Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
b8UsrDOVGV.exe

Overview

General Information

Sample name:b8UsrDOVGV.exe
renamed because original name is a hash value
Original sample name:b7dd9dd7470af783d5d955b455d58cac.exe
Analysis ID:1369814
MD5:b7dd9dd7470af783d5d955b455d58cac
SHA1:bbd0c1d74c948e95f5f007102fbabcf3867a2625
SHA256:8d1bfbe0d300231cf7892a9be51258a77f52a85eac045cb42a64b357702c0c5f
Tags:exenjratRAT
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Njrat
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to log keystrokes (.Net Source)
Creates autostart registry keys with suspicious names
Drops PE files to the startup folder
Drops PE files with benign system names
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Uses netsh to modify the Windows network and firewall settings
Abnormal high CPU Usage
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • b8UsrDOVGV.exe (PID: 6176 cmdline: C:\Users\user\Desktop\b8UsrDOVGV.exe MD5: B7DD9DD7470AF783D5D955B455D58CAC)
    • Svchost.exe (PID: 6212 cmdline: "C:\Users\user\AppData\Roaming\Svchost.exe" MD5: B7DD9DD7470AF783D5D955B455D58CAC)
      • netsh.exe (PID: 2104 cmdline: netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\Svchost.exe" "Svchost.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • conhost.exe (PID: 3468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • Svchost.exe (PID: 3584 cmdline: "C:\Users\user\AppData\Roaming\Svchost.exe" .. MD5: B7DD9DD7470AF783D5D955B455D58CAC)
  • Svchost.exe (PID: 4504 cmdline: "C:\Users\user\AppData\Roaming\Svchost.exe" .. MD5: B7DD9DD7470AF783D5D955B455D58CAC)
  • Svchost.exe (PID: 4176 cmdline: "C:\Users\user\AppData\Roaming\Svchost.exe" .. MD5: B7DD9DD7470AF783D5D955B455D58CAC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Host": "2.tcp.eu.ngrok.io", "Port": "19483", "Version": "im523", "Campaign ID": "HacKed", "Install Name": "Svchost.exe", "Install Dir": "AppData"}
SourceRuleDescriptionAuthorStrings
b8UsrDOVGV.exeJoeSecurity_NjratYara detected NjratJoe Security
    b8UsrDOVGV.exeWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0x64c1:$a1: get_Registry
    • 0x7f02:$a3: Download ERROR
    • 0x81f4:$a5: netsh firewall delete allowedprogram "
    b8UsrDOVGV.exenjrat1Identify njRatBrian Wallace @botnet_hunter
    • 0x80ea:$a1: netsh firewall add allowedprogram
    • 0x82e4:$b1: [TAP]
    • 0x828a:$b2: & exit
    • 0x8256:$c1: md.exe /k ping 0 & del
    b8UsrDOVGV.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
    • 0x81f4:$s1: netsh firewall delete allowedprogram
    • 0x80ea:$s2: netsh firewall add allowedprogram
    • 0x8254:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
    • 0x7ede:$s4: Execute ERROR
    • 0x7f3e:$s4: Execute ERROR
    • 0x7f02:$s5: Download ERROR
    • 0x829a:$s6: [kl]
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exeJoeSecurity_NjratYara detected NjratJoe Security
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exeWindows_Trojan_Njrat_30f3c220unknownunknown
      • 0x64c1:$a1: get_Registry
      • 0x7f02:$a3: Download ERROR
      • 0x81f4:$a5: netsh firewall delete allowedprogram "
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exenjrat1Identify njRatBrian Wallace @botnet_hunter
      • 0x80ea:$a1: netsh firewall add allowedprogram
      • 0x82e4:$b1: [TAP]
      • 0x828a:$b2: & exit
      • 0x8256:$c1: md.exe /k ping 0 & del
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
      • 0x81f4:$s1: netsh firewall delete allowedprogram
      • 0x80ea:$s2: netsh firewall add allowedprogram
      • 0x8254:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
      • 0x7ede:$s4: Execute ERROR
      • 0x7f3e:$s4: Execute ERROR
      • 0x7f02:$s5: Download ERROR
      • 0x829a:$s6: [kl]
      C:\Users\user\AppData\Roaming\Svchost.exeJoeSecurity_NjratYara detected NjratJoe Security
        Click to see the 3 entries
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.1618553751.00000000004D2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
          00000000.00000000.1618553751.00000000004D2000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
          • 0x62c1:$a1: get_Registry
          • 0x7d02:$a3: Download ERROR
          • 0x7ff4:$a5: netsh firewall delete allowedprogram "
          00000000.00000000.1618553751.00000000004D2000.00000002.00000001.01000000.00000003.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
          • 0x7eea:$a1: netsh firewall add allowedprogram
          • 0x80e4:$b1: [TAP]
          • 0x808a:$b2: & exit
          • 0x8056:$c1: md.exe /k ping 0 & del
          00000001.00000002.4076153599.0000000002E91000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
            Process Memory Space: b8UsrDOVGV.exe PID: 6176JoeSecurity_NjratYara detected NjratJoe Security
              Click to see the 1 entries
              SourceRuleDescriptionAuthorStrings
              0.0.b8UsrDOVGV.exe.4d0000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
                0.0.b8UsrDOVGV.exe.4d0000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
                • 0x64c1:$a1: get_Registry
                • 0x7f02:$a3: Download ERROR
                • 0x81f4:$a5: netsh firewall delete allowedprogram "
                0.0.b8UsrDOVGV.exe.4d0000.0.unpacknjrat1Identify njRatBrian Wallace @botnet_hunter
                • 0x80ea:$a1: netsh firewall add allowedprogram
                • 0x82e4:$b1: [TAP]
                • 0x828a:$b2: & exit
                • 0x8256:$c1: md.exe /k ping 0 & del
                0.0.b8UsrDOVGV.exe.4d0000.0.unpackMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
                • 0x81f4:$s1: netsh firewall delete allowedprogram
                • 0x80ea:$s2: netsh firewall add allowedprogram
                • 0x8254:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
                • 0x7ede:$s4: Execute ERROR
                • 0x7f3e:$s4: Execute ERROR
                • 0x7f02:$s5: Download ERROR
                • 0x829a:$s6: [kl]
                No Sigma rule has matched
                Timestamp:192.168.2.43.126.37.1849740194832814860 01/04/24-15:13:45.957337
                SID:2814860
                Source Port:49740
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849743194832825563 01/04/24-15:14:11.673311
                SID:2825563
                Source Port:49743
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849742194832825564 01/04/24-15:14:08.608083
                SID:2825564
                Source Port:49742
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849742194832825563 01/04/24-15:14:03.015666
                SID:2825563
                Source Port:49742
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849741194832033132 01/04/24-15:13:48.244663
                SID:2033132
                Source Port:49741
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749736194832814856 01/04/24-15:12:39.448191
                SID:2814856
                Source Port:49736
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849738194832814856 01/04/24-15:13:14.155298
                SID:2814856
                Source Port:49738
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849743194832033132 01/04/24-15:14:11.494212
                SID:2033132
                Source Port:49743
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649750194832033132 01/04/24-15:15:39.855430
                SID:2033132
                Source Port:49750
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849739194832814856 01/04/24-15:13:28.577588
                SID:2814856
                Source Port:49739
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849740194832033132 01/04/24-15:13:40.950373
                SID:2033132
                Source Port:49740
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849743194832825564 01/04/24-15:14:16.730036
                SID:2825564
                Source Port:49743
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649750194832825564 01/04/24-15:15:56.542416
                SID:2825564
                Source Port:49750
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849743194832814860 01/04/24-15:14:16.730036
                SID:2814860
                Source Port:49743
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649750194832814860 01/04/24-15:15:56.542416
                SID:2814860
                Source Port:49750
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849742194832814860 01/04/24-15:14:08.608083
                SID:2814860
                Source Port:49742
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849741194832814860 01/04/24-15:13:48.970310
                SID:2814860
                Source Port:49741
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849742194832033132 01/04/24-15:14:02.836622
                SID:2033132
                Source Port:49742
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349747194832814856 01/04/24-15:14:58.014827
                SID:2814856
                Source Port:49747
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.192.93.8649750194832814856 01/04/24-15:15:40.033269
                SID:2814856
                Source Port:49750
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349748194832814856 01/04/24-15:15:05.487001
                SID:2814856
                Source Port:49748
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349749194832814856 01/04/24-15:15:20.162099
                SID:2814856
                Source Port:49749
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749729194832825563 01/04/24-15:12:05.296602
                SID:2825563
                Source Port:49729
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749729194832825564 01/04/24-15:12:35.839196
                SID:2825564
                Source Port:49729
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349746194832033132 01/04/24-15:14:49.647228
                SID:2033132
                Source Port:49746
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349747194832033132 01/04/24-15:14:57.836648
                SID:2033132
                Source Port:49747
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349747194832814860 01/04/24-15:15:03.046282
                SID:2814860
                Source Port:49747
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349748194832033132 01/04/24-15:15:05.306480
                SID:2033132
                Source Port:49748
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849738194832814860 01/04/24-15:13:26.160390
                SID:2814860
                Source Port:49738
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849739194832814860 01/04/24-15:13:38.932867
                SID:2814860
                Source Port:49739
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349748194832814860 01/04/24-15:15:17.718665
                SID:2814860
                Source Port:49748
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349749194832814860 01/04/24-15:15:37.312025
                SID:2814860
                Source Port:49749
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849739194832033132 01/04/24-15:13:28.398406
                SID:2033132
                Source Port:49739
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349749194832033132 01/04/24-15:15:19.981780
                SID:2033132
                Source Port:49749
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849738194832825564 01/04/24-15:13:15.960330
                SID:2825564
                Source Port:49738
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849738194832033132 01/04/24-15:13:13.976690
                SID:2033132
                Source Port:49738
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749736194832825564 01/04/24-15:13:07.761035
                SID:2825564
                Source Port:49736
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349748194832825564 01/04/24-15:15:17.718665
                SID:2825564
                Source Port:49748
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349746194832814860 01/04/24-15:14:55.647132
                SID:2814860
                Source Port:49746
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749729194832814856 01/04/24-15:12:05.296602
                SID:2814856
                Source Port:49729
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749736194832825563 01/04/24-15:12:39.448191
                SID:2825563
                Source Port:49736
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849739194832825564 01/04/24-15:13:34.111420
                SID:2825564
                Source Port:49739
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349744194832814860 01/04/24-15:14:36.089719
                SID:2814860
                Source Port:49744
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349745194832814860 01/04/24-15:14:44.795619
                SID:2814860
                Source Port:49745
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349749194832825564 01/04/24-15:15:37.312025
                SID:2825564
                Source Port:49749
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349745194832033132 01/04/24-15:14:43.446368
                SID:2033132
                Source Port:49745
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349744194832825564 01/04/24-15:14:36.089719
                SID:2825564
                Source Port:49744
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349744194832033132 01/04/24-15:14:27.670241
                SID:2033132
                Source Port:49744
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349744194832825563 01/04/24-15:14:27.850612
                SID:2825563
                Source Port:49744
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349746194832825564 01/04/24-15:14:53.506462
                SID:2825564
                Source Port:49746
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349747194832825564 01/04/24-15:15:01.621207
                SID:2825564
                Source Port:49747
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349746194832825563 01/04/24-15:14:49.825260
                SID:2825563
                Source Port:49746
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349745194832825564 01/04/24-15:14:44.795619
                SID:2825564
                Source Port:49745
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349745194832825563 01/04/24-15:14:43.626690
                SID:2825563
                Source Port:49745
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349746194832814856 01/04/24-15:14:49.825260
                SID:2814856
                Source Port:49746
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849742194832814856 01/04/24-15:14:03.015666
                SID:2814856
                Source Port:49742
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849743194832814856 01/04/24-15:14:11.673311
                SID:2814856
                Source Port:49743
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749729194832814860 01/04/24-15:12:35.839196
                SID:2814860
                Source Port:49729
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349744194832814856 01/04/24-15:14:27.850612
                SID:2814856
                Source Port:49744
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849741194832814856 01/04/24-15:13:48.425581
                SID:2814856
                Source Port:49741
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.418.157.68.7349745194832814856 01/04/24-15:14:43.626690
                SID:2814856
                Source Port:49745
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749729194832033132 01/04/24-15:12:05.116234
                SID:2033132
                Source Port:49729
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749736194832033132 01/04/24-15:12:39.268705
                SID:2033132
                Source Port:49736
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.127.138.5749736194832814860 01/04/24-15:13:11.667134
                SID:2814860
                Source Port:49736
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.43.126.37.1849740194832814856 01/04/24-15:13:41.129967
                SID:2814856
                Source Port:49740
                Destination Port:19483
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: b8UsrDOVGV.exeAvira: detected
                Source: 2.tcp.eu.ngrok.ioAvira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Roaming\Svchost.exeAvira: detection malicious, Label: TR/ATRAPS.Gen
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exeAvira: detection malicious, Label: TR/ATRAPS.Gen
                Source: 00000000.00000000.1618553751.00000000004D2000.00000002.00000001.01000000.00000003.sdmpMalware Configuration Extractor: Njrat {"Host": "2.tcp.eu.ngrok.io", "Port": "19483", "Version": "im523", "Campaign ID": "HacKed", "Install Name": "Svchost.exe", "Install Dir": "AppData"}
                Source: 2.tcp.eu.ngrok.ioVirustotal: Detection: 12%Perma Link
                Source: 2.tcp.eu.ngrok.ioVirustotal: Detection: 12%Perma Link
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exeReversingLabs: Detection: 94%
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exeVirustotal: Detection: 88%Perma Link
                Source: C:\Users\user\AppData\Roaming\Svchost.exeReversingLabs: Detection: 94%
                Source: C:\Users\user\AppData\Roaming\Svchost.exeVirustotal: Detection: 88%Perma Link
                Source: b8UsrDOVGV.exeReversingLabs: Detection: 94%
                Source: b8UsrDOVGV.exeVirustotal: Detection: 88%Perma Link
                Source: Yara matchFile source: b8UsrDOVGV.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.b8UsrDOVGV.exe.4d0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1618553751.00000000004D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4076153599.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: b8UsrDOVGV.exe PID: 6176, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Svchost.exe PID: 6212, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exe, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Svchost.exe, type: DROPPED
                Source: C:\Users\user\AppData\Roaming\Svchost.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exeJoe Sandbox ML: detected
                Source: b8UsrDOVGV.exeJoe Sandbox ML: detected
                Source: b8UsrDOVGV.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
                Source: b8UsrDOVGV.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: b8UsrDOVGV.exe, 00000000.00000000.1618553751.00000000004D2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: autorun.inf
                Source: b8UsrDOVGV.exe, 00000000.00000000.1618553751.00000000004D2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: [autorun]
                Source: b8UsrDOVGV.exe, 00000000.00000002.1685746025.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
                Source: b8UsrDOVGV.exe, 00000000.00000002.1685746025.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
                Source: Svchost.exe, 00000001.00000002.4076153599.0000000002E91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
                Source: Svchost.exe, 00000001.00000002.4076153599.0000000002E91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
                Source: b8UsrDOVGV.exeBinary or memory string: autorun.inf
                Source: b8UsrDOVGV.exeBinary or memory string: [autorun]
                Source: Svchost.exe.0.drBinary or memory string: autorun.inf
                Source: Svchost.exe.0.drBinary or memory string: [autorun]
                Source: 68d7771434a71722449c404baa3e5b31.exe.1.drBinary or memory string: autorun.inf
                Source: 68d7771434a71722449c404baa3e5b31.exe.1.drBinary or memory string: [autorun]

                Networking

                barindex
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49729 -> 3.127.138.57:19483
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49729 -> 3.127.138.57:19483
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49729 -> 3.127.138.57:19483
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49729 -> 3.127.138.57:19483
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49729 -> 3.127.138.57:19483
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49736 -> 3.127.138.57:19483
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49736 -> 3.127.138.57:19483
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49736 -> 3.127.138.57:19483
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49736 -> 3.127.138.57:19483
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49736 -> 3.127.138.57:19483
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49738 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49738 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49738 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49738 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49739 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49739 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49739 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49739 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49740 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49740 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49740 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49741 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49741 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49741 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49742 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49742 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49742 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49742 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49742 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49743 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49743 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49743 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49743 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49743 -> 3.126.37.18:19483
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49744 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49744 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49744 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49744 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49744 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49745 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49745 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49745 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49745 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49745 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49746 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49746 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49746 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49746 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49746 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49747 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49747 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49747 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49747 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49748 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49748 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49748 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49748 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49749 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49749 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49749 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49749 -> 18.157.68.73:19483
                Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49750 -> 18.192.93.86:19483
                Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.4:49750 -> 18.192.93.86:19483
                Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49750 -> 18.192.93.86:19483
                Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49750 -> 18.192.93.86:19483
                Source: C:\Users\user\AppData\Roaming\Svchost.exeNetwork Connect: 3.127.138.57 19483Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeNetwork Connect: 3.126.37.18 19483Jump to behavior
                Source: Malware configuration extractorURLs: 2.tcp.eu.ngrok.io
                Source: global trafficTCP traffic: 3.127.138.57 ports 19483,1,3,4,8,9
                Source: global trafficTCP traffic: 18.192.93.86 ports 19483,1,3,4,8,9
                Source: global trafficTCP traffic: 3.126.37.18 ports 19483,1,3,4,8,9
                Source: global trafficTCP traffic: 18.157.68.73 ports 19483,1,3,4,8,9
                Source: global trafficTCP traffic: 192.168.2.4:49729 -> 3.127.138.57:19483
                Source: global trafficTCP traffic: 192.168.2.4:49738 -> 3.126.37.18:19483
                Source: global trafficTCP traffic: 192.168.2.4:49744 -> 18.157.68.73:19483
                Source: global trafficTCP traffic: 192.168.2.4:49750 -> 18.192.93.86:19483
                Source: Joe Sandbox ViewIP Address: 3.127.138.57 3.127.138.57
                Source: Joe Sandbox ViewIP Address: 3.126.37.18 3.126.37.18
                Source: Joe Sandbox ViewIP Address: 18.192.93.86 18.192.93.86
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownDNS traffic detected: queries for: 2.tcp.eu.ngrok.io
                Source: Svchost.exe, 00000001.00000002.4075353687.000000000086C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.
                Source: Svchost.exe, 00000001.00000002.4075353687.000000000086C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.LinkId=42127
                Source: b8UsrDOVGV.exe, Svchost.exe.0.dr, 68d7771434a71722449c404baa3e5b31.exe.1.drString found in binary or memory: https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: b8UsrDOVGV.exe, kl.cs.Net Code: VKCodeToUnicode
                Source: Svchost.exe.0.dr, kl.cs.Net Code: VKCodeToUnicode
                Source: 68d7771434a71722449c404baa3e5b31.exe.1.dr, kl.cs.Net Code: VKCodeToUnicode

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: b8UsrDOVGV.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.b8UsrDOVGV.exe.4d0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1618553751.00000000004D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4076153599.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: b8UsrDOVGV.exe PID: 6176, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Svchost.exe PID: 6212, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exe, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Svchost.exe, type: DROPPED

