1baab969ebabd2086771f8374497a3e
                      • Instruction ID: c9bf5256c1b7b893fed88c9cd4683d75c2b6da5b8bd7f27789d1cb07c2c1fb4a
                      • Opcode Fuzzy Hash: a06f91e6266ece3cf4826b9dea58df1fe1baab969ebabd2086771f8374497a3e
                      • Instruction Fuzzy Hash: 1011C171604240AFEB21CF55DC45BAABBACEF04224F18C8AAED05CB645D774E508CBB5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetExitCodeProcess.KERNELBASE(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 00E7BE6C
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: CodeExitProcess
                      • String ID:
                      • API String ID: 3861947596-0
                      • Opcode ID: 7e10ddde99ff963b7665a5e48e2d523ae28ad5cb633011e918200dde3fe61652
                      • Instruction ID: 94aa534067aecf47dd52ba5eb03093c4365dd4f6d9d13dbcace6a46b76b28d0d
                      • Opcode Fuzzy Hash: 7e10ddde99ff963b7665a5e48e2d523ae28ad5cb633011e918200dde3fe61652
                      • Instruction Fuzzy Hash: DF11C171500204AFEB11CF15DC84BEAB7A8DF44324F18C4AAEE08DB741E774E9088AA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 053604B6
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: f04a6fe4836f8c0f28e43894145890fbb63784904580cbbc764411d5365a5153
                      • Instruction ID: afa49c54fcc4a10b53439fc1166d583f4e6fd3cf27a4cfe80bcae69eadf3b223
                      • Opcode Fuzzy Hash: f04a6fe4836f8c0f28e43894145890fbb63784904580cbbc764411d5365a5153
                      • Instruction Fuzzy Hash: EE219371449380AFDB228F51DC44A56FFF4EF46220F0988DEE9858B562D379A918CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • WriteFile.KERNELBASE(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 00E7B281
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: FileWrite
                      • String ID:
                      • API String ID: 3934441357-0
                      • Opcode ID: 6d0871898c491157a4b23584f8c7cf379ab89f969acfefc5fc1144463787305b
                      • Instruction ID: 2366cf1f007d8bce21856945cd1b0f9959305e99c66370721b90441107af27ee
                      • Opcode Fuzzy Hash: 6d0871898c491157a4b23584f8c7cf379ab89f969acfefc5fc1144463787305b
                      • Instruction Fuzzy Hash: A711C172501240AFEB21CF51DC44FAAFBE8EF04324F18C49AEA499B652D374E508CBB1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ioctlsocket.WS2_32(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 05363047
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: ioctlsocket
                      • String ID:
                      • API String ID: 3577187118-0
                      • Opcode ID: 087d807491a276048262ef3fb97db377853e457afe8e387df1f01db8c246bdb1
                      • Instruction ID: 25966f47798def6628af78e04d7ad49f8b165baca08a790abae628a71c9f3402
                      • Opcode Fuzzy Hash: 087d807491a276048262ef3fb97db377853e457afe8e387df1f01db8c246bdb1
                      • Instruction Fuzzy Hash: DD11E371500200AFEB21CF15DC44FA6FBA8EF44324F08C89AE9458B645D374E508CAB1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: Initialize
                      • String ID:
                      • API String ID: 2538663250-0
                      • Opcode ID: 71b913594d22b5a34cc32f9eaca2296b899b27fbd2aa9cf89b9b96535820198c
                      • Instruction ID: ab7371373e17d1d33d71b91337e118655b92e0dfe1293a3d929e4ba13cc4b549
                      • Opcode Fuzzy Hash: 71b913594d22b5a34cc32f9eaca2296b899b27fbd2aa9cf89b9b96535820198c
                      • Instruction Fuzzy Hash: 561160715493C05FDB128B25DC54792BFB4DF46220F0884DBED848F153D265A948CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • shutdown.WS2_32(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 0536195C
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: shutdown
                      • String ID:
                      • API String ID: 2510479042-0
                      • Opcode ID: fefb8e273cd57d35da6bb509b632a2a391652591c461bf4f4531de41f8378918
                      • Instruction ID: c0c7590ac7a276dbda9aae204b74f95009ae589061ea92388c3fbfc2e0d79611
                      • Opcode Fuzzy Hash: fefb8e273cd57d35da6bb509b632a2a391652591c461bf4f4531de41f8378918
                      • Instruction Fuzzy Hash: 9611C271500244AFEB11CF15DC84FAABBE8EF44224F08C49AED449B745E374E508CAB5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetErrorMode.KERNELBASE(?), ref: 00E7A330
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: ErrorMode
                      • String ID:
                      • API String ID: 2340568224-0
                      • Opcode ID: 6f3de7dc77b29798b1aff36673989a854fa00a004cbad5c065b51c56d77407eb
                      • Instruction ID: fe59f79c60426b7f808a4e5636d8b8e63042d95762b47b3d2ce5ba70b36df912
                      • Opcode Fuzzy Hash: 6f3de7dc77b29798b1aff36673989a854fa00a004cbad5c065b51c56d77407eb
                      • Instruction Fuzzy Hash: 4F118F714093C0AFDB228B25DC54B66BFB4DF57224F0D80DBED848B263D265A908D772
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryA.KERNELBASE(?,00000E24), ref: 05362193
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: fdfbcd1d3128bd6457ed1b37ce4fa8d95b36c8b05f930d25891f8c4811485f91
                      • Instruction ID: e7382214ea28f937bec84e593854ebce7c7e2121ff799baf7f87debed876228b
                      • Opcode Fuzzy Hash: fdfbcd1d3128bd6457ed1b37ce4fa8d95b36c8b05f930d25891f8c4811485f91
                      • Instruction Fuzzy Hash: 2911C279504200AEE720DB15DC81FBAFBA8DF04724F14C09AFE044A685D3A8B548CAA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: select
                      • String ID:
                      • API String ID: 1274211008-0
                      • Opcode ID: 1eb5eb821fbe75b2c74d9a0b0526526a683eaa3db8450fbb32502b727f2cfa93
                      • Instruction ID: d1bebf4e38d8d002e2fd51c1783275b7de7ae9df16ba7c3d22c13b03098e0512
                      • Opcode Fuzzy Hash: 1eb5eb821fbe75b2c74d9a0b0526526a683eaa3db8450fbb32502b727f2cfa93
                      • Instruction Fuzzy Hash: 86116A756042449FEB20DF15D884BA6FBE8EF04220F08C8AAED49CB656D374E508CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: send
                      • String ID:
                      • API String ID: 2809346765-0
                      • Opcode ID: ce78817aec83690f6a84f81d13c410c4c94e20a0ec1241f06c7d20f5cb368540
                      • Instruction ID: 819aa25a870b44c98cdb99a3b85ffa4e13326a2127127a37662d5ad03ea0c22c
                      • Opcode Fuzzy Hash: ce78817aec83690f6a84f81d13c410c4c94e20a0ec1241f06c7d20f5cb368540
                      • Instruction Fuzzy Hash: 63118F75409380AFDB22CF15DC44B56FFB4EF56224F08C49AED888B552D275A918CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 00E7BA6A
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: LookupPrivilegeValue
                      • String ID:
                      • API String ID: 3899507212-0
                      • Opcode ID: 30a079b614f0c2fa6b23048da24ae13a1e76f2c93532d3c6ab7acd9d9bfd920d
                      • Instruction ID: 49a1b7b3f11a1164e88ed8dc0652b8aaf3ca5a9e92af8091a28647b392bd6943
                      • Opcode Fuzzy Hash: 30a079b614f0c2fa6b23048da24ae13a1e76f2c93532d3c6ab7acd9d9bfd920d
                      • Instruction Fuzzy Hash: F2118EB1A002408FEB20DF29D885B56FBE8EF14324F08C4AAED49DB751D774E908CA71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CopyFileW.KERNELBASE(?,?,?), ref: 00E7AFCA
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: CopyFile
                      • String ID:
                      • API String ID: 1304948518-0
                      • Opcode ID: 30a079b614f0c2fa6b23048da24ae13a1e76f2c93532d3c6ab7acd9d9bfd920d
                      • Instruction ID: b26706c2d92678f5c44df6335ddb405da49d29dbd86f679f1dca55e9c11ba2ac
                      • Opcode Fuzzy Hash: 30a079b614f0c2fa6b23048da24ae13a1e76f2c93532d3c6ab7acd9d9bfd920d
                      • Instruction Fuzzy Hash: 711182B1A042408FDB20DF25D884B56FBE8EF54324F0CC4AAED49DB741D774E804CA62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetFileType.KERNELBASE(?,00000E24,BA751A35,00000000,00000000,00000000,00000000), ref: 00E7B1B5
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: FileType
                      • String ID:
                      • API String ID: 3081899298-0
                      • Opcode ID: 58090b80f721eb499421f047ef376c19af19736413aa87d579b20b5f66d597c3
                      • Instruction ID: c6205e3aa60c857fa8e0897f764068b99ffce93dcd2641aafe0d639d6c4bcb61
                      • Opcode Fuzzy Hash: 58090b80f721eb499421f047ef376c19af19736413aa87d579b20b5f66d597c3
                      • Instruction Fuzzy Hash: BA01D275505244AEE720CF05DC84BE6FBA8DF04724F18C09AED089B781D374E908CAB5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: CloseFind
                      • String ID:
                      • API String ID: 1863332320-0
                      • Opcode ID: 056b0fa2fadd025503e17dfadf04849a3dd6442d5aa01752593955599320c89c
                      • Instruction ID: 92ec156520b9dc04c828660a5767b29e68fb1921f52bd6a3c345a0c6e63c9f51
                      • Opcode Fuzzy Hash: 056b0fa2fadd025503e17dfadf04849a3dd6442d5aa01752593955599320c89c
                      • Instruction Fuzzy Hash: 6611CE755093C09FCB128F15DC84B52FFB4DF46220F0880EAED858B2A2D264A948CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • K32EnumProcesses.KERNEL32(?,?,?,BA751A35,00000000,?,?,?,?,?,?,?,?,6CBD3C58), ref: 05360346
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: EnumProcesses
                      • String ID:
                      • API String ID: 84517404-0
                      • Opcode ID: afe3dd817fcabb768f613949da65008990ae23099a8288104369f3a3d2dd5b98
                      • Instruction ID: 526cf188a7da4e3908f0daf047a4416f976881f34d2abe54e3e46c2e5b49fd5d
                      • Opcode Fuzzy Hash: afe3dd817fcabb768f613949da65008990ae23099a8288104369f3a3d2dd5b98
                      • Instruction Fuzzy Hash: 1611C0756002449FDB10CF65D889B66FBE8EF04221F18C4AEED49CF656D3B4E508CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 05361DEE
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: Connect
                      • String ID:
                      • API String ID: 3144859779-0
                      • Opcode ID: 765cb3b73b686b33402ad6c13d68c6d6b8b1d72c12f16f2d3134983527edb8fb
                      • Instruction ID: d2cfbe15646d803c7af5eed4eebddda6b5f342b798d5c1aaddbe399b5ade37bc
                      • Opcode Fuzzy Hash: 765cb3b73b686b33402ad6c13d68c6d6b8b1d72c12f16f2d3134983527edb8fb
                      • Instruction Fuzzy Hash: 98117C355006449FDB20CF55D844B66FBE5FF08321F08C4AEED458BA66D375E418DB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetFileAttributesW.KERNELBASE(?,?), ref: 00E7AB8F
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: AttributesFile
                      • String ID:
                      • API String ID: 3188754299-0
                      • Opcode ID: bc6e0480d6e4e11d12f0fa4f5aa5f2270045a61b3814c38e232865da3ebc9286
                      • Instruction ID: 824d99577d96e947809989157d7ae7958bf19893fe57732783b1c09d0abcd8ef
                      • Opcode Fuzzy Hash: bc6e0480d6e4e11d12f0fa4f5aa5f2270045a61b3814c38e232865da3ebc9286