                System Summary

                barindex
                Source: b8UsrDOVGV.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: b8UsrDOVGV.exe, type: SAMPLEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: b8UsrDOVGV.exe, type: SAMPLEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: 0.0.b8UsrDOVGV.exe.4d0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: 0.0.b8UsrDOVGV.exe.4d0000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: 0.0.b8UsrDOVGV.exe.4d0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: 00000000.00000000.1618553751.00000000004D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: 00000000.00000000.1618553751.00000000004D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: C:\Users\user\AppData\Roaming\Svchost.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: C:\Users\user\AppData\Roaming\Svchost.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: C:\Users\user\AppData\Roaming\Svchost.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\AppData\Roaming\Svchost.exeCode function: 1_2_027BB836 NtQuerySystemInformation,1_2_027BB836
                Source: C:\Users\user\AppData\Roaming\Svchost.exeCode function: 1_2_027BB7FB NtQuerySystemInformation,1_2_027BB7FB
                Source: b8UsrDOVGV.exe, 00000000.00000002.1685380219.0000000000A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs b8UsrDOVGV.exe
                Source: b8UsrDOVGV.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: b8UsrDOVGV.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: b8UsrDOVGV.exe, type: SAMPLEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: b8UsrDOVGV.exe, type: SAMPLEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: 0.0.b8UsrDOVGV.exe.4d0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: 0.0.b8UsrDOVGV.exe.4d0000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: 0.0.b8UsrDOVGV.exe.4d0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: 00000000.00000000.1618553751.00000000004D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: 00000000.00000000.1618553751.00000000004D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: C:\Users\user\AppData\Roaming\Svchost.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: C:\Users\user\AppData\Roaming\Svchost.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: C:\Users\user\AppData\Roaming\Svchost.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@9/7@4/4
                Source: C:\Users\user\AppData\Roaming\Svchost.exeCode function: 1_2_027BB5F6 AdjustTokenPrivileges,1_2_027BB5F6
                Source: C:\Users\user\AppData\Roaming\Svchost.exeCode function: 1_2_027BB5BF AdjustTokenPrivileges,1_2_027BB5BF
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeFile created: C:\Users\user\AppData\Roaming\Svchost.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3468:120:WilError_03
                Source: C:\Users\user\AppData\Roaming\Svchost.exeMutant created: \Sessions\1\BaseNamedObjects\68d7771434a71722449c404baa3e5b31
                Source: b8UsrDOVGV.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: b8UsrDOVGV.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: b8UsrDOVGV.exeReversingLabs: Detection: 94%
                Source: b8UsrDOVGV.exeVirustotal: Detection: 88%
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeFile read: C:\Users\user\Desktop\b8UsrDOVGV.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\b8UsrDOVGV.exe C:\Users\user\Desktop\b8UsrDOVGV.exe
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess created: C:\Users\user\AppData\Roaming\Svchost.exe "C:\Users\user\AppData\Roaming\Svchost.exe"
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\Svchost.exe" "Svchost.exe" ENABLE
                Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\Svchost.exe "C:\Users\user\AppData\Roaming\Svchost.exe" ..
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\Svchost.exe "C:\Users\user\AppData\Roaming\Svchost.exe" ..
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\Svchost.exe "C:\Users\user\AppData\Roaming\Svchost.exe" ..
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess created: C:\Users\user\AppData\Roaming\Svchost.exe "C:\Users\user\AppData\Roaming\Svchost.exe" Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\Svchost.exe" "Svchost.exe" ENABLEJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
                Source: b8UsrDOVGV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
                Source: b8UsrDOVGV.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: b8UsrDOVGV.exe, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                Source: Svchost.exe.0.dr, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                Source: 68d7771434a71722449c404baa3e5b31.exe.1.dr, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])

                Persistence and Installation Behavior

                barindex
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeFile created: C:\Users\user\AppData\Roaming\Svchost.exeJump to dropped file
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeFile created: C:\Users\user\AppData\Roaming\Svchost.exeJump to dropped file
                Source: C:\Users\user\AppData\Roaming\Svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\AppData\Roaming\Svchost.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 68d7771434a71722449c404baa3e5b31Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exeJump to dropped file
                Source: C:\Users\user\AppData\Roaming\Svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exe\:Zone.Identifier:$DATAJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 68d7771434a71722449c404baa3e5b31Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 68d7771434a71722449c404baa3e5b31Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 68d7771434a71722449c404baa3e5b31Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 68d7771434a71722449c404baa3e5b31Jump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeWindow / User API: threadDelayed 593Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeWindow / User API: threadDelayed 3211Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeWindow / User API: threadDelayed 4631Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeWindow / User API: foregroundWindowGot 432Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeWindow / User API: foregroundWindowGot 1272Jump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exe TID: 6412Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exe TID: 4480Thread sleep count: 593 > 30Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exe TID: 4480Thread sleep time: -593000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exe TID: 5316Thread sleep count: 3211 > 30Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exe TID: 4480Thread sleep count: 4631 > 30Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exe TID: 4480Thread sleep time: -4631000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exe TID: 6412Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exe TID: 6504Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exe TID: 6788Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: Svchost.exe, 00000001.00000002.4075353687.000000000086C000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000003.00000003.1751114243.0000000000821000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\AppData\Roaming\Svchost.exeNetwork Connect: 3.127.138.57 19483Jump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeNetwork Connect: 3.126.37.18 19483Jump to behavior
                Source: b8UsrDOVGV.exe, kl.csReference to suspicious API methods: MapVirtualKey(a, 0u)
                Source: b8UsrDOVGV.exe, kl.csReference to suspicious API methods: GetAsyncKeyState(num2)
                Source: b8UsrDOVGV.exe, OK.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, 100, ref lpszVer, 100)
                Source: C:\Users\user\Desktop\b8UsrDOVGV.exeProcess created: C:\Users\user\AppData\Roaming\Svchost.exe "C:\Users\user\AppData\Roaming\Svchost.exe" Jump to behavior
                Source: Svchost.exe, 00000001.00000002.4076153599.00000000031DF000.00000004.00000800.00020000.00000000.sdmp, Svchost.exe, 00000001.00000002.4076153599.00000000031A9000.00000004.00000800.00020000.00000000.sdmp, Svchost.exe, 00000001.00000002.4076153599.000000000332F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: Svchost.exe, 00000001.00000002.4075353687.000000000086C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Rh Program Manager
                Source: Svchost.exe, 00000001.00000002.4076153599.00000000031DF000.00000004.00000800.00020000.00000000.sdmp, Svchost.exe, 00000001.00000002.4076153599.00000000031A9000.00000004.00000800.00020000.00000000.sdmp, Svchost.exe, 00000001.00000002.4076153599.000000000332F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.
                Source: Svchost.exe, 00000001.00000002.4076153599.00000000031DF000.00000004.00000800.00020000.00000000.sdmp, Svchost.exe, 00000001.00000002.4076153599.0000000002E91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program manager
                Source: Svchost.exe, 00000001.00000002.4076153599.00000000031DF000.00000004.00000800.00020000.00000000.sdmp, Svchost.exe, 00000001.00000002.4076153599.000000000332F000.00000004.00000800.00020000.00000000.sdmp, Svchost.exe, 00000001.00000002.4076153599.0000000003074000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@9
                Source: C:\Users\user\AppData\Roaming\Svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Lowering of HIPS / PFW / Operating System Security Settings

                barindex
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\Svchost.exe" "Svchost.exe" ENABLE
                Source: C:\Users\user\AppData\Roaming\Svchost.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\Svchost.exe" "Svchost.exe" ENABLE

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: b8UsrDOVGV.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.b8UsrDOVGV.exe.4d0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1618553751.00000000004D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4076153599.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: b8UsrDOVGV.exe PID: 6176, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Svchost.exe PID: 6212, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exe, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Svchost.exe, type: DROPPED

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: b8UsrDOVGV.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.b8UsrDOVGV.exe.4d0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1618553751.00000000004D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.4076153599.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: b8UsrDOVGV.exe PID: 6176, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Svchost.exe PID: 6212, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exe, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Svchost.exe, type: DROPPED
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
                1
                Replication Through Removable Media
                1
                Native API
                221
                Registry Run Keys / Startup Folder
                1
                Access Token Manipulation
                11
                Masquerading
                1
                Input Capture
                11
                Security Software Discovery
                1
                Replication Through Removable Media
                1
                Input Capture
                Exfiltration Over Other Network Medium1
                Non-Standard Port
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
                Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts112
                Process Injection
                21
                Disable or Modify Tools
                LSASS Memory2
                Process Discovery
                Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                Non-Application Layer Protocol
                SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
                Domain AccountsAtLogon Script (Windows)221
                Registry Run Keys / Startup Folder
                21
                Virtualization/Sandbox Evasion
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration11
                Application Layer Protocol
                Data Encrypted for ImpactDNS ServerEmail Addresses
                Local AccountsCronLogin HookLogin Hook1
                Access Token Manipulation
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput CaptureTraffic DuplicationProtocol ImpersonationData DestructionVirtual Private ServerEmployee Names
                Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script112
                Process Injection
                LSA Secrets1
                Peripheral Device Discovery
                SSHKeyloggingScheduled TransferFallback ChannelsData Encrypted for ImpactServerGather Victim Network Information
                Replication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Software Packing
                Cached Domain Credentials1
                File and Directory Discovery
                VNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
                External Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync12
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1369814 Sample: b8UsrDOVGV.exe Startdate: 04/01/2024 Architecture: WINDOWS Score: 100 32 2.tcp.eu.ngrok.io 2->32 40 Snort IDS alert for network traffic 2->40 42 Multi AV Scanner detection for domain / URL 2->42 44 Found malware configuration 2->44 46 14 other signatures 2->46 9 b8UsrDOVGV.exe 1 6 2->9         started        13 Svchost.exe 3 2->13         started        15 Svchost.exe 2 2->15         started        17 Svchost.exe 2 2->17         started        signatures3 process4 file5 30 C:\Users\user\AppData\Roaming\Svchost.exe, PE32 9->30 dropped 56 Drops PE files with benign system names 9->56 19 Svchost.exe 2 6 9->19         started        signatures6 process7 dnsIp8 34 18.157.68.73, 19483, 49744, 49745 AMAZON-02US United States 19->34 36 18.192.93.86, 19483, 49750 AMAZON-02US United States 19->36 38 2 other IPs or domains 19->38 28 C:\...\68d7771434a71722449c404baa3e5b31.exe, PE32 19->28 dropped 48 Antivirus detection for dropped file 19->48 50 System process connects to network (likely due to code injection or exploit) 19->50 52 Multi AV Scanner detection for dropped file 19->52 54 5 other signatures 19->54 24 netsh.exe 2 19->24         started        file9 signatures10 process11 process12 26 conhost.exe 24->26         started       