                      • Instruction Fuzzy Hash: 9C0180756012409FDB10CF69D88476AFBD4EF44325F0CC4AAED49DB651D274E908CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetVolumeInformationA.KERNELBASE(?,00000E24,?,?), ref: 05361EEE
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: InformationVolume
                      • String ID:
                      • API String ID: 2039140958-0
                      • Opcode ID: 18e884d34122a3de5b56266ce278c43a83cb51138930924f869db6f8c30c087e
                      • Instruction ID: 0834b645fa077ec6c88e21ba77fd0ac17e80fd5b1deac9960306d502843cf41f
                      • Opcode Fuzzy Hash: 18e884d34122a3de5b56266ce278c43a83cb51138930924f869db6f8c30c087e
                      • Instruction Fuzzy Hash: 4E01B171600600ABD310DF16DC45B66FBE8EB88A20F14C15AED089BB45E731F955CBE1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 053604B6
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 0cb87c7b14f64d3737d88d31783035bc35d4c3ebac5709c78fceb906b8b25598
                      • Instruction ID: d5af8ec6bdf36fef7f2e9b0addd09b1473ade34fff8e8ed15c3c9596ae20a84b
                      • Opcode Fuzzy Hash: 0cb87c7b14f64d3737d88d31783035bc35d4c3ebac5709c78fceb906b8b25598
                      • Instruction Fuzzy Hash: AC015B324006409FDB21CF55D949B66FBE5EF08220F08C89EEE494AA56D375E528DF61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • FindCloseChangeNotification.KERNELBASE(?), ref: 00E7BCA4
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: ChangeCloseFindNotification
                      • String ID:
                      • API String ID: 2591292051-0
                      • Opcode ID: 60eb02fdf21cf5ac3019b3ff0e922f0b9830bb7eb0c7de8b31a3ba480b3c5edd
                      • Instruction ID: 4273b063da78f31701f111960f9392f060ae4a3aa6e13bb4f80b58c8c4b8d895
                      • Opcode Fuzzy Hash: 60eb02fdf21cf5ac3019b3ff0e922f0b9830bb7eb0c7de8b31a3ba480b3c5edd
                      • Instruction Fuzzy Hash: B001BC756042448FEB11CF19E884796FBE4EF14324F08C0AADD499B656D775E808CA62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • FindCloseChangeNotification.KERNELBASE(?), ref: 00E7A780
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: ChangeCloseFindNotification
                      • String ID:
                      • API String ID: 2591292051-0
                      • Opcode ID: 37ded352caf9fcc2c9b350fa9a1e48248eb4bc71ec7a38794e5cc0e91b5d3f75
                      • Instruction ID: b8cf5b016919976d018bd28e5afeb9cfbcd9e949f374979809d74e146378dc61
                      • Opcode Fuzzy Hash: 37ded352caf9fcc2c9b350fa9a1e48248eb4bc71ec7a38794e5cc0e91b5d3f75
                      • Instruction Fuzzy Hash: 9201BC759002408FEB108F15E8847AAFBA4DF44320F0CC4ABED499B652D278E808CAA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 0536103A
                      Memory Dump Source
                      • Source File: 00000001.00000002.4113001835.0000000005360000.00000040.00000800.00020000.00000000.sdmp, Offset: 05360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5360000_System.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: d8db53df9846d8f129a367018e66c1ca3990abea2f40b52c5222c3b2ef5e847b
                      • Instruction ID: 50f3a52409ed0acd3668763de0e333aeb8b18514bd485d0ce2e5357d836826e0
                      • Opcode Fuzzy Hash: d8db53df9846d8f129a367018e66c1ca3990abea2f40b52c5222c3b2ef5e847b
                      • Instruction Fuzzy Hash: FB01A271500600ABD210DF16DC46B66FBE8FB88A20F14C15AED089BB41E771F955CBE5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: send
                      • String ID:
                      • API String ID: 2809346765-0
                      • Opcode ID: c136c527c9788ca73b0d6e14826e9caa6c90ae08feee386c4f0d6112cb3ef0ac
                      • Instruction ID: 7ab05b5c5722fa02f0d4c4d9a74fa1d11719b962619fe64f91b09fe3aab697d1
                      • Opcode Fuzzy Hash: c136c527c9788ca73b0d6e14826e9caa6c90ae08feee386c4f0d6112cb3ef0ac
                      • Instruction Fuzzy Hash: 2101B1754002409FEB20CF55E844BAAFBE0EF44324F0CC8AAED499B652D375E408CF62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • WaitForInputIdle.USER32(?,?), ref: 00E7AA3B
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: IdleInputWait
                      • String ID:
                      • API String ID: 2200289081-0
                      • Opcode ID: 7765f3b9e754053eceec9ae3e6ad2c14ddceff51257a3929648c05e231c48217
                      • Instruction ID: 139db13528009f0ec8175c0bc9232b9af1441c44e941179b1efb22fd3d2b87e1
                      • Opcode Fuzzy Hash: 7765f3b9e754053eceec9ae3e6ad2c14ddceff51257a3929648c05e231c48217
                      • Instruction Fuzzy Hash: F3017C759042409FDB10CF15D98476AFBA4EF44324F0CC8AADD499B656D279A508CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: CloseFind
                      • String ID:
                      • API String ID: 1863332320-0
                      • Opcode ID: be332416e2d87c81a034c03a3f7be4b410706d8f0403c816bcb5ddc343303c29
                      • Instruction ID: 380f582cadba120004b2a4af99fe08d19b6de7f82e493d91b20a09b1482cac41
                      • Opcode Fuzzy Hash: be332416e2d87c81a034c03a3f7be4b410706d8f0403c816bcb5ddc343303c29
                      • Instruction Fuzzy Hash: 9301A4755052449FDB108F15D8857AAFBE4EF44325F0CC0EAED099B752D375E888CEA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: Initialize
                      • String ID:
                      • API String ID: 2538663250-0
                      • Opcode ID: 2f91932942d3da820da898b22812c4ea118ae6b06b1f2239746ea53c5e9c9f26
                      • Instruction ID: 1f29cbfab85912fe121cac18e8251a49784e826e73b1aaf08bf9d10d33c7b1d9
                      • Opcode Fuzzy Hash: 2f91932942d3da820da898b22812c4ea118ae6b06b1f2239746ea53c5e9c9f26