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                b8UsrDOVGV.exe94%ReversingLabsByteCode-MSIL.Backdoor.Ratenjay
                b8UsrDOVGV.exe100%AviraTR/ATRAPS.Gen
                b8UsrDOVGV.exe100%Joe Sandbox ML
                b8UsrDOVGV.exe88%VirustotalBrowse
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\Svchost.exe100%AviraTR/ATRAPS.Gen
                C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exe100%AviraTR/ATRAPS.Gen
                C:\Users\user\AppData\Roaming\Svchost.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exe94%ReversingLabsByteCode-MSIL.Backdoor.Ratenjay
                C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exe88%VirustotalBrowse
                C:\Users\user\AppData\Roaming\Svchost.exe94%ReversingLabsByteCode-MSIL.Backdoor.Ratenjay
                C:\Users\user\AppData\Roaming\Svchost.exe88%VirustotalBrowse
                No Antivirus matches
                SourceDetectionScannerLabelLink
                2.tcp.eu.ngrok.io12%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://go.microsoft.LinkId=421270%Avira URL Cloudsafe
                2.tcp.eu.ngrok.io100%Avira URL Cloudmalware
                http://go.microsoft.0%Avira URL Cloudsafe
                http://go.microsoft.0%VirustotalBrowse
                2.tcp.eu.ngrok.io12%VirustotalBrowse
                NameIPActiveMaliciousAntivirus DetectionReputation
                2.tcp.eu.ngrok.io
                3.127.138.57
                truetrueunknown
                NameMaliciousAntivirus DetectionReputation
                2.tcp.eu.ngrok.iotrue
                • 12%, Virustotal, Browse
                • Avira URL Cloud: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://go.microsoft.Svchost.exe, 00000001.00000002.4075353687.000000000086C000.00000004.00000020.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0b8UsrDOVGV.exe, Svchost.exe.0.dr, 68d7771434a71722449c404baa3e5b31.exe.1.drfalse
                  high
                  http://go.microsoft.LinkId=42127Svchost.exe, 00000001.00000002.4075353687.000000000086C000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  3.127.138.57
                  2.tcp.eu.ngrok.ioUnited States
                  16509AMAZON-02UStrue
                  3.126.37.18
                  unknownUnited States
                  16509AMAZON-02UStrue
                  18.192.93.86
                  unknownUnited States
                  16509AMAZON-02UStrue
                  18.157.68.73
                  unknownUnited States
                  16509AMAZON-02UStrue
                  Joe Sandbox version:38.0.0 Ammolite
                  Analysis ID:1369814
                  Start date and time:2024-01-04 15:11:03 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 7m 22s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:12
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:b8UsrDOVGV.exe
                  renamed because original name is a hash value
                  Original Sample Name:b7dd9dd7470af783d5d955b455d58cac.exe
                  Detection:MAL
                  Classification:mal100.troj.adwa.spyw.evad.winEXE@9/7@4/4
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 99%
                  • Number of executed functions: 165
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  14:12:05AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run 68d7771434a71722449c404baa3e5b31 "C:\Users\user\AppData\Roaming\Svchost.exe" ..
                  14:12:13AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run 68d7771434a71722449c404baa3e5b31 "C:\Users\user\AppData\Roaming\Svchost.exe" ..
                  14:12:23AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run 68d7771434a71722449c404baa3e5b31 "C:\Users\user\AppData\Roaming\Svchost.exe" ..
                  14:12:31AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exe
                  15:12:34API Interceptor189963x Sleep call for process: Svchost.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  3.127.138.572G8CgDVl3K.exeGet hashmaliciousNjratBrowse
                    tiodtk2cfy.exeGet hashmaliciousNjratBrowse
                      QUuUm3J8x3.exeGet hashmaliciousNjratBrowse
                        RWqHoCWEPI.exeGet hashmaliciousNjratBrowse
                          OUXkIxeP6k.exeGet hashmaliciousNjratBrowse
                            eI43OwXSvq.exeGet hashmaliciousNjratBrowse
                              i9z1c1OtFb.exeGet hashmaliciousNjratBrowse
                                JYGc3o49WE.exeGet hashmaliciousNjratBrowse
                                  J6VIiRgq3w.exeGet hashmaliciousNjratBrowse
                                    7JdbeSrZ6s.exeGet hashmaliciousNjratBrowse
                                      KcWQQO3nZP.exeGet hashmaliciousNjratBrowse
                                        zep8vTa4sg.exeGet hashmaliciousNjratBrowse
                                          umyExrpkSF.exeGet hashmaliciousNjratBrowse
                                            QBEgLAO40T.exeGet hashmaliciousNjratBrowse
                                              4KWKhZNy9w.exeGet hashmaliciousNjratBrowse
                                                yPGBUzqVE3.exeGet hashmaliciousNjratBrowse
                                                  D02E3399D85D6B14B30F440181EF5B8FE6B55C403B8C7.exeGet hashmaliciousnjRatBrowse
                                                    2dZGR4PTLu.exeGet hashmaliciousNjratBrowse
                                                      LMva1J8Xkv.exeGet hashmaliciousNjratBrowse
                                                        XlNjZS4E8x.exeGet hashmaliciousNjratBrowse
                                                          3.126.37.18tiodtk2cfy.exeGet hashmaliciousNjratBrowse
                                                            pQBmVoyRnw.exeGet hashmaliciousNjratBrowse
                                                              NezbdhNgwG.exeGet hashmaliciousNjratBrowse
                                                                xdPdkPMD8u.exeGet hashmaliciousNjratBrowse
                                                                  VBUXm77rfL.exeGet hashmaliciousNjratBrowse
                                                                    gEuhLHV0.posh.ps1Get hashmaliciousMetasploitBrowse
                                                                      MibKbjH4.posh.ps1Get hashmaliciousUnknownBrowse
                                                                        kXghM8bJcm.exeGet hashmaliciousNjratBrowse
                                                                          OUXkIxeP6k.exeGet hashmaliciousNjratBrowse
                                                                            eI43OwXSvq.exeGet hashmaliciousNjratBrowse
                                                                              p0zYXkMETE.exeGet hashmaliciousNjratBrowse
                                                                                i9z1c1OtFb.exeGet hashmaliciousNjratBrowse
                                                                                  7XyFhq6BDj.exeGet hashmaliciousNjratBrowse
                                                                                    JYGc3o49WE.exeGet hashmaliciousNjratBrowse
                                                                                      J6VIiRgq3w.exeGet hashmaliciousNjratBrowse
                                                                                        cTUu5Po5Hy.exeGet hashmaliciousNjratBrowse
                                                                                          KcWQQO3nZP.exeGet hashmaliciousNjratBrowse
                                                                                            zep8vTa4sg.exeGet hashmaliciousNjratBrowse
                                                                                              u1LwUkKDIF.exeGet hashmaliciousNjratBrowse
                                                                                                QBEgLAO40T.exeGet hashmaliciousNjratBrowse
                                                                                                  18.192.93.86P90GT_Invoice_Related_Property_Tax_P800.exeGet hashmaliciousRedLineBrowse
                                                                                                  • 2.tcp.eu.ngrok.io:17685/
                                                                                                  http://www.sdrclm.cn/vendor/phpdocumentor/P800/P90GT_Invoice_Related_Property_Tax_P800.exeGet hashmaliciousRedLineBrowse
                                                                                                  • 2.tcp.eu.ngrok.io:17685/
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  2.tcp.eu.ngrok.io2G8CgDVl3K.exeGet hashmaliciousNjratBrowse
                                                                                                  • 18.197.239.5
                                                                                                  BHp5Is5Xe7.exeGet hashmaliciousNjratBrowse
                                                                                                  • 18.192.93.86
                                                                                                  tiodtk2cfy.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.127.138.57
                                                                                                  QUuUm3J8x3.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.127.138.57
                                                                                                  81Rz15POL6.exeGet hashmaliciousNjratBrowse
                                                                                                  • 18.157.68.73
                                                                                                  649DB66A36E095B16832637A31D3CCC75040C5A6C23F6.exeGet hashmaliciousNjratBrowse
                                                                                                  • 18.156.13.209
                                                                                                  pQBmVoyRnw.exeGet hashmaliciousNjratBrowse
                                                                                                  • 18.156.13.209
                                                                                                  RWqHoCWEPI.exeGet hashmaliciousNjratBrowse
                                                                                                  • 18.192.93.86
                                                                                                  EB4B6878310B1E2843C964E02EC1782AACB518E32777A.exeGet hashmaliciousNjratBrowse
                                                                                                  • 18.192.93.86
                                                                                                  NezbdhNgwG.exeGet hashmaliciousNjratBrowse
                                                                                                  • 18.192.93.86
                                                                                                  xdPdkPMD8u.exeGet hashmaliciousNjratBrowse
                                                                                                  • 18.192.93.86
                                                                                                  VBUXm77rfL.exeGet hashmaliciousNjratBrowse
                                                                                                  • 18.192.93.86
                                                                                                  1UGdjTlX5v.exeGet hashmaliciousNjratBrowse
                                                                                                  • 18.157.68.73
                                                                                                  kXghM8bJcm.exeGet hashmaliciousNjratBrowse
                                                                                                  • 18.192.93.86
                                                                                                  OUXkIxeP6k.exeGet hashmaliciousNjratBrowse
                                                                                                  • 3.126.37.18
                                                                                                  QzzmZiGinp.exeGet hashmaliciousNjratBrowse
                                                                                                  • 18.156.13.209
                                                                                                  eI43OwXSvq.exeGet hashmaliciousNjratBrowse
                                                                                                  • 18.197.239.5
                                                                                                  p0zYXkMETE.exeGet hashmaliciousNjratBrowse
                                                                                                  • 18.157.68.73
                                                                                                  i9z1c1OtFb.exeGet hashmaliciousNjratBrowse
                                                                                                  • 18.157.68.73
                                                                                                  aF73k2XwGj.exeGet hashmaliciousNjratBrowse
                                                                                                  • 18.192.93.86
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  AMAZON-02UShttps://trustwallet-com-crypto-wallet-case479958.ihrebildsache.deGet hashmaliciousPhisherBrowse
                                                                                                  • 52.9.109.18
                                                                                                  http://kineticwing.com/Get hashmaliciousUnknownBrowse
                                                                                                  • 99.84.191.77
                                                                                                  https://southportland.org/Get hashmaliciousUnknownBrowse
                                                                                                  • 52.85.132.116
                                                                                                  28UlG1fA5p.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 52.53.164.79
                                                                                                  RTxhQMyj5e.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 35.176.86.232
                                                                                                  i4ykIbKq4o.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 34.243.160.129
                                                                                                  SecuriteInfo.com.Linux.Siggen.9999.13374.4326.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 63.34.86.27
                                                                                                  SecuriteInfo.com.Linux.Siggen.9999.15798.13010.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 108.143.162.137
                                                                                                  SecuriteInfo.com.Linux.Siggen.9999.3670.17870.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 13.245.148.174
                                                                                                  DRcqrj4ODx.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 44.224.37.47
                                                                                                  sora.x86.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 18.139.80.246
                                                                                                  https://visit.trendmicro.com/OTQ1LUNYRC0wNjIAAAGQcpE819P35oo_d8Na5sCdj8SAIQiHwPzmvlK-8uQUTtJKerOjWaY_pmXItmUGTjv7M9HV3e4=Get hashmaliciousUnknownBrowse
                                                                                                  • 108.139.29.80
                                                                                                  Rakitin.x86.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 108.150.4.169
                                                                                                  Rakitin.arm5.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 108.131.163.62
                                                                                                  MDE_File_Sample_87ad0936c403d0ddfbceff0fa4e6c681c37cf072.zipGet hashmaliciousUnknownBrowse
                                                                                                  • 34.209.123.191
                                                                                                  SecuriteInfo.com.Trojan.Linux.Gafgyt.16218.4940.elfGet hashmaliciousUnknownBrowse
                                                                                                  • 54.171.230.55
                                                                                                  http://xei.aloviec.com/?dD1jJmQ9MjIwMzcmbD01NTMxJmM9MTg1NTUyJmF1PTA=Get hashmaliciousPhisherBrowse
                                                                                                  • 52.85.150.29
                                                                                                  ZC0CVbfY1v.exeGet hashmaliciousGlupteba, Petite Virus, RedLine, SmokeLoader, StealcBrowse
                                                                                                  • 52.217.88.132
                                                                                                  6TBdUvQH7L.exeGet hashmaliciousGlupteba, Petite Virus, RedLine, SmokeLoader, StealcBrowse
                                                                                                  • 52.216.92.203
                                                                                                  L5KPHu6Vfn.exeGet hashmaliciousLummaC, Petite Virus, Quasar, RedLine, SmokeLoader, Stealc, VidarBrowse
                                                                                                  • 104.192.141.1
                                                                                                  AMAZON-02UShttps://trustwallet-com-crypto-wallet-case479958.ihrebildsache.deGet hashmaliciousPhisherBrowse
                                                                                                  • 52.9.109.18
                                                                                                  http://kineticwing.com/Get hashmaliciousUnknownBrowse
                                                                                                  • 99.84.191.77
                                                                                                  https://southportland.org/Get hashmaliciousUnknownBrowse
                                                                                                  • 52.85.132.116
                                                                                                  28UlG1fA5p.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 52.53.164.79
                                                                                                  RTxhQMyj5e.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 35.176.86.232
                                                                                                  i4ykIbKq4o.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 34.243.160.129
                                                                                                  SecuriteInfo.com.Linux.Siggen.9999.13374.4326.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 63.34.86.27
                                                                                                  SecuriteInfo.com.Linux.Siggen.9999.15798.13010.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 108.143.162.137
                                                                                                  SecuriteInfo.com.Linux.Siggen.9999.3670.17870.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 13.245.148.174
                                                                                                  DRcqrj4ODx.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 44.224.37.47
                                                                                                  sora.x86.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 18.139.80.246
                                                                                                  https://visit.trendmicro.com/OTQ1LUNYRC0wNjIAAAGQcpE819P35oo_d8Na5sCdj8SAIQiHwPzmvlK-8uQUTtJKerOjWaY_pmXItmUGTjv7M9HV3e4=Get hashmaliciousUnknownBrowse
                                                                                                  • 108.139.29.80
                                                                                                  Rakitin.x86.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 108.150.4.169
                                                                                                  Rakitin.arm5.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 108.131.163.62
                                                                                                  MDE_File_Sample_87ad0936c403d0ddfbceff0fa4e6c681c37cf072.zipGet hashmaliciousUnknownBrowse
                                                                                                  • 34.209.123.191
                                                                                                  SecuriteInfo.com.Trojan.Linux.Gafgyt.16218.4940.elfGet hashmaliciousUnknownBrowse
                                                                                                  • 54.171.230.55
                                                                                                  http://xei.aloviec.com/?dD1jJmQ9MjIwMzcmbD01NTMxJmM9MTg1NTUyJmF1PTA=Get hashmaliciousPhisherBrowse
                                                                                                  • 52.85.150.29
                                                                                                  ZC0CVbfY1v.exeGet hashmaliciousGlupteba, Petite Virus, RedLine, SmokeLoader, StealcBrowse
                                                                                                  • 52.217.88.132
                                                                                                  6TBdUvQH7L.exeGet hashmaliciousGlupteba, Petite Virus, RedLine, SmokeLoader, StealcBrowse
                                                                                                  • 52.216.92.203
                                                                                                  L5KPHu6Vfn.exeGet hashmaliciousLummaC, Petite Virus, Quasar, RedLine, SmokeLoader, Stealc, VidarBrowse
                                                                                                  • 104.192.141.1
                                                                                                  AMAZON-02UShttps://trustwallet-com-crypto-wallet-case479958.ihrebildsache.deGet hashmaliciousPhisherBrowse
                                                                                                  • 52.9.109.18
                                                                                                  http://kineticwing.com/Get hashmaliciousUnknownBrowse
                                                                                                  • 99.84.191.77
                                                                                                  https://southportland.org/Get hashmaliciousUnknownBrowse
                                                                                                  • 52.85.132.116
                                                                                                  28UlG1fA5p.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 52.53.164.79
                                                                                                  RTxhQMyj5e.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 35.176.86.232
                                                                                                  i4ykIbKq4o.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 34.243.160.129
                                                                                                  SecuriteInfo.com.Linux.Siggen.9999.13374.4326.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 63.34.86.27
                                                                                                  SecuriteInfo.com.Linux.Siggen.9999.15798.13010.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 108.143.162.137
                                                                                                  SecuriteInfo.com.Linux.Siggen.9999.3670.17870.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 13.245.148.174
                                                                                                  DRcqrj4ODx.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 44.224.37.47
                                                                                                  sora.x86.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 18.139.80.246
                                                                                                  https://visit.trendmicro.com/OTQ1LUNYRC0wNjIAAAGQcpE819P35oo_d8Na5sCdj8SAIQiHwPzmvlK-8uQUTtJKerOjWaY_pmXItmUGTjv7M9HV3e4=Get hashmaliciousUnknownBrowse
                                                                                                  • 108.139.29.80
                                                                                                  Rakitin.x86.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 108.150.4.169
                                                                                                  Rakitin.arm5.elfGet hashmaliciousMiraiBrowse
                                                                                                  • 108.131.163.62
                                                                                                  MDE_File_Sample_87ad0936c403d0ddfbceff0fa4e6c681c37cf072.zipGet hashmaliciousUnknownBrowse
                                                                                                  • 34.209.123.191
                                                                                                  SecuriteInfo.com.Trojan.Linux.Gafgyt.16218.4940.elfGet hashmaliciousUnknownBrowse
                                                                                                  • 54.171.230.55
                                                                                                  http://xei.aloviec.com/?dD1jJmQ9MjIwMzcmbD01NTMxJmM9MTg1NTUyJmF1PTA=Get hashmaliciousPhisherBrowse
                                                                                                  • 52.85.150.29
                                                                                                  ZC0CVbfY1v.exeGet hashmaliciousGlupteba, Petite Virus, RedLine, SmokeLoader, StealcBrowse
                                                                                                  • 52.217.88.132
                                                                                                  6TBdUvQH7L.exeGet hashmaliciousGlupteba, Petite Virus, RedLine, SmokeLoader, StealcBrowse
                                                                                                  • 52.216.92.203
                                                                                                  L5KPHu6Vfn.exeGet hashmaliciousLummaC, Petite Virus, Quasar, RedLine, SmokeLoader, Stealc, VidarBrowse
                                                                                                  • 104.192.141.1
                                                                                                  No context
                                                                                                  No context
                                                                                                  Process:C:\Users\user\AppData\Roaming\Svchost.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):525
                                                                                                  Entropy (8bit):5.259753436570609
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                                                                                  MD5:260E01CC001F9C4643CA7A62F395D747
                                                                                                  SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                                                                                  SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                                                                                  SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                                                                                  Malicious:false
                                                                                                  Reputation:moderate, very likely benign file
                                                                                                  Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                                                                                  Process:C:\Users\user\Desktop\b8UsrDOVGV.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:modified
                                                                                                  Size (bytes):525
                                                                                                  Entropy (8bit):5.259753436570609
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                                                                                  MD5:260E01CC001F9C4643CA7A62F395D747
                                                                                                  SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                                                                                  SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                                                                                  SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                                                                                  Malicious:false
                                                                                                  Reputation:moderate, very likely benign file
                                                                                                  Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                                                                                  Process:C:\Users\user\AppData\Roaming\Svchost.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):37888
                                                                                                  Entropy (8bit):5.57438645066409
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:384:zLe2KMizd9jnBhFbJ8ycPVnvvnwaUBTrAF+rMRTyN/0L+EcoinblneHQM3epzXQD:W2g9lLJfcPVn3VU9rM+rMRa8Nu2Bt
                                                                                                  MD5:B7DD9DD7470AF783D5D955B455D58CAC
                                                                                                  SHA1:BBD0C1D74C948E95F5F007102FBABCF3867A2625
                                                                                                  SHA-256:8D1BFBE0D300231CF7892A9BE51258A77F52A85EAC045CB42A64B357702C0C5F
                                                                                                  SHA-512:AF2CEC43EA98A7E2C139C1433C4DBCF35DDEBC3F70AA8520F64C7096A6F6844F8021CBD22FA4BF46AE4961BE1972CA45407B15C1596770FAD5CB41C5860FB512
                                                                                                  Malicious:true
                                                                                                  Yara Hits:
                                                                                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exe, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exe, Author: unknown
                                                                                                  • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exe, Author: Brian Wallace @botnet_hunter
                                                                                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\68d7771434a71722449c404baa3e5b31.exe, Author: ditekSHen
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 94%
                                                                                                  • Antivirus: Virustotal, Detection: 88%, Browse
                                                                                                  Reputation:low
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H.e................................ ........@.. ....................................@.................................t...W.......@............................................................................ ............... ..H............text....... ...................... ..`.rsrc...@...........................@..@.reloc..............................@..B........................H........e...E..........................................................&.(......**..(......*.s.........s.........s.........s..........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                                                                                  Process:C:\Users\user\AppData\Roaming\Svchost.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):26
                                                                                                  Entropy (8bit):3.95006375643621
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:ggPYV:rPYV
                                                                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                  Malicious:false
                                                                                                  Reputation:high, very likely benign file
                                                                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                                                                  Process:C:\Users\user\Desktop\b8UsrDOVGV.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):37888
                                                                                                  Entropy (8bit):5.57438645066409
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:384:zLe2KMizd9jnBhFbJ8ycPVnvvnwaUBTrAF+rMRTyN/0L+EcoinblneHQM3epzXQD:W2g9lLJfcPVn3VU9rM+rMRa8Nu2Bt
                                                                                                  MD5:B7DD9DD7470AF783D5D955B455D58CAC
                                                                                                  SHA1:BBD0C1D74C948E95F5F007102FBABCF3867A2625
                                                                                                  SHA-256:8D1BFBE0D300231CF7892A9BE51258A77F52A85EAC045CB42A64B357702C0C5F
                                                                                                  SHA-512:AF2CEC43EA98A7E2C139C1433C4DBCF35DDEBC3F70AA8520F64C7096A6F6844F8021CBD22FA4BF46AE4961BE1972CA45407B15C1596770FAD5CB41C5860FB512
                                                                                                  Malicious:true
                                                                                                  Yara Hits:
                                                                                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Svchost.exe, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Svchost.exe, Author: unknown
                                                                                                  • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Roaming\Svchost.exe, Author: Brian Wallace @botnet_hunter
                                                                                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Svchost.exe, Author: ditekSHen
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 94%
                                                                                                  • Antivirus: Virustotal, Detection: 88%, Browse
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H.e................................ ........@.. ....................................@.................................t...W.......@............................................................................ ............... ..H............text....... ...................... ..`.rsrc...@...........................@..@.reloc..............................@..B........................H........e...E..........................................................&.(......**..(......*.s.........s.........s.........s..........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                                                                                  Process:C:\Users\user\Desktop\b8UsrDOVGV.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):26
                                                                                                  Entropy (8bit):3.95006375643621
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:ggPYV:rPYV
                                                                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                  Malicious:false
                                                                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                                                                  Process:C:\Windows\SysWOW64\netsh.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):313
                                                                                                  Entropy (8bit):4.971939296804078
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
                                                                                                  MD5:689E2126A85BF55121488295EE068FA1
                                                                                                  SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
                                                                                                  SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
                                                                                                  SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
                                                                                                  Malicious:false
                                                                                                  Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
                                                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Entropy (8bit):5.57438645066409
                                                                                                  TrID:
                                                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                  • Windows Screen Saver (13104/52) 0.07%
                                                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                  File name:b8UsrDOVGV.exe
                                                                                                  File size:37'888 bytes
                                                                                                  MD5:b7dd9dd7470af783d5d955b455d58cac
                                                                                                  SHA1:bbd0c1d74c948e95f5f007102fbabcf3867a2625
                                                                                                  SHA256:8d1bfbe0d300231cf7892a9be51258a77f52a85eac045cb42a64b357702c0c5f
                                                                                                  SHA512:af2cec43ea98a7e2c139c1433c4dbcf35ddebc3f70aa8520f64c7096a6f6844f8021cbd22fa4bf46ae4961be1972ca45407b15c1596770fad5cb41c5860fb512
                                                                                                  SSDEEP:384:zLe2KMizd9jnBhFbJ8ycPVnvvnwaUBTrAF+rMRTyN/0L+EcoinblneHQM3epzXQD:W2g9lLJfcPVn3VU9rM+rMRa8Nu2Bt
                                                                                                  TLSH:B2032B8D7FE18168C5FD057B06B2D41207BAE04F6E23D91E8EF5649A37635C18B50AF2
                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H..e................................. ........@.. ....................................@................................
                                                                                                  Icon Hash:90cececece8e8eb0
                                                                                                  Entrypoint:0x40abce
                                                                                                  Entrypoint Section:.text
                                                                                                  Digitally signed:false
                                                                                                  Imagebase:0x400000
                                                                                                  Subsystem:windows gui
                                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                  Time Stamp:0x6592DF48 [Mon Jan 1 15:50:32 2024 UTC]
                                                                                                  TLS Callbacks:
                                                                                                  CLR (.Net) Version:
                                                                                                  OS Version Major:4
                                                                                                  OS Version Minor:0
                                                                                                  File Version Major:4
                                                                                                  File Version Minor:0
                                                                                                  Subsystem Version Major:4
                                                                                                  Subsystem Version Minor:0
                                                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                  Instruction
                                                                                                  jmp dword ptr [00402000h]
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xab740x57.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x240.rsrc
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xe0000xc.reloc
                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                  .text0x20000x8bd40x8c00False0.4636997767857143data5.606037807876678IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                  .rsrc0xc0000x2400x400False0.3134765625data4.968771659524424IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  .reloc0xe0000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                  RT_MANIFEST0xc0580x1e7XML 1.0 document, ASCII text, with CRLF line terminators0.5338809034907598
                                                                                                  DLLImport
                                                                                                  mscoree.dll_CorExeMain
                                                                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                  192.168.2.43.126.37.1849740194832814860 01/04/24-15:13:45.957337TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974019483192.168.2.43.126.37.18
                                                                                                  192.168.2.43.126.37.1849743194832825563 01/04/24-15:14:11.673311TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974319483192.168.2.43.126.37.18
                                                                                                  192.168.2.43.126.37.1849742194832825564 01/04/24-15:14:08.608083TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974219483192.168.2.43.126.37.18
                                                                                                  192.168.2.43.126.37.1849742194832825563 01/04/24-15:14:03.015666TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974219483192.168.2.43.126.37.18
                                                                                                  192.168.2.43.126.37.1849741194832033132 01/04/24-15:13:48.244663TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974119483192.168.2.43.126.37.18
                                                                                                  192.168.2.43.127.138.5749736194832814856 01/04/24-15:12:39.448191TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973619483192.168.2.43.127.138.57
                                                                                                  192.168.2.43.126.37.1849738194832814856 01/04/24-15:13:14.155298TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973819483192.168.2.43.126.37.18
                                                                                                  192.168.2.43.126.37.1849743194832033132 01/04/24-15:14:11.494212TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974319483192.168.2.43.126.37.18
                                                                                                  192.168.2.418.192.93.8649750194832033132 01/04/24-15:15:39.855430TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4975019483192.168.2.418.192.93.86
                                                                                                  192.168.2.43.126.37.1849739194832814856 01/04/24-15:13:28.577588TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4973919483192.168.2.43.126.37.18
                                                                                                  192.168.2.43.126.37.1849740194832033132 01/04/24-15:13:40.950373TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974019483192.168.2.43.126.37.18
                                                                                                  192.168.2.43.126.37.1849743194832825564 01/04/24-15:14:16.730036TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974319483192.168.2.43.126.37.18
                                                                                                  192.168.2.418.192.93.8649750194832825564 01/04/24-15:15:56.542416TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4975019483192.168.2.418.192.93.86
                                                                                                  192.168.2.43.126.37.1849743194832814860 01/04/24-15:14:16.730036TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974319483192.168.2.43.126.37.18
                                                                                                  192.168.2.418.192.93.8649750194832814860 01/04/24-15:15:56.542416TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4975019483192.168.2.418.192.93.86
                                                                                                  192.168.2.43.126.37.1849742194832814860 01/04/24-15:14:08.608083TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974219483192.168.2.43.126.37.18
                                                                                                  192.168.2.43.126.37.1849741194832814860 01/04/24-15:13:48.970310TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974119483192.168.2.43.126.37.18
                                                                                                  192.168.2.43.126.37.1849742194832033132 01/04/24-15:14:02.836622TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974219483192.168.2.43.126.37.18
                                                                                                  192.168.2.418.157.68.7349747194832814856 01/04/24-15:14:58.014827TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974719483192.168.2.418.157.68.73
                                                                                                  192.168.2.418.192.93.8649750194832814856 01/04/24-15:15:40.033269TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4975019483192.168.2.418.192.93.86
                                                                                                  192.168.2.418.157.68.7349748194832814856 01/04/24-15:15:05.487001TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974819483192.168.2.418.157.68.73
                                                                                                  192.168.2.418.157.68.7349749194832814856 01/04/24-15:15:20.162099TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974919483192.168.2.418.157.68.73
                                                                                                  192.168.2.43.127.138.5749729194832825563 01/04/24-15:12:05.296602TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4972919483192.168.2.43.127.138.57
                                                                                                  192.168.2.43.127.138.5749729194832825564 01/04/24-15:12:35.839196TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4972919483192.168.2.43.127.138.57
                                                                                                  192.168.2.418.157.68.7349746194832033132 01/04/24-15:14:49.647228TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974619483192.168.2.418.157.68.73
                                                                                                  192.168.2.418.157.68.7349747194832033132 01/04/24-15:14:57.836648TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974719483192.168.2.418.157.68.73
                                                                                                  192.168.2.418.157.68.7349747194832814860 01/04/24-15:15:03.046282TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974719483192.168.2.418.157.68.73
                                                                                                  192.168.2.418.157.68.7349748194832033132 01/04/24-15:15:05.306480TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974819483192.168.2.418.157.68.73
                                                                                                  192.168.2.43.126.37.1849738194832814860 01/04/24-15:13:26.160390TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4973819483192.168.2.43.126.37.18
                                                                                                  192.168.2.43.126.37.1849739194832814860 01/04/24-15:13:38.932867TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4973919483192.168.2.43.126.37.18
                                                                                                  192.168.2.418.157.68.7349748194832814860 01/04/24-15:15:17.718665TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974819483192.168.2.418.157.68.73
                                                                                                  192.168.2.418.157.68.7349749194832814860 01/04/24-15:15:37.312025TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974919483192.168.2.418.157.68.73
                                                                                                  192.168.2.43.126.37.1849739194832033132 01/04/24-15:13:28.398406TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973919483192.168.2.43.126.37.18
                                                                                                  192.168.2.418.157.68.7349749194832033132 01/04/24-15:15:19.981780TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974919483192.168.2.418.157.68.73
                                                                                                  192.168.2.43.126.37.1849738194832825564 01/04/24-15:13:15.960330TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4973819483192.168.2.43.126.37.18
                                                                                                  192.168.2.43.126.37.1849738194832033132 01/04/24-15:13:13.976690TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973819483192.168.2.43.126.37.18
                                                                                                  192.168.2.43.127.138.5749736194832825564 01/04/24-15:13:07.761035TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4973619483192.168.2.43.127.138.57
                                                                                                  192.168.2.418.157.68.7349748194832825564 01/04/24-15:15:17.718665TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974819483192.168.2.418.157.68.73
                                                                                                  192.168.2.418.157.68.7349746194832814860 01/04/24-15:14:55.647132TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974619483192.168.2.418.157.68.73
                                                                                                  192.168.2.43.127.138.5749729194832814856 01/04/24-15:12:05.296602TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4972919483192.168.2.43.127.138.57
                                                                                                  192.168.2.43.127.138.5749736194832825563 01/04/24-15:12:39.448191TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4973619483192.168.2.43.127.138.57
                                                                                                  192.168.2.43.126.37.1849739194832825564 01/04/24-15:13:34.111420TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4973919483192.168.2.43.126.37.18
                                                                                                  192.168.2.418.157.68.7349744194832814860 01/04/24-15:14:36.089719TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974419483192.168.2.418.157.68.73
                                                                                                  192.168.2.418.157.68.7349745194832814860 01/04/24-15:14:44.795619TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974519483192.168.2.418.157.68.73
                                                                                                  192.168.2.418.157.68.7349749194832825564 01/04/24-15:15:37.312025TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974919483192.168.2.418.157.68.73
                                                                                                  192.168.2.418.157.68.7349745194832033132 01/04/24-15:14:43.446368TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974519483192.168.2.418.157.68.73
                                                                                                  192.168.2.418.157.68.7349744194832825564 01/04/24-15:14:36.089719TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974419483192.168.2.418.157.68.73
                                                                                                  192.168.2.418.157.68.7349744194832033132 01/04/24-15:14:27.670241TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974419483192.168.2.418.157.68.73
                                                                                                  192.168.2.418.157.68.7349744194832825563 01/04/24-15:14:27.850612TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974419483192.168.2.418.157.68.73
                                                                                                  192.168.2.418.157.68.7349746194832825564 01/04/24-15:14:53.506462TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974619483192.168.2.418.157.68.73
                                                                                                  192.168.2.418.157.68.7349747194832825564 01/04/24-15:15:01.621207TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974719483192.168.2.418.157.68.73
                                                                                                  192.168.2.418.157.68.7349746194832825563 01/04/24-15:14:49.825260TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974619483192.168.2.418.157.68.73
                                                                                                  192.168.2.418.157.68.7349745194832825564 01/04/24-15:14:44.795619TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974519483192.168.2.418.157.68.73
                                                                                                  192.168.2.418.157.68.7349745194832825563 01/04/24-15:14:43.626690TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)4974519483192.168.2.418.157.68.73
                                                                                                  192.168.2.418.157.68.7349746194832814856 01/04/24-15:14:49.825260TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974619483192.168.2.418.157.68.73
                                                                                                  192.168.2.43.126.37.1849742194832814856 01/04/24-15:14:03.015666TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974219483192.168.2.43.126.37.18
                                                                                                  192.168.2.43.126.37.1849743194832814856 01/04/24-15:14:11.673311TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974319483192.168.2.43.126.37.18
                                                                                                  192.168.2.43.127.138.5749729194832814860 01/04/24-15:12:35.839196TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4972919483192.168.2.43.127.138.57
                                                                                                  192.168.2.418.157.68.7349744194832814856 01/04/24-15:14:27.850612TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974419483192.168.2.418.157.68.73
                                                                                                  192.168.2.43.126.37.1849741194832814856 01/04/24-15:13:48.425581TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974119483192.168.2.43.126.37.18
                                                                                                  192.168.2.418.157.68.7349745194832814856 01/04/24-15:14:43.626690TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974519483192.168.2.418.157.68.73
                                                                                                  192.168.2.43.127.138.5749729194832033132 01/04/24-15:12:05.116234TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4972919483192.168.2.43.127.138.57
                                                                                                  192.168.2.43.127.138.5749736194832033132 01/04/24-15:12:39.268705TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973619483192.168.2.43.127.138.57
                                                                                                  192.168.2.43.127.138.5749736194832814860 01/04/24-15:13:11.667134TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4973619483192.168.2.43.127.138.57
                                                                                                  192.168.2.43.126.37.1849740194832814856 01/04/24-15:13:41.129967TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4974019483192.168.2.43.126.37.18
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Jan 4, 2024 15:12:04.655698061 CET4972919483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:12:04.836328030 CET19483497293.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:12:04.836522102 CET4972919483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:12:05.116234064 CET4972919483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:12:05.296421051 CET19483497293.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:12:05.296602011 CET4972919483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:12:05.476875067 CET19483497293.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:12:10.792552948 CET4972919483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:12:10.972716093 CET19483497293.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:12:26.066811085 CET19483497293.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:12:26.066890955 CET4972919483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:12:27.698949099 CET4972919483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:12:27.879112005 CET19483497293.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:12:35.839195967 CET4972919483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:12:36.019442081 CET19483497293.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:12:37.070280075 CET19483497293.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:12:37.070507050 CET4972919483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:12:39.074888945 CET4972919483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:12:39.084208012 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:12:39.255178928 CET19483497293.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:12:39.263700008 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:12:39.263780117 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:12:39.268704891 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:12:39.448065042 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:12:39.448190928 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:12:39.627549887 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:12:43.417296886 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:12:43.596801043 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:12:58.834974051 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:12:58.835038900 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:03.699297905 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:03.878762007 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:04.370604992 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:04.550101995 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:06.636231899 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:06.815854073 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:06.815929890 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:06.995367050 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:07.761034966 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:07.940361023 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:07.940421104 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:08.119920015 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:08.119999886 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:08.299515009 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:08.299596071 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:08.479166031 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:08.479258060 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:08.658822060 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:08.658900976 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:08.838974953 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:08.839034081 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:09.018527985 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:09.018613100 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:09.198095083 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:09.198175907 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:09.377746105 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:09.377821922 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:09.557308912 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:09.557389021 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:09.736896992 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:09.736984968 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:09.916450977 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:09.916538954 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:10.096024036 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:10.096122980 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:10.275501966 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:10.275599957 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:10.455096006 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:10.455190897 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:10.634596109 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:10.634701014 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:10.814424038 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:10.814521074 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:10.994119883 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:10.994335890 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:11.173830986 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:11.173904896 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:11.353288889 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:11.353490114 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:11.510757923 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:11.510843992 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:11.532967091 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:11.667134047 CET4973619483192.168.2.43.127.138.57
                                                                                                  Jan 4, 2024 15:13:11.690402985 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:11.846621990 CET19483497363.127.138.57192.168.2.4