                      • Instruction Fuzzy Hash: A901DB309002408FDB10CF05D8847AAFBA0EF44320F0CC4AADD489F606D378E808CAA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetErrorMode.KERNELBASE(?), ref: 00E7A330
                      Memory Dump Source
                      • Source File: 00000001.00000002.4110375998.0000000000E7A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e7a000_System.jbxd
                      Similarity
                      • API ID: ErrorMode
                      • String ID:
                      • API String ID: 2340568224-0
                      • Opcode ID: 4a46faa504ccfcca1ea880de7db8a6c6110a0a15c6384a3ccc645473ca706fde
                      • Instruction ID: 11ee5a0a70a1ebcdcef85edd878bf1c4deff9cd476458391755f2414cfa6c4a9
                      • Opcode Fuzzy Hash: 4a46faa504ccfcca1ea880de7db8a6c6110a0a15c6384a3ccc645473ca706fde
                      • Instruction Fuzzy Hash: 30F08C35804244AFDB109F19D888769FBA0EF44725F0CC0AADD595B752D3B9E808DAA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID: 2*l
                      • API String ID: 0-668979667
                      • Opcode ID: 4745b5f6ce2624ece9cb0ca4b80c84525e09074a17f4f7259706ed90c717cd61
                      • Instruction ID: 29da6b57e7bd8b44dc806864b78dc73961bee1b8a9647b4dadb9d69bd5a37b3f
                      • Opcode Fuzzy Hash: 4745b5f6ce2624ece9cb0ca4b80c84525e09074a17f4f7259706ed90c717cd61
                      • Instruction Fuzzy Hash: CCA1D030B042118BC718EB7AE9467AD77E7BF88354F184668E812AB3D5EF35D806CB51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID: \O*l
                      • API String ID: 0-4030088352
                      • Opcode ID: f55aaf9827c60057694046e0518c24d7c10dbaf7f3a9bb73be1613cad220e743
                      • Instruction ID: 7c002561e8ed4940c84abf586582656d1752a95c9a02cb7da5c56370e3678df7
                      • Opcode Fuzzy Hash: f55aaf9827c60057694046e0518c24d7c10dbaf7f3a9bb73be1613cad220e743
                      • Instruction Fuzzy Hash: 41A197707002648BDB09EB76E8227BD37EBAB88308F11452AD406D7BD5CF789C46D761
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID: \O*l
                      • API String ID: 0-4030088352
                      • Opcode ID: 1e9ee503596bc98fde393c0a99021dcc68ccfbda30f9539ca6b630b45f04de34
                      • Instruction ID: 63334f960e4e289a3af9209b1bba867b5be5cf17251afc85bef62930375b1c60
                      • Opcode Fuzzy Hash: 1e9ee503596bc98fde393c0a99021dcc68ccfbda30f9539ca6b630b45f04de34
                      • Instruction Fuzzy Hash: 7FA187707002648BDB09EB76E8227BE37EBAB88308F11452AD406D7BD5CF799C46D761
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID: \O*l
                      • API String ID: 0-4030088352
                      • Opcode ID: 120d68fbfcfb0da5715f0390243852b1b705950ee6265e5d5c4401a1238e5036
                      • Instruction ID: c0b102d858612faee79c6a078b1435ffa4270124f86e7c69353e7dc6f69bb479
                      • Opcode Fuzzy Hash: 120d68fbfcfb0da5715f0390243852b1b705950ee6265e5d5c4401a1238e5036
                      • Instruction Fuzzy Hash: F5A177707002648BDB09EB76E8227BE37EBAB88308F11452AD406D7BD5CF799C46D761
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID: L.*l
                      • API String ID: 0-3912938024
                      • Opcode ID: 2540f2213ec5ff11220961f93a5d18f730ee36c968f039448a8da1c8803d6f5a
                      • Instruction ID: 2daaa86af670e4c2d447bbbfd4688a71aabce534e61ec8c05f53c44482b577db
                      • Opcode Fuzzy Hash: 2540f2213ec5ff11220961f93a5d18f730ee36c968f039448a8da1c8803d6f5a
                      • Instruction Fuzzy Hash: A811A235F002199BDF14EAB9DD52BFEB6F6BF88300F108539E505AB285EE359C4097A1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID: \O*l
                      • API String ID: 0-4030088352
                      • Opcode ID: 4bd4ca389056d7327442ad7108c45b05bac9667d15a666b502edeba16ccd0a75
                      • Instruction ID: 968d0e384a67225c791b17b233736586a798bd9924a372a3a2ef671f094fd473
                      • Opcode Fuzzy Hash: 4bd4ca389056d7327442ad7108c45b05bac9667d15a666b502edeba16ccd0a75
                      • Instruction Fuzzy Hash: B3215E34B111189FCB04EBA8E494AEDB3F3BF88618B108165E815EB764CF319C45CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID: L.*l
                      • API String ID: 0-3912938024
                      • Opcode ID: 51f8351f9d64f29c765c9ba8d92c05c699e8a4dd80c939f295ac0fea314d7702
                      • Instruction ID: 5d2a885a7c8f6f430cf3c00e00c774ccbc2c8b160f5a8dd99775ce876a954bb9
                      • Opcode Fuzzy Hash: 51f8351f9d64f29c765c9ba8d92c05c699e8a4dd80c939f295ac0fea314d7702
                      • Instruction Fuzzy Hash: 5F012035F042595BDB14DA75B9127BF7BEAFB88740F004039E505D7380EB31D84147A1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID: 2*l
                      • API String ID: 0-668979667
                      • Opcode ID: 93ffed417eabbc3ef5f98193e2933e5f5fc63557968374e7858a1f80f3409164
                      • Instruction ID: 0aa931af17f25b85e5aa4c832fceb6ee5d1d39900a4bc2e2e19f66fe18ec92d5
                      • Opcode Fuzzy Hash: 93ffed417eabbc3ef5f98193e2933e5f5fc63557968374e7858a1f80f3409164
                      • Instruction Fuzzy Hash: F401F720B001198B8B4CF779543627E75C75FC920870D802ED44AEB391DF28CC056BF6
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: df998d68a9753fc1b3b8019c6bb1c8957a426035b269d32c5c4b6a24d9c3e0c0
                      • Instruction ID: b5178272a5ad5321ebff4a410d4c57180ddb76dafca7193b93318f79c0342ca2
                      • Opcode Fuzzy Hash: df998d68a9753fc1b3b8019c6bb1c8957a426035b269d32c5c4b6a24d9c3e0c0
                      • Instruction Fuzzy Hash: B6D14234A00219DFCB09EF76F455A9D77B6BF88344B208629E912A77A8DF359C06CF50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5b608f03b5f209264ecc0f7cf15bc3bf6b673980e1887b70a2991f45e404911d
                      • Instruction ID: 434aea537d8243399937348d4d06c6025e599cd51136e3122274337ff442356e
                      • Opcode Fuzzy Hash: 5b608f03b5f209264ecc0f7cf15bc3bf6b673980e1887b70a2991f45e404911d
                      • Instruction Fuzzy Hash: B9B16034B00219DFCB09EF76E451A9D77B2BF88248B208529E916A77A8DF359C06CF50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9f0637a5b0eb914e4447a803f05a7eb4254202988621216cbfc0273e3fc73aaf
                      • Instruction ID: a4ced83013999782825a452fe8022c63241ac16ceb72349c6997ab809567692e
                      • Opcode Fuzzy Hash: 9f0637a5b0eb914e4447a803f05a7eb4254202988621216cbfc0273e3fc73aaf
                      • Instruction Fuzzy Hash: BD911034A00219DFCB09EF75E451A9D77B2BF88348B208629E916A77A8DF359C46CF50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 082c818eecaec38074eef1b439bae2c951d5b7d9c3d0ff459c9e422bd6f8e261
                      • Instruction ID: f6a113f738aab12a4e4dc2df9c7f950f4345372e9b225a1797c12cd1c04c3e51
                      • Opcode Fuzzy Hash: 082c818eecaec38074eef1b439bae2c951d5b7d9c3d0ff459c9e422bd6f8e261
                      • Instruction Fuzzy Hash: 86810E34A00215DFCB19EF75E451AAD77B2BF88348B208629E916A77A8DF359C06CF50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3db347d980a943c1a34cd4a374e1a0a8551e652ce932c168d815f265e54e607d
                      • Instruction ID: 04987be187afe0aa6932cb14889e037659c9e89626f626a1261cdab93d777654
                      • Opcode Fuzzy Hash: 3db347d980a943c1a34cd4a374e1a0a8551e652ce932c168d815f265e54e607d
                      • Instruction Fuzzy Hash: CD810F34B00215DFCB19EF75E451A9D77B2BF88348B208629E916A77A8DF359C06CF50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 30f13553273d20cd0207c058e0c0048c9e9a5aa89b308e25909e9e357cdab5d3
                      • Instruction ID: b7c42c7bc3065d98d1545f7d4cbfc486f37a96b622cfcdfcd3fb5e07b30a5e25
                      • Opcode Fuzzy Hash: 30f13553273d20cd0207c058e0c0048c9e9a5aa89b308e25909e9e357cdab5d3
                      • Instruction Fuzzy Hash: 0C719F347002208FCB19EB76E46576D37E3BB89308B104269E506EB7A9DF36AC46CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 40fdd48cc5a3179b0ccdc4b1f35f14c86230730722923066c818fbbf2cb13ffc
                      • Instruction ID: ada2fa5ff15b2a19086bf6f132c68beb40a25eb986bfe7dbbb6928c5db013d47
                      • Opcode Fuzzy Hash: 40fdd48cc5a3179b0ccdc4b1f35f14c86230730722923066c818fbbf2cb13ffc
                      • Instruction Fuzzy Hash: 35710C34B01225DFCB19EF75E451A6D73A2BF88348B208A29E916977A8DF35DC06CF50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1a8b1897760f6e242abb461ce14c3c513ca03f7903d16b2ef0b574587fe001b8
                      • Instruction ID: 7a39ddab400ec2ba64cb0281bbec820ca88565918fa80a32d28e4af0b696e5e2
                      • Opcode Fuzzy Hash: 1a8b1897760f6e242abb461ce14c3c513ca03f7903d16b2ef0b574587fe001b8
                      • Instruction Fuzzy Hash: 29614935700321CFCB09EB76E4556AD77A2BF88208B144669D902EB3A9EF35EC46CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a30581923716eb27321b5e675469ab1373c087ffea28782479d738291013a198
                      • Instruction ID: d558f94fff55053b5ea644bac7a9910a1825c6bd3a9017ed1187d94fb4dd2bb5
                      • Opcode Fuzzy Hash: a30581923716eb27321b5e675469ab1373c087ffea28782479d738291013a198
                      • Instruction Fuzzy Hash: 9D518C34700220CFCB19EB76E4557AD37E2BB89208B144669D906EB7A9DF36E846CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9e414b5f934c4fe1364f8c1e4bfaf837714b3f3f8b5695c911dae0cf63b23a7f
                      • Instruction ID: 1ca31bab53f17469870ab6e95e4d1a13de771cc4b6b86c7127ecd2e3363dd9e7
                      • Opcode Fuzzy Hash: 9e414b5f934c4fe1364f8c1e4bfaf837714b3f3f8b5695c911dae0cf63b23a7f
                      • Instruction Fuzzy Hash: D2519F30A08211DEDB18DB36E9427BD37EBBF48355F584665E402EA2E1EF34D946CB20
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ffa66ed2f358436e9fcf9f4b9f7d5d6f3eca71385d08ee99c974999f35a93c11
                      • Instruction ID: 31670a2d9f9b4f371e93a3c9e409010778137edcc5d020c592cbc0b1f386dc62
                      • Opcode Fuzzy Hash: ffa66ed2f358436e9fcf9f4b9f7d5d6f3eca71385d08ee99c974999f35a93c11
                      • Instruction Fuzzy Hash: 3C514735700321CFCB09EB36E45466E77A3BF882097144669D902EB3A9EF36EC46CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9d2621bea8523a65b8281074bae61c7f4aaf21cec90db24b12934ed662042e4e
                      • Instruction ID: e420712687170bfa753cb3117b31069aaa8d580298eb9092f763fe0a1aa9e4a2
                      • Opcode Fuzzy Hash: 9d2621bea8523a65b8281074bae61c7f4aaf21cec90db24b12934ed662042e4e
                      • Instruction Fuzzy Hash: B1514134A002159FCB18EF75F4517AE73A6BF88348F208529D916A77A8DF35DC06CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c19b035c6a4cac2f082eb9e1c6f3001e1e81a7f1046fb30dac81b9acea7d9a70
                      • Instruction ID: 6d34603cbd3154f3077406ed46f0bc99ddf2140c2c7896d2de51f66f8d8238ea
                      • Opcode Fuzzy Hash: c19b035c6a4cac2f082eb9e1c6f3001e1e81a7f1046fb30dac81b9acea7d9a70
                      • Instruction Fuzzy Hash: 55419030A04311CADB18EB36E9027BC36EBBF48355F584665D402EA2E1EF34D946CB21
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 34efe2db27e7c1eae0ce3172f6ca865ebd4105d6034d79f748b793746bdc2ea8