                                                                                                  Jan 4, 2024 15:13:13.636320114 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:13.814853907 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:13.814934015 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:13.976690054 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:14.155224085 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:14.155297995 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:14.333873034 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:14.334049940 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:14.512407064 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:14.512475014 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:14.690820932 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:15.960330009 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:16.138837099 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:16.138912916 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:16.317414045 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:16.317605972 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:16.496433020 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:16.496634007 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:16.675354004 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:16.675524950 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:16.854057074 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:16.854258060 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:17.032748938 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:17.032812119 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:17.211419106 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:17.211474895 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:17.389938116 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:17.390216112 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:17.568624020 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:17.568703890 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:17.747215033 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:17.747277021 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:17.925693035 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:17.925748110 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:18.104732990 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:18.104809999 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:18.283173084 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:18.283266068 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:18.461740971 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:18.461805105 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:18.640342951 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:18.644296885 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:18.823137999 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:18.823647976 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:19.002696991 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:19.002782106 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:19.182827950 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:19.182907104 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:19.361350060 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:19.361603975 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:19.539983034 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:19.540080070 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:19.718808889 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:19.718992949 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:19.897433043 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:19.897517920 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:20.075911999 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:20.076005936 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:20.255013943 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:20.255167007 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:20.433814049 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:20.436625004 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:20.616735935 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:20.620353937 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:20.799683094 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:20.800323963 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:20.979039907 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:20.979121923 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:21.157892942 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:21.158081055 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:21.336708069 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:21.336816072 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:21.515348911 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:21.515500069 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:21.694034100 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:21.694127083 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:21.872515917 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:21.872617960 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:22.051090956 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:22.051158905 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:22.229640961 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:22.229722977 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:22.408181906 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:22.408396006 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:22.587071896 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:22.587146044 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:22.765688896 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:22.765861034 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:22.944206953 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:22.944287062 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:23.122795105 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:23.122904062 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:23.301429987 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:23.301516056 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:23.479887009 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:23.480034113 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:23.658390045 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:23.658515930 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:23.837057114 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:23.837121010 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:24.015588999 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:24.015794039 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:24.194452047 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:24.194535971 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:24.373392105 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:24.373487949 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:24.551996946 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:24.552082062 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:24.730834007 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:24.731002092 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:24.909380913 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:24.909493923 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:25.087923050 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:25.088025093 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:25.267329931 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:25.267554998 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:25.446084976 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:25.446173906 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:25.624699116 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:25.624768019 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:25.803215027 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:25.803318024 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:25.981781960 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:25.981859922 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:26.160314083 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:26.160389900 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:26.209997892 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:26.210066080 CET4973819483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:26.338725090 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:26.388674974 CET19483497383.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:28.215912104 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:28.395119905 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:28.395229101 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:28.398406029 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:28.577526093 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:28.577588081 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:28.756623030 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:28.756731033 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:28.936002970 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:28.936086893 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:29.115735054 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:29.115809917 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:29.294698000 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:29.294780970 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:29.473892927 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:29.473973036 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:29.652920961 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:29.652995110 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:29.832227945 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:29.832326889 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:30.011141062 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:30.011214018 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:30.190100908 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:30.190191984 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:30.369179964 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:30.369254112 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:30.548338890 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:30.548429966 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:30.727495909 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:30.727582932 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:30.906481028 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:30.906543016 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:31.085503101 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:31.085573912 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:31.264663935 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:31.264710903 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:31.443730116 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:31.443933964 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:31.623123884 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:31.623188019 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:31.802237988 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:31.927297115 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:32.106291056 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:32.106357098 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:32.285427094 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:34.111419916 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:34.290631056 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:34.290862083 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:34.471729040 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:34.471956015 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:34.653143883 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:34.653199911 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:34.832360983 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:34.832441092 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:35.011526108 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:35.011698961 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:35.191557884 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:35.191617012 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:35.370682001 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:35.370764971 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:35.549714088 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:35.549799919 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:35.728701115 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:35.728806019 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:35.909012079 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:35.909142017 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:36.088074923 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:36.088152885 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:36.267081976 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:36.267204046 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:36.446242094 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:36.446388006 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:36.625453949 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:36.625530958 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:36.804702044 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:36.804795027 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:36.984349966 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:36.984412909 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:37.163809061 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:37.163918972 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:37.342799902 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:37.342890978 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:37.521962881 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:37.522030115 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:37.701149940 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:37.701251030 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:37.880125999 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:37.880242109 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:38.059245110 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:38.059422970 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:38.238185883 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:38.238295078 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:38.417177916 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:38.417356968 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:38.596777916 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:38.596879959 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:38.758188963 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:38.758266926 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:38.775731087 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:38.932867050 CET4973919483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:38.937151909 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:39.111741066 CET19483497393.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:40.765836954 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:40.945321083 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:40.945527077 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:40.950372934 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:41.129863977 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:41.129966974 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:41.308561087 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:41.308772087 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:41.487215996 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:41.487339020 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:41.665797949 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:41.665873051 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:41.844285965 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:41.844491005 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:42.022888899 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:42.023062944 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:42.201477051 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:42.201539040 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:42.379947901 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:42.380148888 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:42.558425903 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:42.558510065 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:42.736917019 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:42.736995935 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:42.915575027 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:42.915751934 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:43.094392061 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:43.094615936 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:43.273329020 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:43.273502111 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:43.451910973 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:43.451992989 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:43.630480051 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:43.630661964 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:43.809223890 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:43.809437990 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:43.987936974 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:43.987993956 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:44.166377068 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:44.166460991 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:44.345051050 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:44.345220089 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:44.523535013 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:44.523585081 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:44.703282118 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:44.703461885 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:44.883691072 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:44.883838892 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:45.062300920 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:45.062470913 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:45.243218899 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:45.243294001 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:45.421621084 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:45.421817064 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:45.600241899 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:45.600317001 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:45.778754950 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:45.778812885 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:45.957246065 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:45.957336903 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:46.042979002 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:46.043154955 CET4974019483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:46.135947943 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:46.222237110 CET19483497403.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:48.060381889 CET4974119483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:48.241303921 CET19483497413.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:48.241411924 CET4974119483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:48.244663000 CET4974119483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:48.425498009 CET19483497413.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:48.425580978 CET4974119483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:48.606621027 CET19483497413.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:48.607002020 CET4974119483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:48.789000034 CET19483497413.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:48.789094925 CET4974119483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:48.970108032 CET19483497413.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:13:48.970309973 CET4974119483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:13:49.151211023 CET19483497413.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:14:00.650839090 CET19483497413.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:14:00.650927067 CET4974119483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:14:02.651771069 CET4974119483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:14:02.653748989 CET4974219483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:14:02.832829952 CET19483497413.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:14:02.833095074 CET19483497423.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:14:02.833240986 CET4974219483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:14:02.836622000 CET4974219483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:14:03.015557051 CET19483497423.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:14:03.015666008 CET4974219483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:14:03.194730997 CET19483497423.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:14:08.608083010 CET4974219483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:14:08.787487984 CET19483497423.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:14:09.278424978 CET19483497423.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:14:09.323416948 CET4974219483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:14:11.308028936 CET4974219483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:14:11.311871052 CET4974319483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:14:11.490890980 CET19483497433.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:14:11.491008997 CET4974319483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:14:11.494211912 CET4974319483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:14:11.673233032 CET19483497433.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:14:11.673310995 CET4974319483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:14:11.852289915 CET19483497433.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:14:16.730036020 CET4974319483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:14:16.909198999 CET19483497433.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:14:24.829392910 CET19483497433.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:14:24.829482079 CET4974319483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:14:26.839276075 CET4974319483192.168.2.43.126.37.18
                                                                                                  Jan 4, 2024 15:14:27.018479109 CET19483497433.126.37.18192.168.2.4
                                                                                                  Jan 4, 2024 15:14:27.486681938 CET4974419483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:27.667025089 CET194834974418.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:27.667109013 CET4974419483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:27.670241117 CET4974419483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:27.850552082 CET194834974418.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:27.850611925 CET4974419483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:28.030983925 CET194834974418.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:31.262778044 CET4974419483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:31.443135023 CET194834974418.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:36.089719057 CET4974419483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:36.270267963 CET194834974418.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:41.251365900 CET194834974418.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:41.251447916 CET4974419483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:43.261259079 CET4974419483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:43.262861967 CET4974519483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:43.441595078 CET194834974418.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:43.443222046 CET194834974518.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:43.443303108 CET4974519483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:43.446367979 CET4974519483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:43.626636982 CET194834974518.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:43.626689911 CET4974519483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:43.806988001 CET194834974518.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:44.795619011 CET4974519483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:44.977592945 CET194834974518.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:47.450025082 CET194834974518.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:47.450215101 CET4974519483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:49.464193106 CET4974519483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:49.465986967 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:49.644068956 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:49.644150972 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:49.644862890 CET194834974518.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:49.647228003 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:49.825095892 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:49.825259924 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:50.003328085 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:50.698890924 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:50.878791094 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:51.074096918 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:51.252176046 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:52.620608091 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:52.798881054 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:52.799067974 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:52.977145910 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:53.506462097 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:53.687127113 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:53.687206030 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:53.866189957 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:53.866274118 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:54.044272900 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:54.044442892 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:54.222264051 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:54.222322941 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:54.400183916 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:54.400361061 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:54.578382015 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:54.578567982 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:54.756606102 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:54.756783009 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:54.934835911 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:54.934968948 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:55.112871885 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:55.112937927 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:55.290770054 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:55.290878057 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:55.468839884 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:55.469052076 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:55.647052050 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:55.647131920 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:55.650983095 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:55.651057005 CET4974619483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:55.825217009 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:55.828906059 CET194834974618.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:57.654728889 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:57.832756996 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:57.832858086 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:57.836647987 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:58.014766932 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:58.014827013 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:58.192960978 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:58.193072081 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:58.371143103 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:58.371196032 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:58.549343109 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:58.549465895 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:58.727721930 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:58.727797031 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:58.905813932 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:58.906033039 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:59.084090948 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:59.084156990 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:59.264991999 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:59.592714071 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:59.771071911 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:14:59.771136045 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:14:59.949075937 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:00.008645058 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:00.186767101 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:00.596941948 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:00.775299072 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:00.999468088 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:01.177527905 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:01.177594900 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:01.355778933 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:01.443119049 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:01.621146917 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:01.621206999 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:01.799375057 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:01.799451113 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:01.977488041 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:01.977579117 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:02.155426979 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:02.155495882 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:02.333401918 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:02.333503008 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:02.511629105 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:02.511728048 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:02.689788103 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:02.689851999 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:02.867952108 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:02.868052959 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:03.046191931 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:03.046282053 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:03.106699944 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:03.106796980 CET4974719483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:03.224853039 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:03.284934998 CET194834974718.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:05.122256041 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:05.302783966 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:05.302897930 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:05.306479931 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:05.486901999 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:05.487000942 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:05.667423010 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:05.667489052 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:05.847923040 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:05.848006964 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:06.028732061 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:06.028835058 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:06.209331036 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:06.209443092 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:06.390006065 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:06.390113115 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:06.570606947 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:06.570688009 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:06.751173019 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:06.751281977 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:06.931878090 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:06.931960106 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:07.112504959 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:07.112617016 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:07.293467045 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:07.293566942 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:07.474090099 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:07.474162102 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:07.654701948 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:07.654784918 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:07.835832119 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:07.835931063 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:08.016417980 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:08.016479969 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:08.196815014 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:08.196913958 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:08.377696991 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:08.377906084 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:08.558686018 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:08.558767080 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:08.739343882 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:08.739409924 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:08.919930935 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:08.920025110 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:09.100539923 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:09.100877047 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:09.281327963 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:09.281385899 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:09.461903095 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:09.462007999 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:09.642507076 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:09.642708063 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:09.823214054 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:09.823278904 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:10.003822088 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:10.004038095 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:10.184768915 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:10.184968948 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:10.375011921 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:10.375072002 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:10.555999041 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:10.556088924 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:10.736710072 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:10.736907005 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:10.917433977 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:10.917520046 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:11.098315954 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:11.098541975 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:11.279241085 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:11.279330015 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:11.460019112 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:11.460118055 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:11.640717983 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:11.640780926 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:11.821430922 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:11.821512938 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:12.001857996 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:12.002054930 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:12.183146954 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:12.183217049 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:12.363558054 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:12.363748074 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:12.544131041 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:12.544229984 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:12.724634886 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:12.724819899 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:12.905379057 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:12.905559063 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:13.086359978 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:13.086505890 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:13.266725063 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:13.266807079 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:13.447289944 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:13.447351933 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:13.627815962 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:13.627980947 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:13.811378956 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:13.811451912 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:13.991734028 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:13.991821051 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:14.172230005 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:14.172328949 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:14.352775097 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:14.352855921 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:14.533248901 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:14.533307076 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:14.713680983 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:14.713753939 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:14.894345045 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:14.894458055 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:15.074939966 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:15.075017929 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:15.255376101 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:15.255450964 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:15.435870886 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:15.435926914 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:15.616322041 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:15.616425037 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:15.796730995 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:15.796823025 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:15.977319956 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:15.977440119 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:16.157834053 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:16.157911062 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:16.338815928 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:16.338974953 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:16.519294024 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:16.519373894 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:16.700361967 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:16.700442076 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:16.880970955 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:16.881021023 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:17.062475920 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:17.227447987 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:17.407845020 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:17.516463041 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:17.696927071 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:17.718664885 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:17.791420937 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:17.791486979 CET4974819483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:17.899059057 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:17.973124027 CET194834974818.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:19.797775030 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:19.978398085 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:19.978538990 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:19.981780052 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:20.161995888 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:20.162098885 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:20.342410088 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:20.342468977 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:20.522851944 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:20.522948027 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:20.703346968 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:20.703442097 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:20.884043932 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:20.884135008 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:21.066729069 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:21.066831112 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:21.247163057 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:21.247253895 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:21.427516937 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:21.427625895 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:21.608016968 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:21.608082056 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:21.788378954 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:21.788484097 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:21.968801975 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:21.968921900 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:22.149208069 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:22.149307966 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:22.329675913 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:22.329756021 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:22.510173082 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:22.510266066 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:22.691428900 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:22.691581011 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:22.872128010 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:22.872215986 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:23.053183079 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:23.053271055 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:23.233652115 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:23.233751059 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:23.414120913 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:23.414213896 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:23.594707012 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:23.594886065 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:23.776386976 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:23.776513100 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:23.957062960 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:23.957117081 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:24.138005972 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:24.138114929 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:24.318437099 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:24.318541050 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:24.499105930 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:24.499187946 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:24.680089951 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:24.680181026 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:24.860481977 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:24.860582113 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:25.040967941 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:25.041106939 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:25.221537113 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:25.221621037 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:25.402071953 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:25.402153969 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:25.582493067 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:25.582578897 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:25.763183117 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:25.763267040 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:25.943593025 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:25.943677902 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:26.124070883 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:26.124169111 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:26.304465055 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:26.304529905 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:26.488327026 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:26.488421917 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:26.668839931 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:26.669050932 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:26.849451065 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:26.849514008 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:27.029887915 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:27.029970884 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:27.211379051 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:27.211498022 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:27.391846895 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:27.391916037 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:27.572331905 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:27.572431087 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:27.752775908 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:27.752968073 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:27.933350086 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:27.933429003 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:28.113964081 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:28.114046097 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:28.294408083 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:28.294490099 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:28.485125065 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:28.485235929 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:28.665617943 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:28.665709972 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:28.846019983 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:28.846137047 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:29.029664993 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:29.029848099 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:29.210318089 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:29.210406065 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:29.390778065 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:29.390909910 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:29.571420908 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:29.571609974 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:29.757520914 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:29.757632971 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:29.938091040 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:29.938183069 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:30.118556023 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:30.118748903 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:30.299068928 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:30.299160957 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:30.479587078 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:30.479767084 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:30.660180092 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:30.660267115 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:30.840672970 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:30.840751886 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:31.021182060 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:31.021246910 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:31.201565027 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:31.201646090 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:31.388463020 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:31.388550043 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:31.572295904 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:31.572364092 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:31.752821922 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:31.753036022 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:31.933439016 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:31.933531046 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:32.113986969 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:32.114207029 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:32.294708967 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:32.294913054 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:32.475445986 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:32.475536108 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:32.655889034 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:32.655970097 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:32.836333036 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:32.836420059 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:33.016772985 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:33.017031908 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:33.197346926 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:33.197453976 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:33.377861977 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:33.377950907 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:33.558341026 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:33.558434963 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:33.742260933 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:33.742331982 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:33.922941923 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:33.923022032 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:34.103454113 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:34.103533030 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:34.284468889 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:34.284646034 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:34.465712070 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:34.465776920 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:34.646142006 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:34.646226883 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:34.826587915 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:34.826666117 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:35.006967068 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:35.007070065 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:35.187347889 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:35.208197117 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:35.388504028 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:35.388581038 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:35.569055080 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:35.771295071 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:35.951673031 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:35.951729059 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:36.132184029 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:36.173017979 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:36.353339911 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:36.353408098 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:36.533793926 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:37.131506920 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:37.311965942 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:37.312025070 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:37.492382050 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:37.560563087 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:37.560642958 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:39.573672056 CET4974919483192.168.2.418.157.68.73
                                                                                                  Jan 4, 2024 15:15:39.673623085 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:39.754199982 CET194834974918.157.68.73192.168.2.4
                                                                                                  Jan 4, 2024 15:15:39.851664066 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:39.851761103 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:39.855429888 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:40.033204079 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:40.033268929 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:40.211399078 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:40.211489916 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:40.389278889 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:40.389400959 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:40.567620039 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:40.567706108 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:40.745599031 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:40.745671034 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:40.924037933 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:40.924266100 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:41.102431059 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:41.102555990 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:41.280332088 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:41.280431986 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:41.458805084 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:41.458908081 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:41.636780977 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:41.636898041 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:41.814835072 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:41.814924955 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:41.993002892 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:41.993094921 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:42.170928955 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:42.171020031 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:42.348799944 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:42.348862886 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:42.526707888 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:42.526825905 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:42.704724073 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:42.704813004 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:42.882627010 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:42.882728100 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:43.060899973 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:43.060992002 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:43.238672972 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:43.238780022 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:43.423685074 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:43.423803091 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:43.603208065 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:43.603318930 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:43.805233955 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:43.805319071 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:43.983582020 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:43.983690977 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:44.184483051 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:44.184581995 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:44.362447977 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:44.362554073 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:44.540175915 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:44.540256023 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:44.718194962 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:44.718259096 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:44.896322012 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:44.896425009 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:45.074497938 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:45.074606895 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:45.252660036 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:45.252742052 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:45.430665970 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:45.430799007 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:45.608977079 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:45.609069109 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:45.787235022 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:45.787362099 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:45.965213060 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:45.965306997 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:46.143240929 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:46.143357038 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:46.321100950 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:46.321180105 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:46.499162912 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:46.499247074 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:46.677072048 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:46.677151918 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:46.854926109 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:46.854984045 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:47.032968998 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:47.033027887 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:47.210747004 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:47.210850000 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:47.389527082 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:47.389709949 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:47.567805052 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:47.567866087 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:47.747915030 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:47.747988939 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:47.925920963 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:47.925997019 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:48.107197046 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:48.107297897 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:48.284997940 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:48.285093069 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:48.462925911 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:48.463005066 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:48.640738010 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:48.640811920 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:48.818641901 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:48.818715096 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:48.996505976 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:48.996568918 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:49.174606085 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:49.174690962 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:49.352493048 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:49.352580070 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:49.530529976 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:49.530622005 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:49.708528042 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:49.708626986 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:49.886760950 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:49.886823893 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:50.064842939 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:50.064922094 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:50.243043900 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:50.243155956 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:50.420985937 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:50.421066046 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:50.599915981 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:50.599993944 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:50.777887106 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:50.778012037 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:50.955995083 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:50.956068039 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:51.133946896 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:51.134027004 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:51.311888933 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:51.312001944 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:51.490025043 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:51.490103960 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:51.667942047 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:51.668020010 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:51.848037004 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:51.848109961 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:52.026001930 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:52.091240883 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:52.269083977 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:52.269138098 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:52.446901083 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:52.446955919 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:52.624955893 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:52.625010967 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:52.802944899 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:52.802999973 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:52.980803967 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:53.210432053 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:53.388346910 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:53.388420105 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:53.566407919 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:53.566463947 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:53.744452953 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:53.744524002 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:53.922559023 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:53.922672033 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:54.100630999 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:54.100704908 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:54.278707027 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:54.278800964 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:54.460608006 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:54.460706949 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:54.638720989 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:54.638916969 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:54.816792965 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:54.816988945 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:54.994888067 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:54.994976044 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:55.172842026 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:55.172910929 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:55.351457119 CET194834975018.192.93.86192.168.2.4
                                                                                                  Jan 4, 2024 15:15:56.542416096 CET4975019483192.168.2.418.192.93.86
                                                                                                  Jan 4, 2024 15:15:56.720324039 CET194834975018.192.93.86192.168.2.4
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Jan 4, 2024 15:12:04.545624018 CET5958953192.168.2.41.1.1.1
                                                                                                  Jan 4, 2024 15:12:04.650311947 CET53595891.1.1.1192.168.2.4
                                                                                                  Jan 4, 2024 15:13:13.528142929 CET5789553192.168.2.41.1.1.1
                                                                                                  Jan 4, 2024 15:13:13.634999990 CET53578951.1.1.1192.168.2.4
                                                                                                  Jan 4, 2024 15:14:26.840591908 CET5439053192.168.2.41.1.1.1
                                                                                                  Jan 4, 2024 15:14:26.948213100 CET53543901.1.1.1192.168.2.4
                                                                                                  Jan 4, 2024 15:15:39.575319052 CET4924853192.168.2.41.1.1.1
                                                                                                  Jan 4, 2024 15:15:39.672338963 CET53492481.1.1.1192.168.2.4
                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                  Jan 4, 2024 15:12:04.545624018 CET192.168.2.41.1.1.10x3200Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                                                  Jan 4, 2024 15:13:13.528142929 CET192.168.2.41.1.1.10xd5aaStandard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                                                  Jan 4, 2024 15:14:26.840591908 CET192.168.2.41.1.1.10x2093Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                                                  Jan 4, 2024 15:15:39.575319052 CET192.168.2.41.1.1.10x6042Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                  Jan 4, 2024 15:12:04.650311947 CET1.1.1.1192.168.2.40x3200No error (0)2.tcp.eu.ngrok.io3.127.138.57A (IP address)IN (0x0001)false
                                                                                                  Jan 4, 2024 15:13:13.634999990 CET1.1.1.1192.168.2.40xd5aaNo error (0)2.tcp.eu.ngrok.io3.126.37.18A (IP address)IN (0x0001)false
                                                                                                  Jan 4, 2024 15:14:26.948213100 CET1.1.1.1192.168.2.40x2093No error (0)2.tcp.eu.ngrok.io18.157.68.73A (IP address)IN (0x0001)false
                                                                                                  Jan 4, 2024 15:15:39.672338963 CET1.1.1.1192.168.2.40x6042No error (0)2.tcp.eu.ngrok.io18.192.93.86A (IP address)IN (0x0001)false