                      • Instruction ID: 8f39dd7d4bc5e45c0a7c587b596fbcc443f39657005cf1bcb59654d1fb5deb52
                      • Opcode Fuzzy Hash: 34efe2db27e7c1eae0ce3172f6ca865ebd4105d6034d79f748b793746bdc2ea8
                      • Instruction Fuzzy Hash: 335145705013968BC708FF36E44568EB7A2FF852087418A3DD1059B76EEB346D0BDB92
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 82d8d627b20d3dff8408dd707fc8ca7871639f215ea7bd7179fe5bc6893a23e6
                      • Instruction ID: b3b3352003e8ec1a34a445d15b2c18367e721ea302b6d45ed8e996c23fcefcf0
                      • Opcode Fuzzy Hash: 82d8d627b20d3dff8408dd707fc8ca7871639f215ea7bd7179fe5bc6893a23e6
                      • Instruction Fuzzy Hash: 3141B134700220CFCB18EB75E4557AD37E2AF89308B144669D416DB7A9DF36E846CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 025f1a78ad7cb0d560950c7c3771e61de59d6fe365258062698c768c96a39f38
                      • Instruction ID: e623a87f25aef5402044f04cec337bb7f96a48d09c2bdbdacd4ec8ad5422c2b2
                      • Opcode Fuzzy Hash: 025f1a78ad7cb0d560950c7c3771e61de59d6fe365258062698c768c96a39f38
                      • Instruction Fuzzy Hash: 3D41B631A002118FCB18DF74D8855ADB7F6EF88204B548479D805DB799EF38DD45C7A1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 83f18ef99230146f12d99dd0f9ad353489fb9368c6bc275b4f7763b7c390fd1c
                      • Instruction ID: 60608f87041572795ce63fac1a6d9c3a4cf35cc4f5f1e64407e8f72586c0f1af
                      • Opcode Fuzzy Hash: 83f18ef99230146f12d99dd0f9ad353489fb9368c6bc275b4f7763b7c390fd1c
                      • Instruction Fuzzy Hash: 7631C2316002018BCB18DF34D8896AD73E6FF8820475985A9E806CB3EADF39DD46C7A1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3778436e1001628b3b1d46a36e455fc22dc598f3404a43cd4313c76d0648bd00
                      • Instruction ID: dd37b764cd17c3b28b6e76c6bcd39f84a0db00592094f5371f3a71abaadd38ae
                      • Opcode Fuzzy Hash: 3778436e1001628b3b1d46a36e455fc22dc598f3404a43cd4313c76d0648bd00
                      • Instruction Fuzzy Hash: 01319571A002118FCB18DF34D8956AEB7E6EF88204B548479D805DF79AEB34DD46CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 865ef82838d26071ed28a6a779c95016ab02de7b56a1fc97f906a6d10599674b
                      • Instruction ID: bead5ee45aa03694ec27e1bb7a0ee12c8f96a3b49a477f00758f3717dd48f59c
                      • Opcode Fuzzy Hash: 865ef82838d26071ed28a6a779c95016ab02de7b56a1fc97f906a6d10599674b
                      • Instruction Fuzzy Hash: FC31A030B002059FDB04DB65E895BEEBBF6BF88204F248569E405EB3A0DF749C09CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8ad2c5c7a2a8148c3ef607ab85b367af2d3691e5dfd5bed5ae7603bffae18d01
                      • Instruction ID: 6ef3ea982fc3dcafb0daf07b1fb9bc2e9fc53ba86b66770d1b3a3af3b03041dc
                      • Opcode Fuzzy Hash: 8ad2c5c7a2a8148c3ef607ab85b367af2d3691e5dfd5bed5ae7603bffae18d01
                      • Instruction Fuzzy Hash: C331F2347002208FCB58FB75F8197AD37E2AF89208F148629D41ADB7A8DF35D805DB60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1e5c6089225c62530c273779231fbf38a0ecd8e7c739916deeaad16f46cefdc4
                      • Instruction ID: 63e872bd2ab10c5c8ffacb7f41d1483a90074c278542f40a68764bbbd789d0ef
                      • Opcode Fuzzy Hash: 1e5c6089225c62530c273779231fbf38a0ecd8e7c739916deeaad16f46cefdc4
                      • Instruction Fuzzy Hash: BF315234B002259FCB09EB75E4517AD73A7FF88248F21852AD805A77A9DF399C06CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 67dc96d32e634e5b4a3fc4673e77f5ae7c8e9b490de43a57e2fd927402d3c474
                      • Instruction ID: f5688969548d9f3cb7cb1c4c8bfd90f3174d3abface2aad6da2eca6a8494415a
                      • Opcode Fuzzy Hash: 67dc96d32e634e5b4a3fc4673e77f5ae7c8e9b490de43a57e2fd927402d3c474
                      • Instruction Fuzzy Hash: 76110334B01214CFCB18EF76F55A6AD77F2BF84218B14812AE016DB394DB35D441CB20
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 479621bdcc0f259e0034b26558c1971aecb12a7dee4443735973d1bf7548ef54
                      • Instruction ID: 2eeba4eb6a15ede46bf8c887bd4ee68ab972fe13c11bbf0399d3d7f678bbf3df
                      • Opcode Fuzzy Hash: 479621bdcc0f259e0034b26558c1971aecb12a7dee4443735973d1bf7548ef54
                      • Instruction Fuzzy Hash: 5101D672F001159BDF04E7B4ED5A5EE77F8EF48250B0509A5E501FB241EB29EE09CBA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4113539634.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5970000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3e9c4018b835f93399a2b7516050cd35e74e5d13485550f856983cfe085543a6
                      • Instruction ID: eb6336d559f2caa5fa213afb34ca6849d2e49c7325c56d8dccea9180c7738653
                      • Opcode Fuzzy Hash: 3e9c4018b835f93399a2b7516050cd35e74e5d13485550f856983cfe085543a6
                      • Instruction Fuzzy Hash: 4B11CCB5908341AFD350CF19D840A5BFBE4FB98664F04896EF998D7311E331E9088FA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4111026976.0000000001260000.00000040.00000020.00020000.00000000.sdmp, Offset: 01260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_1260000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b4cfb321bdc18965a2a699e399454a9f5ea0cb530d04e764d1238ef6f495971b
                      • Instruction ID: d8b492e38f560261bc00cc46b8db4f202f8497f7c25d35ca48922a7112256330
                      • Opcode Fuzzy Hash: b4cfb321bdc18965a2a699e399454a9f5ea0cb530d04e764d1238ef6f495971b
                      • Instruction Fuzzy Hash: 0811E430255281DFE311CB14D540B26FBAAAB89B1CF28C59CF9490B793C77BD883DA45
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b0f04ba899ccc8438d04f8c82b17c095830c28d4b42c1f827761044876308a4f