                                                                                                  Click to jump to process

                                                                                                  Click to jump to process

                                                                                                  Click to dive into process behavior distribution

                                                                                                  Click to jump to process

                                                                                                  Target ID:0
                                                                                                  Start time:15:11:48
                                                                                                  Start date:04/01/2024
                                                                                                  Path:C:\Users\user\Desktop\b8UsrDOVGV.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:C:\Users\user\Desktop\b8UsrDOVGV.exe
                                                                                                  Imagebase:0x4d0000
                                                                                                  File size:37'888 bytes
                                                                                                  MD5 hash:B7DD9DD7470AF783D5D955B455D58CAC
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.1618553751.00000000004D2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000000.1618553751.00000000004D2000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                                                                  • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000000.1618553751.00000000004D2000.00000002.00000001.01000000.00000003.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:1
                                                                                                  Start time:15:11:54
                                                                                                  Start date:04/01/2024
                                                                                                  Path:C:\Users\user\AppData\Roaming\Svchost.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\AppData\Roaming\Svchost.exe"
                                                                                                  Imagebase:0x200000
                                                                                                  File size:37'888 bytes
                                                                                                  MD5 hash:B7DD9DD7470AF783D5D955B455D58CAC
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000001.00000002.4076153599.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Svchost.exe, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Svchost.exe, Author: unknown
                                                                                                  • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Roaming\Svchost.exe, Author: Brian Wallace @botnet_hunter
                                                                                                  • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Svchost.exe, Author: ditekSHen
                                                                                                  Antivirus matches:
                                                                                                  • Detection: 100%, Avira
                                                                                                  • Detection: 100%, Joe Sandbox ML
                                                                                                  • Detection: 94%, ReversingLabs
                                                                                                  • Detection: 88%, Virustotal, Browse
                                                                                                  Reputation:low
                                                                                                  Has exited:false

                                                                                                  Target ID:3
                                                                                                  Start time:15:12:01
                                                                                                  Start date:04/01/2024
                                                                                                  Path:C:\Windows\SysWOW64\netsh.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\Svchost.exe" "Svchost.exe" ENABLE
                                                                                                  Imagebase:0x1560000
                                                                                                  File size:82'432 bytes
                                                                                                  MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:moderate
                                                                                                  Has exited:true

                                                                                                  Target ID:4
                                                                                                  Start time:15:12:01
                                                                                                  Start date:04/01/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:6
                                                                                                  Start time:15:12:13
                                                                                                  Start date:04/01/2024
                                                                                                  Path:C:\Users\user\AppData\Roaming\Svchost.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\AppData\Roaming\Svchost.exe" ..
                                                                                                  Imagebase:0x10000
                                                                                                  File size:37'888 bytes
                                                                                                  MD5 hash:B7DD9DD7470AF783D5D955B455D58CAC
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:9
                                                                                                  Start time:15:12:23
                                                                                                  Start date:04/01/2024
                                                                                                  Path:C:\Users\user\AppData\Roaming\Svchost.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\AppData\Roaming\Svchost.exe" ..
                                                                                                  Imagebase:0x6a0000
                                                                                                  File size:37'888 bytes
                                                                                                  MD5 hash:B7DD9DD7470AF783D5D955B455D58CAC
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:10
                                                                                                  Start time:15:12:31
                                                                                                  Start date:04/01/2024
                                                                                                  Path:C:\Users\user\AppData\Roaming\Svchost.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\AppData\Roaming\Svchost.exe" ..
                                                                                                  Imagebase:0xd00000
                                                                                                  File size:37'888 bytes
                                                                                                  MD5 hash:B7DD9DD7470AF783D5D955B455D58CAC
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Reset < >

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:7.7%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:0%
                                                                                                    Total number of Nodes:37
                                                                                                    Total number of Limit Nodes:1
                                                                                                    execution_graph 1747 cba462 1749 cba486 RegSetValueExW 1747->1749 1750 cba507 1749->1750 1751 cba361 1752 cba392 RegQueryValueExW 1751->1752 1754 cba41b 1752->1754 1755 cbaa07 1756 cbaa3e CopyFileW 1755->1756 1758 cbaa8e 1756->1758 1715 cba8c6 1718 cba8ef SetFileAttributesW 1715->1718 1717 cba90b 1718->1717 1719 cbac46 1720 cbac6c ShellExecuteExW 1719->1720 1722 cbac88 1720->1722 1723 cba646 1724 cba67e CreateMutexW 1723->1724 1726 cba6c1 1724->1726 1763 cba8a4 1766 cba8c6 SetFileAttributesW 1763->1766 1765 cba90b 1766->1765 1767 cbac24 1769 cbac46 ShellExecuteExW 1767->1769 1770 cbac88 1769->1770 1731 cba2fe 1732 cba32a SetErrorMode 1731->1732 1733 cba353 1731->1733 1734 cba33f 1732->1734 1733->1732 1735 cbaa3e 1737 cbaa67 CopyFileW 1735->1737 1738 cbaa8e 1737->1738 1743 cba2d2 1745 cba2d6 SetErrorMode 1743->1745 1746 cba33f 1745->1746 1759 cba612 1761 cba646 CreateMutexW 1759->1761 1762 cba6c1 1761->1762

                                                                                                    Callgraph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    • Opacity -> Relevance
                                                                                                    • Disassembly available
                                                                                                    callgraph 0 Function_00CBAACF 1 Function_00CB26C0 2 Function_00CBA7C7 3 Function_00CBACC7 4 Function_00CBA8C6 5 Function_00A605BF 6 Function_00CBA2D2 7 Function_00CB20D0 8 Function_00CB26EF 9 Function_00CBAAE1 10 Function_00CBACFA 11 Function_00CBA2FE 12 Function_00CB21F0 13 Function_00CBA1F4 14 Function_00CB23F4 15 Function_04C90889 18 Function_00A605E0 15->18 52 Function_00A60606 15->52 16 Function_04C90088 17 Function_04C90C8D 19 Function_00CBA486 20 Function_00CB2586 21 Function_04C90699 22 Function_04C90D98 23 Function_00CBA09A 24 Function_00CB2098 25 Function_00CBAB9E 26 Function_00CBA392 27 Function_00CB2494 28 Function_00CB2194 29 Function_04C90BA8 30 Function_00A605CF 31 Function_00CBA8A4 32 Function_04C903BD 32->18 43 Function_04C90958 32->43 32->52 33 Function_00CB23BC 34 Function_00CB22B4 35 Function_00CBA74E 36 Function_04C90940 37 Function_04C90D40 38 Function_00CBA540 39 Function_00CBA646 40 Function_00CBAC46 41 Function_00CB2044 42 Function_00A60736 43->18 43->52 44 Function_04C90F58 45 Function_04C9075A 46 Function_00CB2458 47 Function_04C9035D 47->18 47->43 47->52 48 Function_00CBA25E 49 Function_00CBA45C 50 Function_00CBA952 51 Function_04C90E55 53 Function_04C90069 54 Function_04C90368 54->18 54->43 54->52 55 Function_00CBA56E 56 Function_00CB286E 57 Function_00A60001 58 Function_00CBA462 59 Function_00CBA361 60 Function_00CB2264 61 Function_00CB2364 62 Function_00CBA078 63 Function_00CBA97E 64 Function_00A60710 65 Function_00CB247C 66 Function_00CBA172 67 Function_00CB2675 68 Function_00CBAB74 69 Function_04C90B03 70 Function_00A6026D 71 Function_00CB2500 72 Function_04C90F05 73 Function_00A6066A 74 Function_00CBAA07 75 Function_00CBAB06 76 Function_00CBA005 77 Function_00CB2005 78 Function_04C9031B 78->18 78->43 78->52 79 Function_00A60074 80 Function_00CBA81E 81 Function_00A6067F 82 Function_00CBA612 83 Function_00CBAC11 84 Function_00CBA710 85 Function_00CB2310 86 Function_00CBA02E 87 Function_00A60040 88 Function_04C90C22 89 Function_00CBA120 90 Function_00A60648 90->73 91 Function_00CBAC24 92 Function_00CBAA3E 93 Function_00CB253D 94 Function_00CBA23C 95 Function_00CB213C 96 Function_04C90630 97 Function_00CB2430