                      • Instruction ID: 47dd5d6ed016bff1030deea7d74d8fef2a2fb3e75baf3013b43806e253983807
                      • Opcode Fuzzy Hash: b0f04ba899ccc8438d04f8c82b17c095830c28d4b42c1f827761044876308a4f
                      • Instruction Fuzzy Hash: C901D236B0020A5EEB04EAB9E8076EE77EAEBC4354F040031E905E7280EA79D94186A1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4110485005.0000000000F9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_f9a000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9c183d7e01d67495c0ae85b47f7026cda0d1c869eaa2acc035a2ba42660291cd
                      • Instruction ID: 9ae49b28146a21c800820a23cd274bb63b90cecf9aace6ff5821acc9879292cf
                      • Opcode Fuzzy Hash: 9c183d7e01d67495c0ae85b47f7026cda0d1c869eaa2acc035a2ba42660291cd
                      • Instruction Fuzzy Hash: 2B110CB5908345AFD350CF09DC40E5BFBE8EB98660F04892EF95897311E331E9088FA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0edccb402ff3c1e983ab5ff32fb82c0feefad89ab0f69250147a0243bb0b2f03
                      • Instruction ID: 62c1dce8b3d7f6542ee4094057d2488345b476768b41e2e593435a34aea83c9d
                      • Opcode Fuzzy Hash: 0edccb402ff3c1e983ab5ff32fb82c0feefad89ab0f69250147a0243bb0b2f03
                      • Instruction Fuzzy Hash: C301456605E3C18FD7038B74ACAAB603FB4AF17211B0E85D7D080CB1B3D2AC9819D722
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4478335407e0cf7d838ad09242583dd75c6013977088337f43cd54a0c38efad2
                      • Instruction ID: b0b808648b9bf46780f68aa3e1ab82b7b4edce25762b7edf0c3040f48f6a5955
                      • Opcode Fuzzy Hash: 4478335407e0cf7d838ad09242583dd75c6013977088337f43cd54a0c38efad2
                      • Instruction Fuzzy Hash: 2E110CB2D11149AFCF04DFA9E8858EEBBB9EF88214F10852AE515E3610EB305905CBA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4111026976.0000000001260000.00000040.00000020.00020000.00000000.sdmp, Offset: 01260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_1260000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ea2d31ab32e564b84445158eb9b07735eb7067bdbe34f9747509806041d4b567
                      • Instruction ID: 6566c768656a0fb5a7360d636fddc74030d1eeb25268211cad9132ee1643be60
                      • Opcode Fuzzy Hash: ea2d31ab32e564b84445158eb9b07735eb7067bdbe34f9747509806041d4b567
                      • Instruction Fuzzy Hash: 30117C315093C1DFD713CB10C980B15BFB6AB46618F288AEEE8854B6A3C33A9846DB41
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 04c28aadf5408c5097d7ccd39084adb3591840d6b37230602811a3b283802c5b
                      • Instruction ID: d02cfd9145b1ce0d4764e357b42abf54abad537db61b32422273403f34efd3d5
                      • Opcode Fuzzy Hash: 04c28aadf5408c5097d7ccd39084adb3591840d6b37230602811a3b283802c5b
                      • Instruction Fuzzy Hash: BE015A71E002258F8F54EB7AE84069EB7F6AB89254B2045BAD809E7354EB319D16CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4111026976.0000000001260000.00000040.00000020.00020000.00000000.sdmp, Offset: 01260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_1260000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3ce9cdbf5dc103059a324dd05a29b8120b9b927d7c091b9da44bfe776f090ea0
                      • Instruction ID: c7a965e7f8c91968a814147af5fb94699c1771ad6784b615e9dacccf942536b6
                      • Opcode Fuzzy Hash: 3ce9cdbf5dc103059a324dd05a29b8120b9b927d7c091b9da44bfe776f090ea0
                      • Instruction Fuzzy Hash: 6A0186755097C46FD712CB15AC41862FFB8DB86531709C49FE8498B652D225A809CB72
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0e3217c1d9181b612473b082107cd358f9f45c27d0e03f8718256937f86b0663
                      • Instruction ID: 378360641bfec223e9d484b86e4020a320f2e43ca7dcc51d3df9fbe401046fe4
                      • Opcode Fuzzy Hash: 0e3217c1d9181b612473b082107cd358f9f45c27d0e03f8718256937f86b0663
                      • Instruction Fuzzy Hash: 9C0156706093828FCB05FB74D45845DBBF1EF84348B01C96DE589CB356DB3598099B53
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5193860de9893929433a6a0140e05c18efbfb54be17b1d96fbd980d968edc182
                      • Instruction ID: 4671078ad9424a771e52f0713617c2ac1cdbe8fdfb700b887e5dfd8f86a6cc61
                      • Opcode Fuzzy Hash: 5193860de9893929433a6a0140e05c18efbfb54be17b1d96fbd980d968edc182
                      • Instruction Fuzzy Hash: B3017C74A01214CFCB18EF75F05A5ACB7F2FF48218B54856AE405EB354DB3AC541CB60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3c63d46372a6a3952303a1901c4a01a13a03c2d504f15cb92a273cdc25219fe9
                      • Instruction ID: 9ff440090c0240df73e21fdb8e8461fac680d7d16f076260213b2a0de832b9e2
                      • Opcode Fuzzy Hash: 3c63d46372a6a3952303a1901c4a01a13a03c2d504f15cb92a273cdc25219fe9
                      • Instruction Fuzzy Hash: F2F096B1E052489FDF00DBB998426EFBFF8EB89214F10407AC209E3201E6358906CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4111026976.0000000001260000.00000040.00000020.00020000.00000000.sdmp, Offset: 01260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_1260000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 52e5d790dd90795d3261334ff3f62b06e1c2728967e6733cf91c63f702055a41
                      • Instruction ID: e83c6a34e17c7b9db1828e6315a44c67c08b6f7dec85dd26627a2abaa0371e2c
                      • Opcode Fuzzy Hash: 52e5d790dd90795d3261334ff3f62b06e1c2728967e6733cf91c63f702055a41
                      • Instruction Fuzzy Hash: 08F06D35104641DFC302CF00C540B15FBA6EB89718F24CAADE94807762C737E813DA81
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4111026976.0000000001260000.00000040.00000020.00020000.00000000.sdmp, Offset: 01260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_1260000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 02d8e041a5fdcb972aa74e650447d1eba58fa9bc2ce24f9022ae3d63b5bb444d