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 0 cba612-cba695 4 cba69a-cba6a3 0->4 5 cba697 0->5 6 cba6a8-cba6b1 4->6 7 cba6a5 4->7 5->4 8 cba6b3-cba6d7 CreateMutexW 6->8 9 cba702-cba707 6->9 7->6 12 cba709-cba70e 8->12 13 cba6d9-cba6ff 8->13 9->8 12->13
                                                                                                    APIs
                                                                                                    • CreateMutexW.KERNELBASE(?,?), ref: 00CBA6B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685521771.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_cba000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateMutex
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964310414-0
                                                                                                    • Opcode ID: 9e7f2c5bfc3c0e2dbd098f85660414110ad70a1ec9cd206f4f2fc388f489ef73
                                                                                                    • Instruction ID: f198f9bcff69a7625f8a716dfbde009e86fa6b455d5e782fb62134288771e824
                                                                                                    • Opcode Fuzzy Hash: 9e7f2c5bfc3c0e2dbd098f85660414110ad70a1ec9cd206f4f2fc388f489ef73
                                                                                                    • Instruction Fuzzy Hash: 9F3193B55093806FE722CB25DC45B96BFF8EF16314F08849AE984CB292D375E909C772
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 16 cba361-cba3cf 19 cba3d1 16->19 20 cba3d4-cba3dd 16->20 19->20 21 cba3df 20->21 22 cba3e2-cba3e8 20->22 21->22 23 cba3ea 22->23 24 cba3ed-cba404 22->24 23->24 26 cba43b-cba440 24->26 27 cba406-cba419 RegQueryValueExW 24->27 26->27 28 cba41b-cba438 27->28 29 cba442-cba447 27->29 29->28
                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(?,00000E24,4156D530,00000000,00000000,00000000,00000000), ref: 00CBA40C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685521771.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_cba000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: ad583b6f9da3f9ff8e17fa54404647c85f36bb8085edac5a4d1577d6d4145148
                                                                                                    • Instruction ID: db2cdd96e7dff9920acad07be21227dbf80ce00ce7986262364b6300a6300af9
                                                                                                    • Opcode Fuzzy Hash: ad583b6f9da3f9ff8e17fa54404647c85f36bb8085edac5a4d1577d6d4145148
                                                                                                    • Instruction Fuzzy Hash: 3F317375505740AFE722CF15DC84F92BBF8EF15710F08849AE985CB692D364E909CB72
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 33 cba462-cba4c3 36 cba4c8-cba4d4 33->36 37 cba4c5 33->37 38 cba4d9-cba4f0 36->38 39 cba4d6 36->39 37->36 41 cba4f2-cba505 RegSetValueExW 38->41 42 cba527-cba52c 38->42 39->38 43 cba52e-cba533 41->43 44 cba507-cba524 41->44 42->41 43->44
                                                                                                    APIs
                                                                                                    • RegSetValueExW.KERNELBASE(?,00000E24,4156D530,00000000,00000000,00000000,00000000), ref: 00CBA4F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685521771.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_cba000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: 64d68bd9b62b9f60efeee4819be1d5090cd3c9cf15da490e9133a5ac9fdfd4ac
                                                                                                    • Instruction ID: a1a98a3d8315fcc56e591b612729e2a45322e5cd25ba4e4cb4c2c44d10159f20
                                                                                                    • Opcode Fuzzy Hash: 64d68bd9b62b9f60efeee4819be1d5090cd3c9cf15da490e9133a5ac9fdfd4ac
                                                                                                    • Instruction Fuzzy Hash: 33218E725047806FD7228F11DC44FA7BFB8EF56210F08849AE985DB652D264E948CB72
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 63 cbaa07-cbaa65 65 cbaa6a-cbaa70 63->65 66 cbaa67 63->66 67 cbaa72 65->67 68 cbaa75-cbaa7e 65->68 66->65 67->68 69 cbaac1-cbaac6 68->69 70 cbaa80-cbaaa0 CopyFileW 68->70 69->70 73 cbaac8-cbaacd 70->73 74 cbaaa2-cbaabe 70->74 73->74
                                                                                                    APIs
                                                                                                    • CopyFileW.KERNELBASE(?,?,?), ref: 00CBAA86
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685521771.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_cba000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CopyFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 1304948518-0
                                                                                                    • Opcode ID: e072db8494a88f7460756ce63a604322a68a252cac0f54a79410b04efe863f7e
                                                                                                    • Instruction ID: 2a19e59e32fb85a6a8e7419be80f5dcdee724848ea293f2fe81603c2274a3820
                                                                                                    • Opcode Fuzzy Hash: e072db8494a88f7460756ce63a604322a68a252cac0f54a79410b04efe863f7e
                                                                                                    • Instruction Fuzzy Hash: 372171B1509380AFD711CB25DD45B92BFF8EF16314F0984DAE884DB262E234E908DB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 48 cba646-cba695 51 cba69a-cba6a3 48->51 52 cba697 48->52 53 cba6a8-cba6b1 51->53 54 cba6a5 51->54 52->51 55 cba6b3-cba6bb CreateMutexW 53->55 56 cba702-cba707 53->56 54->53 58 cba6c1-cba6d7 55->58 56->55 59 cba709-cba70e 58->59 60 cba6d9-cba6ff 58->60 59->60
                                                                                                    APIs
                                                                                                    • CreateMutexW.KERNELBASE(?,?), ref: 00CBA6B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685521771.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_cba000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateMutex
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964310414-0
                                                                                                    • Opcode ID: cf555663cc402e858f52e28c967fec0cfe2c6aa758169e891185a23be07d6c76
                                                                                                    • Instruction ID: e339bc29ed6477b356eed684053813bad1bb6833da5e08c05b73dbbfcef0628f
                                                                                                    • Opcode Fuzzy Hash: cf555663cc402e858f52e28c967fec0cfe2c6aa758169e891185a23be07d6c76
                                                                                                    • Instruction Fuzzy Hash: 4921C2B56042009FE720CF26DD45BA6FBE8EF14314F08886AED84CB745E775E908CA72
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 76 cba392-cba3cf 78 cba3d1 76->78 79 cba3d4-cba3dd 76->79 78->79 80 cba3df 79->80 81 cba3e2-cba3e8 79->81 80->81 82 cba3ea 81->82 83 cba3ed-cba404 81->83 82->83 85 cba43b-cba440 83->85 86 cba406-cba419 RegQueryValueExW 83->86 85->86 87 cba41b-cba438 86->87 88 cba442-cba447 86->88 88->87
                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(?,00000E24,4156D530,00000000,00000000,00000000,00000000), ref: 00CBA40C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685521771.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_cba000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: 2b7bc127d6fe6613b9b600c9bf5041b176e274419491d1211f7f3a03fe297a75
                                                                                                    • Instruction ID: 835c037b17b8e99dc36510af0d20d419f2affc1702f21eac07b6e97fae1a78dc
                                                                                                    • Opcode Fuzzy Hash: 2b7bc127d6fe6613b9b600c9bf5041b176e274419491d1211f7f3a03fe297a75
                                                                                                    • Instruction Fuzzy Hash: D8218C75600204AFE720CE16DC84FA6B7ECEF14710F08846AE985CB651D7B4E909CAB2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 92 cba486-cba4c3 94 cba4c8-cba4d4 92->94 95 cba4c5 92->95 96 cba4d9-cba4f0 94->96 97 cba4d6 94->97 95->94 99 cba4f2-cba505 RegSetValueExW 96->99 100 cba527-cba52c 96->100 97->96 101 cba52e-cba533 99->101 102 cba507-cba524 99->102 100->99 101->102
                                                                                                    APIs
                                                                                                    • RegSetValueExW.KERNELBASE(?,00000E24,4156D530,00000000,00000000,00000000,00000000), ref: 00CBA4F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685521771.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_cba000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: 940ede7f47f62828e2f6cf827260a16bc3ee405d27337fd362d002530d4a7d9d
                                                                                                    • Instruction ID: 587c4f2b1da37b738c4240178736eed98778507b79806ef19b45847640a0db72
                                                                                                    • Opcode Fuzzy Hash: 940ede7f47f62828e2f6cf827260a16bc3ee405d27337fd362d002530d4a7d9d
                                                                                                    • Instruction Fuzzy Hash: 6E11BE72500700AFEB31CE16DC44FA6BBECEF14714F04846AED859AB51D374EA08CAB2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 106 cba2d2-cba2d4 107 cba2de-cba328 106->107 108 cba2d6-cba2dd 106->108 110 cba32a-cba33d SetErrorMode 107->110 111 cba353-cba358 107->111 108->107 112 cba35a-cba35f 110->112 113 cba33f-cba352 110->113 111->110 112->113
                                                                                                    APIs
                                                                                                    • SetErrorMode.KERNELBASE(?), ref: 00CBA330
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685521771.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_cba000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorMode
                                                                                                    • String ID:
                                                                                                    • API String ID: 2340568224-0
                                                                                                    • Opcode ID: 8d515995ae0e774bdf57ce3e54fcd4aaed7a71decc6ef2e9256f3425517ddf15
                                                                                                    • Instruction ID: 9d1cd877101b9d24c70f98487c98e89261953e0e1e7b2c4fc3a1ce54a7f88b7f
                                                                                                    • Opcode Fuzzy Hash: 8d515995ae0e774bdf57ce3e54fcd4aaed7a71decc6ef2e9256f3425517ddf15
                                                                                                    • Instruction Fuzzy Hash: 00212C7140D3C05FD7138B259C55A62BFB49F57224F0984DBDD848F2A3D269A908DB62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 116 cbac24-cbac6a 118 cbac6f-cbac78 116->118 119 cbac6c 116->119 120 cbac7a-cbac9a ShellExecuteExW 118->120 121 cbacb9-cbacbe 118->121 119->118 124 cbac9c-cbacb8 120->124 125 cbacc0-cbacc5 120->125 121->120 125->124
                                                                                                    APIs
                                                                                                    • ShellExecuteExW.SHELL32(?), ref: 00CBAC80
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685521771.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_cba000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExecuteShell
                                                                                                    • String ID:
                                                                                                    • API String ID: 587946157-0
                                                                                                    • Opcode ID: b73ec943489311a925384160b4d459fe5441e33ab514192216c96e2826b2bd3d
                                                                                                    • Instruction ID: 329d4d69b9828a8c05c58d1668d99b478b4d58b70310cda7e4cf0da0642e8cc7
                                                                                                    • Opcode Fuzzy Hash: b73ec943489311a925384160b4d459fe5441e33ab514192216c96e2826b2bd3d
                                                                                                    • Instruction Fuzzy Hash: 4B1163715093809FD712CF25DC95B52BFB8DF46210F0984EBED85CB652D275E908CB62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 127 cba8a4-cba8ed 129 cba8ef 127->129 130 cba8f2-cba8fb 127->130 129->130 131 cba8fd-cba91d SetFileAttributesW 130->131 132 cba93c-cba941 130->132 135 cba91f-cba93b 131->135 136 cba943-cba948 131->136 132->131 136->135
                                                                                                    APIs
                                                                                                    • SetFileAttributesW.KERNELBASE(?,?), ref: 00CBA903
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685521771.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_cba000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188754299-0
                                                                                                    • Opcode ID: c9ed11e0bea354ce9180e584093664aa9e808c114aa07b8821a011283fcd7805
                                                                                                    • Instruction ID: 023ad8eba1eed01082d201295f98216bf4e0724fce714c3a0a65278e64ca7bd4
                                                                                                    • Opcode Fuzzy Hash: c9ed11e0bea354ce9180e584093664aa9e808c114aa07b8821a011283fcd7805
                                                                                                    • Instruction Fuzzy Hash: 3311B6715043809FDB11CF25DC45B96BFE8EF56220F0984AAEC85CB652D235E944CB72
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 138 cbaa3e-cbaa65 139 cbaa6a-cbaa70 138->139 140 cbaa67 138->140 141 cbaa72 139->141 142 cbaa75-cbaa7e 139->142 140->139 141->142 143 cbaac1-cbaac6 142->143 144 cbaa80-cbaa88 CopyFileW 142->144 143->144 146 cbaa8e-cbaaa0 144->146 147 cbaac8-cbaacd 146->147 148 cbaaa2-cbaabe 146->148 147->148
                                                                                                    APIs
                                                                                                    • CopyFileW.KERNELBASE(?,?,?), ref: 00CBAA86
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685521771.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_cba000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CopyFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 1304948518-0
                                                                                                    • Opcode ID: 31924e573c63808444c299ee0c6eb94c02c09cab7b52332890dbfccd21bf6813
                                                                                                    • Instruction ID: d01dbc97e369c24dc5368d0d9bcdbc8b9cd57b0a7ecf1a61c3cebf288b51e917
                                                                                                    • Opcode Fuzzy Hash: 31924e573c63808444c299ee0c6eb94c02c09cab7b52332890dbfccd21bf6813
                                                                                                    • Instruction Fuzzy Hash: 3B1152716002409FEB20CF5ADD45796FBE8EF14710F08846ADD89DB751E674E904DE72
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 150 cba8c6-cba8ed 151 cba8ef 150->151 152 cba8f2-cba8fb 150->152 151->152 153 cba8fd-cba905 SetFileAttributesW 152->153 154 cba93c-cba941 152->154 155 cba90b-cba91d 153->155 154->153 157 cba91f-cba93b 155->157 158 cba943-cba948 155->158 158->157
                                                                                                    APIs
                                                                                                    • SetFileAttributesW.KERNELBASE(?,?), ref: 00CBA903
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685521771.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_cba000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188754299-0
                                                                                                    • Opcode ID: a6989e3e94031313c98e1be176e57e54a1b6cc1c12e636a01e6c72126065f292
                                                                                                    • Instruction ID: 403cab50658733424beefcac990bf7f0b9465b934c58ea3748cc65bff9a3baf4
                                                                                                    • Opcode Fuzzy Hash: a6989e3e94031313c98e1be176e57e54a1b6cc1c12e636a01e6c72126065f292
                                                                                                    • Instruction Fuzzy Hash: 55019671A002409FDB10CF1AD9447A6FBE4EF04320F0884AADD85CF751E775E948DA62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 160 cbac46-cbac6a 161 cbac6f-cbac78 160->161 162 cbac6c 160->162 163 cbac7a-cbac82 ShellExecuteExW 161->163 164 cbacb9-cbacbe 161->164 162->161 166 cbac88-cbac9a 163->166 164->163 167 cbac9c-cbacb8 166->167 168 cbacc0-cbacc5 166->168 168->167
                                                                                                    APIs
                                                                                                    • ShellExecuteExW.SHELL32(?), ref: 00CBAC80
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685521771.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_cba000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExecuteShell
                                                                                                    • String ID:
                                                                                                    • API String ID: 587946157-0
                                                                                                    • Opcode ID: a2e6ca9b4d744a25c7a0025a6330adfe764a50ce89c40a2a5b903b5a940509fd
                                                                                                    • Instruction ID: be2c54aef8aa2e0f15a9593644144cfd896617be7f10234e29c45ec2d770ed70
                                                                                                    • Opcode Fuzzy Hash: a2e6ca9b4d744a25c7a0025a6330adfe764a50ce89c40a2a5b903b5a940509fd
                                                                                                    • Instruction Fuzzy Hash: F30180716042009FDB10CF1AD9847A6BBE8DF04320F08C4AADD89CF752E375E908CAA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 170 cba2fe-cba328 171 cba32a-cba33d SetErrorMode 170->171 172 cba353-cba358 170->172 173 cba35a-cba35f 171->173 174 cba33f-cba352 171->174 172->171 173->174
                                                                                                    APIs
                                                                                                    • SetErrorMode.KERNELBASE(?), ref: 00CBA330
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685521771.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_cba000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorMode
                                                                                                    • String ID:
                                                                                                    • API String ID: 2340568224-0
                                                                                                    • Opcode ID: 10edd8744ca56b72aa2f9d5c554ddfbc8889ff56c0a31081c6ffd9f29f0da819
                                                                                                    • Instruction ID: 99d843ec6cf2173fdcd4ed252f354d9c0f0c66636d9dcd21a74d13bf7cb130d4
                                                                                                    • Opcode Fuzzy Hash: 10edd8744ca56b72aa2f9d5c554ddfbc8889ff56c0a31081c6ffd9f29f0da819
                                                                                                    • Instruction Fuzzy Hash: 2CF081359042409FDB20CF0AD9847A1FBE4EF04324F08C4AADD894F762D375E908CAA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 177 4c90958-4c90993 179 4c90999-4c90a22 177->179 180 4c90a2e-4c90a30 177->180 330 4c90a24 call a60606 179->330 331 4c90a24 call a605e0 179->331 181 4c90a37-4c90a3c 180->181 183 4c90b1e-4c90bc2 181->183 184 4c90a42-4c90a7a 181->184 220 4c90bc8-4c90c8b 183->220 221 4c90c9e-4c90ca7 183->221 200 4c90a7c-4c90a9a 184->200 201 4c90aa1-4c90afc 184->201 200->201 239 4c90b01 201->239 220->221 225 4c90cad-4c90d3e 221->225 226 4c90d51-4c90d5a 221->226 222 4c90a2a-4c90a2c 222->180 224 4c90a32 222->224 224->181 225->226 227 4c90d7a-4c90d83 226->227 228 4c90d5c-4c90d73 226->228 230 4c90da9-4c90db2 227->230 231 4c90d85-4c90d96 227->231 228->227 236 4c90db8-4c90e06 230->236 237 4c90f33-4c90f3a 230->237 231->230 257 4c90f1c-4c90f2d 236->257 239->183 257->237 259 4c90e0b-4c90e14 257->259 261 4c90e1a-4c90f1a 259->261 262 4c90f40-4c90fd1 259->262 261->257 311 4c90f3b 261->311 293 4c910ca 262->293 294 4c90fd7-4c90fe8 262->294 296 4c910cc-4c910d3 293->296 301 4c90fea-4c9100b 294->301 308 4c9100d 301->308 309 4c91012-4c91048 301->309 308->309 317 4c9104a 309->317 318 4c9104f-4c91077 309->318 311->262 317->318 322 4c91079-4c9107b 318->322 323 4c9107d-4c910a1 318->323 322->296 326 4c910aa-4c910b4 323->326 327 4c910a3-4c910a8 323->327 328 4c910ba-4c910c4 326->328 329 4c910b6-4c910b8 326->329 327->296 328->293 328->301 329->296 330->222 331->222
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685841405.0000000004C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C90000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4c90000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 99a5cc46d06128c8585986849080116c147d80900734faf9e924942f339df09c
                                                                                                    • Instruction ID: 5b2690789be6be6d2aa8e019ee31ba111be4fbc110c54e081f2085499111473a
                                                                                                    • Opcode Fuzzy Hash: 99a5cc46d06128c8585986849080116c147d80900734faf9e924942f339df09c
                                                                                                    • Instruction Fuzzy Hash: C0025935700210DFCB18EBB9D455A6E77E6EF88308B244479D406DB3A9EF39AC46CB91
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685841405.0000000004C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C90000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4c90000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d19d23090a4ee2311ef5c2d31ca13dfb87b61b7e5511bb7245b3616e78cd1995
                                                                                                    • Instruction ID: 5276e7b3e489bd23b979402636fdddfdbda8840155e6261342e767668fb22711
                                                                                                    • Opcode Fuzzy Hash: d19d23090a4ee2311ef5c2d31ca13dfb87b61b7e5511bb7245b3616e78cd1995
                                                                                                    • Instruction Fuzzy Hash: DC510F317002018FCB18ABBA941467D77E3EF85348B1845AAE402DB3A6DF39DD0697A6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685841405.0000000004C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C90000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4c90000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: fc549d089bdcb93f3ed96346a634d1d225349757e261ee8ee97f60c5120fda25
                                                                                                    • Instruction ID: 51951c4348a63de0bf96d8224dd8ad616c65854a495eb5b244473e0d33fd3aa4
                                                                                                    • Opcode Fuzzy Hash: fc549d089bdcb93f3ed96346a634d1d225349757e261ee8ee97f60c5120fda25
                                                                                                    • Instruction Fuzzy Hash: C051E031B002009FCB18BBBA94156BE37E7EB85344B04457AE402DB3A5EF39DD0697A2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685841405.0000000004C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C90000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4c90000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8243cb1e18dd3a939cc8e6406ed7523d33e2cf3c2723aa3720d0c9a0cd88b5a8
                                                                                                    • Instruction ID: 25392da379088d2af7e234998cca6284b037c84094cc4c8a474c85eb7fe6888f
                                                                                                    • Opcode Fuzzy Hash: 8243cb1e18dd3a939cc8e6406ed7523d33e2cf3c2723aa3720d0c9a0cd88b5a8
                                                                                                    • Instruction Fuzzy Hash: A351E131B002109FCB18BBBA94156BE36E7EFC5345B04447AE402DB3A5EF39DD0697A6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685841405.0000000004C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C90000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4c90000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: fcb96a49360ebf729d6afddc9e4a5e463e547327e681550e11cc9cada2a63db3
                                                                                                    • Instruction ID: 2c7502f558b00018132f0e5614c69ff42a13189795d48b448304bcaa40eed8ac
                                                                                                    • Opcode Fuzzy Hash: fcb96a49360ebf729d6afddc9e4a5e463e547327e681550e11cc9cada2a63db3
                                                                                                    • Instruction Fuzzy Hash: D741B131B001118FCB58B7BA94156BD36E7AFC5348B08447AE402EB3E5EF399D0697A6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685841405.0000000004C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C90000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4c90000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 7ba999c366f22dfbcf514979c5430a64e8b9c16c85937789f62f91721de31e55
                                                                                                    • Instruction ID: c49a5346fc25a58b86424ba941ea0d80e71083455b507ba53a334079bb3fa111
                                                                                                    • Opcode Fuzzy Hash: 7ba999c366f22dfbcf514979c5430a64e8b9c16c85937789f62f91721de31e55
                                                                                                    • Instruction Fuzzy Hash: 8C511135205242CFC724FFB9E585A9977B3EB94208744893ED0059B36EDB385D0BCB91
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685367823.0000000000A60000.00000040.00000020.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_a60000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b75fcf4f498925a55abb05386e63c4b2504353d861898c235984f293c7d20f34
                                                                                                    • Instruction ID: aa1588e71d5573d07cdaa1674b42cebad9162f4eabb9de2bf53ddf8dd08966a7
                                                                                                    • Opcode Fuzzy Hash: b75fcf4f498925a55abb05386e63c4b2504353d861898c235984f293c7d20f34
                                                                                                    • Instruction Fuzzy Hash: EE018BB65097805FD7118F06AC40862FFE8EB86620749C49BEC4D9B751D235B908CBB2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685841405.0000000004C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C90000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4c90000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 1927fdfde5dbe9b2e1efef8b44ff5661bcd459b6fd9279a0bc5166348e62cc48
                                                                                                    • Instruction ID: a73241c349f08efad32aae61859df5990df3501aa6128847a442ed95f0a4ce0f
                                                                                                    • Opcode Fuzzy Hash: 1927fdfde5dbe9b2e1efef8b44ff5661bcd459b6fd9279a0bc5166348e62cc48
                                                                                                    • Instruction Fuzzy Hash: DF012D30604302CFC704FB78E8594997BE1EB84309B01892EE486CB3AADB35C8099B92
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685367823.0000000000A60000.00000040.00000020.00020000.00000000.sdmp, Offset: 00A60000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_a60000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 27076b3cf566c763ccc91e3fe28a4a2eb0a3aae1fe409fd6df83764b81a980bc
                                                                                                    • Instruction ID: a4a66d97a01cdb692e088b23c5415bdd68fff7f10700ea502fac028a73c37e1e
                                                                                                    • Opcode Fuzzy Hash: 27076b3cf566c763ccc91e3fe28a4a2eb0a3aae1fe409fd6df83764b81a980bc
                                                                                                    • Instruction Fuzzy Hash: 67E092B66006004B9650CF0BFC41452F7D8EB84630708C47FDC0D8BB01E235B508CEA6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685510610.0000000000CB2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CB2000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_cb2000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: cf7f78bd4fcc6288fdb48920b54f481eb413a9ea14d433beffbb234a4127893e
                                                                                                    • Instruction ID: d6d1d56fb0522395c2fb073143ac1953ac6baafc22537adc879b7205c2522706
                                                                                                    • Opcode Fuzzy Hash: cf7f78bd4fcc6288fdb48920b54f481eb413a9ea14d433beffbb234a4127893e
                                                                                                    • Instruction Fuzzy Hash: E4D02E392406D04FD3228A0CC2A8BC53BD4AF41704F0A08F9A800CBB63CB28DA80EA00
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685510610.0000000000CB2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CB2000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_cb2000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 37ed65dc29493f34555542321c28f52a97fa63083cd99c855e1e46fb965e19aa
                                                                                                    • Instruction ID: d7c098431b7827cf404d9970e6b389af26da723f89ccbc8eab7ade2f369289fb
                                                                                                    • Opcode Fuzzy Hash: 37ed65dc29493f34555542321c28f52a97fa63083cd99c855e1e46fb965e19aa
                                                                                                    • Instruction Fuzzy Hash: 56D05E342002814BC725DA0CC6D4F9937D8AB45714F0648E8AC208B772C7A8D9C0DA10
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.1685841405.0000000004C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C90000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4c90000_b8UsrDOVGV.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f0085bf275f90b8d59db3796835b4f7f9b5157d5769bef08c515b422fffb9ae8
                                                                                                    • Instruction ID: ac94caab2378792f7fda985089b672511cddb77214a9282951fb5b2d403f3137
                                                                                                    • Opcode Fuzzy Hash: f0085bf275f90b8d59db3796835b4f7f9b5157d5769bef08c515b422fffb9ae8
                                                                                                    • Instruction Fuzzy Hash: 4EA00285650B0097C69126643CB52D22375E4813122E901524C0643709601EA90F1E31
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:17.3%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:4.5%
                                                                                                    Total number of Nodes:154
                                                                                                    Total number of Limit Nodes:7