                      • Instruction ID: b76e37cbf02c161a4fa1490b8cb39f273e3873c3c5c9d15021e3bfa4a2819d16
                      • Opcode Fuzzy Hash: 02d8e041a5fdcb972aa74e650447d1eba58fa9bc2ce24f9022ae3d63b5bb444d
                      • Instruction Fuzzy Hash: 06E092B66046444B9650DF0AFC41452F7D8EB88631708C07FDC0D8BB01E635B508CAA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4110485005.0000000000F9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9A000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_f9a000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f9625184f769c9602aba520f0c61accaa9f9e422ce65acbb24c84df9e95e69a1
                      • Instruction ID: 1c57749717c50548db9b419ba312ecdecbdfdeacb7d74e78b4015a9809f4ba5d
                      • Opcode Fuzzy Hash: f9625184f769c9602aba520f0c61accaa9f9e422ce65acbb24c84df9e95e69a1
                      • Instruction Fuzzy Hash: C8E0D8B254024467D2509E06AC45F53FB9CDB50931F08C567ED085B702E271B50489F1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4113539634.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5970000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 857507ce213929569d3a3caa17bf8e28da3e019655e6340deeeea0535ca05feb
                      • Instruction ID: 908a3b4ea4d1555c859bc7a24aa82d6970801e55660443d011589a499e23fb9c
                      • Opcode Fuzzy Hash: 857507ce213929569d3a3caa17bf8e28da3e019655e6340deeeea0535ca05feb
                      • Instruction Fuzzy Hash: 07E0D8B254020467D250DE06AC45F53FB9CDB50A31F08C467ED081B701E172B514CDE1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4113539634.0000000005970000.00000040.00000800.00020000.00000000.sdmp, Offset: 05970000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5970000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f6a00e52c1ec4875c0dbc4da1319721c1e34cd2684a7c87615d892a0be00815d
                      • Instruction ID: 5e2b0af58a723a593fd4925bf394ed6e02d4b9f264eb41d343e88d686b750983
                      • Opcode Fuzzy Hash: f6a00e52c1ec4875c0dbc4da1319721c1e34cd2684a7c87615d892a0be00815d
                      • Instruction Fuzzy Hash: 79E0D8B254030467D2509E06AC45F53FB9CDB54A31F08C467ED085B742E171B5188AE1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5de1509f3f984fccfff1bddebe6660c26ba00175e44aa758c7ea92fd6a9762e8
                      • Instruction ID: 8c5dff11cd347ceef166c13e3ef660eb90ec1f43091cb6a4cc01db36b1530372
                      • Opcode Fuzzy Hash: 5de1509f3f984fccfff1bddebe6660c26ba00175e44aa758c7ea92fd6a9762e8
                      • Instruction Fuzzy Hash: 3DD02E315083904FC7018378945AAE43FF0EF1A24070A81FBD485CBA62C6220C0787A2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f1fb9e312f6643c8cc6064611c5a645c5e7f89e4477885f9ad5deae51384aab7
                      • Instruction ID: 80ca36db040015fa31a37eaa8b24299d3311752ffe12cdd17b9906181f717d02
                      • Opcode Fuzzy Hash: f1fb9e312f6643c8cc6064611c5a645c5e7f89e4477885f9ad5deae51384aab7
                      • Instruction Fuzzy Hash: 1FD0C22110D2D10FCB1A2238A4480983F749A8619030B41EBD0049B552CB205C0BD362
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 26fcb4bfbeb596869a7ca3ffc2c1484b48e7744d3fe7a6c61103a0f405f906b1
                      • Instruction ID: 8fbafd6e35779eb1632d7940ed46536675b911255d91d2268d21c98a04860deb
                      • Opcode Fuzzy Hash: 26fcb4bfbeb596869a7ca3ffc2c1484b48e7744d3fe7a6c61103a0f405f906b1
                      • Instruction Fuzzy Hash: 6FD0A77290020CA7DF10EFA4E8073DDB7BCDB14205F150479D805C3340EA306F189281
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4110358696.0000000000E72000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E72000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e72000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dd15279683bb72fee72680f698c31204761351ac083914d1f66182fc3237068f
                      • Instruction ID: 4275be130e75d60ce33aa2f79f7fbde9559af93c3dd463adefd5b09fbb5d93a0
                      • Opcode Fuzzy Hash: dd15279683bb72fee72680f698c31204761351ac083914d1f66182fc3237068f
                      • Instruction Fuzzy Hash: 8CD05E7A2056C18FD3169E1CC1A4B9537D4BB51718F4A84FDA8048B763D768D981E600
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4110358696.0000000000E72000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E72000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e72000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7fa84aa41353c8a04c61fbd9637f8a2ef1db58df0c7be340e4066d8ce4c723e4
                      • Instruction ID: fbd9bfab70494671ac6630d8ae57ad4b8030dda3f3f541073d8dfabfdedab9a6
                      • Opcode Fuzzy Hash: 7fa84aa41353c8a04c61fbd9637f8a2ef1db58df0c7be340e4066d8ce4c723e4
                      • Instruction Fuzzy Hash: 50D05E343406824BC715DE0CC6D4F5937D4AB40B19F0694ECAC108B762C7A8D9C0CA00
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000001.00000002.4112734477.0000000005030000.00000040.00000800.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_5030000_System.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d29ea456a4cca65f4ea93cdcd41c2557390938e5a35fa6656015ba79d826df96
                      • Instruction ID: 3d0f153d21d1948727edf7ac37940475364dffddb4838ca4829c538e1d9dafd4
                      • Opcode Fuzzy Hash: d29ea456a4cca65f4ea93cdcd41c2557390938e5a35fa6656015ba79d826df96
                      • Instruction Fuzzy Hash: E5C08C312001148BC610AB6CD404ED6B7ECEF4D124B1544BAE148C7711CE72AC0047E0
                      Uniqueness

                      Uniqueness Score: -1.00%