                                                                                                    execution_graph 7193 5552696 7194 55526ce RegCreateKeyExW 7193->7194 7196 5552740 7194->7196 7066 27ba2fe 7067 27ba32a SetErrorMode 7066->7067 7068 27ba353 7066->7068 7069 27ba33f 7067->7069 7068->7067 7070 27ba172 7071 27ba1c2 EnumWindows 7070->7071 7072 27ba1ca 7071->7072 7073 27bb772 7076 27bb79e K32EnumProcesses 7073->7076 7075 27bb7ba 7076->7075 7077 50b1407 7078 50b140d 7077->7078 7083 50b1d5a 7078->7083 7088 50b1d47 7078->7088 7093 50b1cb8 7078->7093 7098 50b1d29 7078->7098 7084 50b1d61 7083->7084 7085 50b1ea4 7084->7085 7103 50b223f 7084->7103 7107 50b2250 7084->7107 7089 50b1d4e 7088->7089 7090 50b1ea4 7089->7090 7091 50b223f 2 API calls 7089->7091 7092 50b2250 2 API calls 7089->7092 7091->7090 7092->7090 7094 50b1cc6 7093->7094 7095 50b1ea4 7094->7095 7096 50b223f 2 API calls 7094->7096 7097 50b2250 2 API calls 7094->7097 7096->7095 7097->7095 7099 50b1d30 7098->7099 7100 50b1ea4 7099->7100 7101 50b223f 2 API calls 7099->7101 7102 50b2250 2 API calls 7099->7102 7101->7100 7102->7100 7104 50b227b 7103->7104 7105 50b22c3 7104->7105 7111 50b2868 7104->7111 7105->7085 7108 50b227b 7107->7108 7109 50b22c3 7108->7109 7110 50b2868 2 API calls 7108->7110 7109->7085 7110->7109 7112 50b289d 7111->7112 7116 5551716 7112->7116 7119 55516a6 7112->7119 7113 50b28d8 7113->7105 7117 5551766 GetVolumeInformationA 7116->7117 7118 555176e 7117->7118 7118->7113 7120 5551716 GetVolumeInformationA 7119->7120 7122 555176e 7120->7122 7122->7113 7123 27bb476 7124 27bb49f LookupPrivilegeValueW 7123->7124 7126 27bb4c6 7124->7126 7127 27bb5f6 7128 27bb625 AdjustTokenPrivileges 7127->7128 7130 27bb647 7128->7130 7197 27bb836 7198 27bb86b NtQuerySystemInformation 7197->7198 7199 27bb896 7197->7199 7200 27bb880 7198->7200 7199->7198 7201 27bafb6 7203 27bafeb GetFileType 7201->7203 7204 27bb018 7203->7204 7205 555161a 7206 555164f WSAConnect 7205->7206 7208 555166e 7206->7208 7209 5551086 7211 55510bb shutdown 7209->7211 7212 55510e4 7211->7212 7138 27bb96e 7139 27bb9ac DuplicateHandle 7138->7139 7140 27bb9e4 7138->7140 7141 27bb9ba 7139->7141 7140->7139 7213 27baaae 7214 27baada OleInitialize 7213->7214 7215 27bab10 7213->7215 7216 27baae8 7214->7216 7215->7214 7142 5552942 7144 555296b select 7142->7144 7145 55529a0 7144->7145 7146 555134e 7148 5551383 GetProcessTimes 7146->7148 7149 55513b5 7148->7149 7217 5552e8e 7220 5552ec3 GetProcessWorkingSetSize 7217->7220 7219 5552eef 7220->7219 7221 555048e 7224 55504c3 ReadFile 7221->7224 7223 55504f5 7224->7223 7150 27bac5a 7153 27bac83 SetFileAttributesW 7150->7153 7152 27bac9f 7153->7152 7225 27ba09a 7226 27ba0cf send 7225->7226 7227 27ba107 7225->7227 7228 27ba0dd 7226->7228 7227->7226 7154 55506f6 7156 555072e WSASocketW 7154->7156 7157 555076a 7156->7157 7229 27bae9e 7231 27baed6 CreateFileW 7229->7231 7232 27baf25 7231->7232 7158 5552f72 7159 5552fa7 SetProcessWorkingSetSize 7158->7159 7161 5552fd3 7159->7161 7233 5550c32 7234 5550c6a ConvertStringSecurityDescriptorToSecurityDescriptorW 7233->7234 7236 5550cab 7234->7236 7237 5552db2 7240 5552de7 GetExitCodeProcess 7237->7240 7239 5552e10 7240->7239 7162 27bab52 7163 27bab8a RegOpenKeyExW 7162->7163 7165 27babe0 7163->7165 7241 27ba392 7242 27ba3c7 RegQueryValueExW 7241->7242 7244 27ba41b 7242->7244 7166 50b1120 7167 50b1122 KiUserExceptionDispatcher 7166->7167 7168 50b1154 7167->7168 7169 27badd6 7171 27badff CopyFileW 7169->7171 7172 27bae26 7171->7172 7245 555143a 7246 5551475 getaddrinfo 7245->7246 7248 55514e7 7246->7248 7173 5552866 7175 555289b ioctlsocket 7173->7175 7176 55528c7 7175->7176 7177 27ba74e 7178 27ba77a FindCloseChangeNotification 7177->7178 7179 27ba7b9 7177->7179 7180 27ba788 7178->7180 7179->7178 7181 5550de2 7182 5550e1a MapViewOfFile 7181->7182 7184 5550e69 7182->7184 7249 55519a2 7251 55519dd LoadLibraryA 7249->7251 7252 5551a1a 7251->7252 7253 50b1c70 7254 50b18ba 7253->7254 7255 50b1d5a 2 API calls 7254->7255 7256 50b1d29 2 API calls 7254->7256 7257 50b1cb8 2 API calls 7254->7257 7258 50b1d47 2 API calls 7254->7258 7255->7254 7256->7254 7257->7254 7258->7254 7185 27ba646 7186 27ba67e CreateMutexW 7185->7186 7188 27ba6c1 7186->7188 7259 27baa06 7260 27baa35 WaitForInputIdle 7259->7260 7261 27baa6b 7259->7261 7262 27baa43 7260->7262 7261->7260 7263 27ba486 7266 27ba4bb RegSetValueExW 7263->7266 7265 27ba507 7266->7265
                                                                                                    APIs
                                                                                                    • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 027BB63F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AdjustPrivilegesToken
                                                                                                    • String ID:
                                                                                                    • API String ID: 2874748243-0
                                                                                                    • Opcode ID: 4260daeca1a00bab99d129bfd02fb86cc5f5c1ae3d151c28006a343e8f33547c
                                                                                                    • Instruction ID: 1d3ff24de3789b782003d9b2544242d6d51067a1524ca1ed48f100f103d3cd5c
                                                                                                    • Opcode Fuzzy Hash: 4260daeca1a00bab99d129bfd02fb86cc5f5c1ae3d151c28006a343e8f33547c
                                                                                                    • Instruction Fuzzy Hash: CC21BF75509780AFEB238F25DC44B92BFB4EF06314F09849AED848B563D274E908DB62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • NtQuerySystemInformation.NTDLL ref: 027BB871
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InformationQuerySystem
                                                                                                    • String ID:
                                                                                                    • API String ID: 3562636166-0
                                                                                                    • Opcode ID: f5ff40e79e3735da921e316afa9822116aec1d86f3cab5c0b97ab7cb99539660
                                                                                                    • Instruction ID: edd21066d2065dedfd8c74f26c4f6736b5be27a549c5d3070546817575db7160
                                                                                                    • Opcode Fuzzy Hash: f5ff40e79e3735da921e316afa9822116aec1d86f3cab5c0b97ab7cb99539660
                                                                                                    • Instruction Fuzzy Hash: AA21AE714097C0AFDB238B20DC45A92FFB0EF16214F0984CBED844B1A3D265A909DB62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 027BB63F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AdjustPrivilegesToken
                                                                                                    • String ID:
                                                                                                    • API String ID: 2874748243-0
                                                                                                    • Opcode ID: 8f130a32ea44e18eeac516f371f0cdb5c4803a8ae445eaf724c89ef438936fa8
                                                                                                    • Instruction ID: ec013d7b37533b3f39a3fd5368548963d7a5a0e956f70fe906aefeb0efc419de
                                                                                                    • Opcode Fuzzy Hash: 8f130a32ea44e18eeac516f371f0cdb5c4803a8ae445eaf724c89ef438936fa8
                                                                                                    • Instruction Fuzzy Hash: 951170715006449FEB21CF65D984BA6FBE4EF08228F08C86AED458B661D375E818DF61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • NtQuerySystemInformation.NTDLL ref: 027BB871
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InformationQuerySystem
                                                                                                    • String ID:
                                                                                                    • API String ID: 3562636166-0
                                                                                                    • Opcode ID: 2ec1230a953e1186461d1244b5cd147a6424124beba1f7edc0eb7ef804597bca
                                                                                                    • Instruction ID: a742b0aea172b750d16589fcf2451f93a2dd8419a02fdb8e676e839e7e2f5cfe
                                                                                                    • Opcode Fuzzy Hash: 2ec1230a953e1186461d1244b5cd147a6424124beba1f7edc0eb7ef804597bca
                                                                                                    • Instruction Fuzzy Hash: 14018F318046409FEF21CF15D985B61FBE0EF08224F08D4AADD455A761D375E418CBA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 0 50b1120-50b115b KiUserExceptionDispatcher 4 50b1163 0->4 5 50b1165-50b119e 4->5 9 50b11ed-50b11f0 5->9 10 50b11a0-50b11a2 5->10 11 50b126d-50b128a 9->11 12 50b11f2-50b1200 9->12 34 50b11a4 call 50b2cb8 10->34 35 50b11a4 call 2801048 10->35 36 50b11a4 call 280106e 10->36 12->5 13 50b1206-50b120a 12->13 15 50b125e-50b1268 13->15 16 50b120c-50b121d 13->16 14 50b11aa-50b11b9 17 50b11bb-50b11c0 call 50b3047 14->17 18 50b11ea 14->18 15->4 16->11 24 50b121f-50b122f 16->24 23 50b11c6-50b11e2 17->23 18->9 23->18 27 50b1231-50b123c 24->27 28 50b1250-50b1256 24->28 27->11 29 50b123e-50b1248 27->29 28->15 29->28 34->14 35->14 36->14
                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 050B1147
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078222974.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_50b0000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: 665f0f16ddb3477fad90916d9bc5c4ce0fcc9b20bfba413d184360f9e8c95431
                                                                                                    • Instruction ID: d7ce51ba47e56dc21c301736011ff0483a6a7e0b39d3b416e8caea2fe877504c
                                                                                                    • Opcode Fuzzy Hash: 665f0f16ddb3477fad90916d9bc5c4ce0fcc9b20bfba413d184360f9e8c95431
                                                                                                    • Instruction Fuzzy Hash: 7B41A431B002118FDB14EF79D894AAE77E2AF84204B188479D809DF39ADB38CD45CBA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 38 50b1117-50b111e 39 50b1122-50b114d KiUserExceptionDispatcher 38->39 40 50b1120-50b1121 38->40 41 50b1154-50b115b 39->41 40->39 43 50b1163 41->43 44 50b1165-50b119e 43->44 48 50b11ed-50b11f0 44->48 49 50b11a0-50b11a2 44->49 50 50b126d-50b128a 48->50 51 50b11f2-50b1200 48->51 74 50b11a4 call 50b2cb8 49->74 75 50b11a4 call 2801048 49->75 76 50b11a4 call 280106e 49->76 51->44 52 50b1206-50b120a 51->52 54 50b125e-50b1268 52->54 55 50b120c-50b121d 52->55 53 50b11aa-50b11b9 56 50b11bb-50b11c0 call 50b3047 53->56 57 50b11ea 53->57 54->43 55->50 63 50b121f-50b122f 55->63 62 50b11c6-50b11e2 56->62 57->48 62->57 66 50b1231-50b123c 63->66 67 50b1250-50b1256 63->67 66->50 68 50b123e-50b1248 66->68 67->54 68->67 74->53 75->53 76->53
                                                                                                    APIs
                                                                                                    • KiUserExceptionDispatcher.NTDLL ref: 050B1147
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078222974.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_50b0000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DispatcherExceptionUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 6842923-0
                                                                                                    • Opcode ID: 4afa74cde794c202721ecf0871950f372561ef9b93da68b682513e665496cdfc
                                                                                                    • Instruction ID: e1d204a044610afe8706aa0fcb1486c4e49eedbf047a3083714137a6717cdd98
                                                                                                    • Opcode Fuzzy Hash: 4afa74cde794c202721ecf0871950f372561ef9b93da68b682513e665496cdfc
                                                                                                    • Instruction Fuzzy Hash: 1E3193316002118FDB14DF75D8E4AAE77E6AF88204F188479D809DF39ADB38CD45CBA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 77 555266a-55526ee 81 55526f0 77->81 82 55526f3-55526ff 77->82 81->82 83 5552704-555270d 82->83 84 5552701 82->84 85 5552712-5552729 83->85 86 555270f 83->86 84->83 88 555276b-5552770 85->88 89 555272b-555273e RegCreateKeyExW 85->89 86->85 88->89 90 5552740-5552768 89->90 91 5552772-5552777 89->91 91->90
                                                                                                    APIs
                                                                                                    • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 05552731
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Create
                                                                                                    • String ID:
                                                                                                    • API String ID: 2289755597-0
                                                                                                    • Opcode ID: 81fa92f51e9ef98bc192ebceeb30f683caea47d610ad4203d3eca138601e5b58
                                                                                                    • Instruction ID: e9a8121fec0f00e9d8a831593b065133baf0a9903e4ce3c62d3702277452fd6a
                                                                                                    • Opcode Fuzzy Hash: 81fa92f51e9ef98bc192ebceeb30f683caea47d610ad4203d3eca138601e5b58
                                                                                                    • Instruction Fuzzy Hash: 3E318F76504744AFE722CB21DC44FA7BBFCFF15210F08859AE9858B662D324E908CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 96 55505e3-5550603 97 5550625-5550657 96->97 98 5550605-5550624 96->98 102 555065a-55506b2 RegQueryValueExW 97->102 98->97 104 55506b8-55506ce 102->104
                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 055506AA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: 08ec525f5d71eb59826ecc2d3877a7c55ba6f06139e3e99066c0d58bf12fb403
                                                                                                    • Instruction ID: 110e95ad1519773c7cb140ec0a8df6dfad416b9c2d30d08de891e70a417d5ecf
                                                                                                    • Opcode Fuzzy Hash: 08ec525f5d71eb59826ecc2d3877a7c55ba6f06139e3e99066c0d58bf12fb403
                                                                                                    • Instruction Fuzzy Hash: 9E319C6510E7C06FD3138B218C65A61BFB4EF87610F0E45CBD8C48F6A3D229A919D7B2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 120 5552d5c-5552e00 125 5552e02-5552e0a GetExitCodeProcess 120->125 126 5552e4b-5552e50 120->126 127 5552e10-5552e22 125->127 126->125 129 5552e24-5552e4a 127->129 130 5552e52-5552e57 127->130 130->129
                                                                                                    APIs
                                                                                                    • GetExitCodeProcess.KERNELBASE(?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 05552E08
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CodeExitProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 3861947596-0
                                                                                                    • Opcode ID: b9f34d8288bf52e2348a4af35c54d9d0e981e48ca6bf4c37f91e06452c4b7d7c
                                                                                                    • Instruction ID: 5be88b6a5ad6c9a8d976d63fb776239b53913470cbd5789f8d3af783554150c4
                                                                                                    • Opcode Fuzzy Hash: b9f34d8288bf52e2348a4af35c54d9d0e981e48ca6bf4c37f91e06452c4b7d7c
                                                                                                    • Instruction Fuzzy Hash: C9318C7550E3C05FE7138B608C54B96BFB8AF07210F0984DBE884CF1A3D6689809C772
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 105 5551418-55514d7 111 5551529-555152e 105->111 112 55514d9-55514e1 getaddrinfo 105->112 111->112 114 55514e7-55514f9 112->114 115 5551530-5551535 114->115 116 55514fb-5551526 114->116 115->116
                                                                                                    APIs
                                                                                                    • getaddrinfo.WS2_32(?,00000E24), ref: 055514DF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: getaddrinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 300660673-0
                                                                                                    • Opcode ID: ce37f4dea725ac03f8eaf4d3d0136ab01c4bb04f3e846cc402907af33f481976
                                                                                                    • Instruction ID: 1196f3d8d2c42528ea53bb516b83febd144288716a70452563bf4e30d0cc0601
                                                                                                    • Opcode Fuzzy Hash: ce37f4dea725ac03f8eaf4d3d0136ab01c4bb04f3e846cc402907af33f481976
                                                                                                    • Instruction Fuzzy Hash: 15318FB1504344AFEB21CB51DC44FA6BBACEF15314F04899AFA899B691D274E908CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 133 55516a6-5551768 GetVolumeInformationA 136 555176e-5551797 133->136
                                                                                                    APIs
                                                                                                    • GetVolumeInformationA.KERNELBASE(?,00000E24,?,?), ref: 05551766
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InformationVolume
                                                                                                    • String ID:
                                                                                                    • API String ID: 2039140958-0
                                                                                                    • Opcode ID: cbeb605eff813b7637a5aff8c3e2fb91b69f3b9c724998f23710e6c9757accf2
                                                                                                    • Instruction ID: 3ede64d4beea3d56aa3e9c3503152caf3ba6615e4e758eb8cefe74b89deab5d1
                                                                                                    • Opcode Fuzzy Hash: cbeb605eff813b7637a5aff8c3e2fb91b69f3b9c724998f23710e6c9757accf2
                                                                                                    • Instruction Fuzzy Hash: 8C318E7150D3C06FD3138B258C61AA2BFB8AF47210F1981CBD8C4DF6A3D225A959C7A2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 138 27bab1e-27babad 142 27babaf 138->142 143 27babb2-27babc9 138->143 142->143 145 27bac0b-27bac10 143->145 146 27babcb-27babde RegOpenKeyExW 143->146 145->146 147 27bac12-27bac17 146->147 148 27babe0-27bac08 146->148 147->148
                                                                                                    APIs
                                                                                                    • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 027BABD1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Open
                                                                                                    • String ID:
                                                                                                    • API String ID: 71445658-0
                                                                                                    • Opcode ID: b799697ee59efd9db56363f9d6042f63d3ebce847060de6cc6bea9ee3b85b09e
                                                                                                    • Instruction ID: 166a50e6cb9afea387054229d7f998a7deace89d5287b633e64f982a7937d86c
                                                                                                    • Opcode Fuzzy Hash: b799697ee59efd9db56363f9d6042f63d3ebce847060de6cc6bea9ee3b85b09e
                                                                                                    • Instruction Fuzzy Hash: C031A4724083846FE7228B61DC44FA7BFBCEF16214F08859AE985CB652D324E908C771
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 153 27ba612-27ba695 157 27ba69a-27ba6a3 153->157 158 27ba697 153->158 159 27ba6a8-27ba6b1 157->159 160 27ba6a5 157->160 158->157 161 27ba6b3-27ba6d7 CreateMutexW 159->161 162 27ba702-27ba707 159->162 160->159 165 27ba709-27ba70e 161->165 166 27ba6d9-27ba6ff 161->166 162->161 165->166
                                                                                                    APIs
                                                                                                    • CreateMutexW.KERNELBASE(?,?), ref: 027BA6B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateMutex
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964310414-0
                                                                                                    • Opcode ID: e63dfe039d82c069d277de6e4b7d0b7548199745fe36f6fb9f04be834423e789
                                                                                                    • Instruction ID: 8a11cdb443f6131b14ba06b89a6e9731d43589ba5f9ffe08de2c68084faf59f2
                                                                                                    • Opcode Fuzzy Hash: e63dfe039d82c069d277de6e4b7d0b7548199745fe36f6fb9f04be834423e789
                                                                                                    • Instruction Fuzzy Hash: E43191B55093806FE722CB25DC85F96BFF8EF06214F08849AE984CB692D375E909C771
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 184 5551310-55513a5 189 55513a7-55513af GetProcessTimes 184->189 190 55513f2-55513f7 184->190 191 55513b5-55513c7 189->191 190->189 193 55513f9-55513fe 191->193 194 55513c9-55513ef 191->194 193->194
                                                                                                    APIs
                                                                                                    • GetProcessTimes.KERNELBASE(?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 055513AD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ProcessTimes
                                                                                                    • String ID:
                                                                                                    • API String ID: 1995159646-0
                                                                                                    • Opcode ID: ccbbd408f8ee3c5c7df6313306995f554a87e1963c14cca0ea3bde220610f46b
                                                                                                    • Instruction ID: d2f167953a6e42697047cb2cc7b7272e796db7586851adb731c00e93d1f2b7fa
                                                                                                    • Opcode Fuzzy Hash: ccbbd408f8ee3c5c7df6313306995f554a87e1963c14cca0ea3bde220610f46b
                                                                                                    • Instruction Fuzzy Hash: 3531D7725097806FE7128F61DC55FA6BFB8EF16320F08849BE984CF592D2259909C771
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 169 5550c0c-5550c8d 173 5550c92-5550c9b 169->173 174 5550c8f 169->174 175 5550cf3-5550cf8 173->175 176 5550c9d-5550ca5 ConvertStringSecurityDescriptorToSecurityDescriptorW 173->176 174->173 175->176 177 5550cab-5550cbd 176->177 179 5550cbf-5550cf0 177->179 180 5550cfa-5550cff 177->180 180->179
                                                                                                    APIs
                                                                                                    • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 05550CA3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DescriptorSecurity$ConvertString
                                                                                                    • String ID:
                                                                                                    • API String ID: 3907675253-0
                                                                                                    • Opcode ID: 696b0b0a8dd92facc49e8b801257fa57211a07e04f09fcf5d908d254cf4db1eb
                                                                                                    • Instruction ID: f4fa3318d61c10c130b73dca82e742040e58657d077f58f2d0aa71c47366be17
                                                                                                    • Opcode Fuzzy Hash: 696b0b0a8dd92facc49e8b801257fa57211a07e04f09fcf5d908d254cf4db1eb
                                                                                                    • Instruction Fuzzy Hash: 27318471504344AFEB21CF64DC45FA6BBE8FF55210F08849AE945DB652D274E908CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 197 27bae79-27baef6 201 27baefb-27baf07 197->201 202 27baef8 197->202 203 27baf09 201->203 204 27baf0c-27baf15 201->204 202->201 203->204 205 27baf17-27baf3b CreateFileW 204->205 206 27baf66-27baf6b 204->206 209 27baf6d-27baf72 205->209 210 27baf3d-27baf63 205->210 206->205 209->210
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 027BAF1D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 823142352-0
                                                                                                    • Opcode ID: 2fc0c47c6b22175ad7396f21ccb7e24e1e7076d57e8017ae79d7cafc0159c16e
                                                                                                    • Instruction ID: 333b4533a17f5157c755b90cfc9b52512ea69b240dbb5ada3d3ff012aa90116c
                                                                                                    • Opcode Fuzzy Hash: 2fc0c47c6b22175ad7396f21ccb7e24e1e7076d57e8017ae79d7cafc0159c16e
                                                                                                    • Instruction Fuzzy Hash: D0319FB5504340AFEB21CF65DC85FA2BBF8EF05210F08849EE9858B652D375E908CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 213 5552696-55526ee 216 55526f0 213->216 217 55526f3-55526ff 213->217 216->217 218 5552704-555270d 217->218 219 5552701 217->219 220 5552712-5552729 218->220 221 555270f 218->221 219->218 223 555276b-5552770 220->223 224 555272b-555273e RegCreateKeyExW 220->224 221->220 223->224 225 5552740-5552768 224->225 226 5552772-5552777 224->226 226->225
                                                                                                    APIs
                                                                                                    • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 05552731
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Create
                                                                                                    • String ID:
                                                                                                    • API String ID: 2289755597-0
                                                                                                    • Opcode ID: 0e83a3b4a66af00a195ce57f5b55a72274f40b42b2121fc9d67c3a8e4e227587
                                                                                                    • Instruction ID: 559608a8833e87a38cc1dc3824415b3ef08db531e1e7cb562e457f07c3a129d9
                                                                                                    • Opcode Fuzzy Hash: 0e83a3b4a66af00a195ce57f5b55a72274f40b42b2121fc9d67c3a8e4e227587
                                                                                                    • Instruction Fuzzy Hash: A521A076500604AFEB21DE25DC44FA7BBECFF18620F08856AED45DA651D734E4088BB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 231 27ba361-27ba3cf 234 27ba3d1 231->234 235 27ba3d4-27ba3dd 231->235 234->235 236 27ba3df 235->236 237 27ba3e2-27ba3e8 235->237 236->237 238 27ba3ea 237->238 239 27ba3ed-27ba404 237->239 238->239 241 27ba43b-27ba440 239->241 242 27ba406-27ba419 RegQueryValueExW 239->242 241->242 243 27ba41b-27ba438 242->243 244 27ba442-27ba447 242->244 244->243
                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 027BA40C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: f5d249f57e973262e9f13a7da43a72072c5f52c1f4d30b366510b1d7ad435b33
                                                                                                    • Instruction ID: 3ef9ec9001d92e812ac126289ddb959c6eef785a005cdd6732b24c57372693bc
                                                                                                    • Opcode Fuzzy Hash: f5d249f57e973262e9f13a7da43a72072c5f52c1f4d30b366510b1d7ad435b33
                                                                                                    • Instruction Fuzzy Hash: 5031A075508780AFE722CF15CC84F92BFF8EF16214F08849AE985CB292D324E909CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 248 555143a-55514d7 253 5551529-555152e 248->253 254 55514d9-55514e1 getaddrinfo 248->254 253->254 256 55514e7-55514f9 254->256 257 5551530-5551535 256->257 258 55514fb-5551526 256->258 257->258
                                                                                                    APIs
                                                                                                    • getaddrinfo.WS2_32(?,00000E24), ref: 055514DF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: getaddrinfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 300660673-0
                                                                                                    • Opcode ID: 66bf3953f95df699f4377ea8ce64eb2686b3728baa0c9c37b9c6c6436e102673
                                                                                                    • Instruction ID: 2bf7e640c33c391d96b00406a277ba496741ab0f1d66483e78c4d1b9b2cf69e3
                                                                                                    • Opcode Fuzzy Hash: 66bf3953f95df699f4377ea8ce64eb2686b3728baa0c9c37b9c6c6436e102673
                                                                                                    • Instruction Fuzzy Hash: 3E21A171500204AEFB21DF61DC84FAAFBACEF14724F04885AFA89DA685D774E508CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • EnumWindows.USER32(?,00000E24,?,?), ref: 027BA1C2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnumWindows
                                                                                                    • String ID:
                                                                                                    • API String ID: 1129996299-0
                                                                                                    • Opcode ID: b282f2fe330ce98e238c3484d659bc6b9684b625236ca64db0af45c2333d2812
                                                                                                    • Instruction ID: ce3c36900807ab8397ecb40058bff5cf3d9fca07490afc63833f0e2a1cdb6d03
                                                                                                    • Opcode Fuzzy Hash: b282f2fe330ce98e238c3484d659bc6b9684b625236ca64db0af45c2333d2812
                                                                                                    • Instruction Fuzzy Hash: B921D17140D3C06FD3128B218C65B66BFB4EF87610F1985CBD8C4DF693D229A919CBA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 027BB4BE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LookupPrivilegeValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3899507212-0
                                                                                                    • Opcode ID: 1fecc824b27d14085f437bdce39c0c669df527ec6a0b0af9081d897c1bb7d393
                                                                                                    • Instruction ID: bebcd01d8f5c553df184379a3d1cfa8e50e4a3287fe52e081230b74eee1f56de
                                                                                                    • Opcode Fuzzy Hash: 1fecc824b27d14085f437bdce39c0c669df527ec6a0b0af9081d897c1bb7d393
                                                                                                    • Instruction Fuzzy Hash: 61215C715093C05FD7138B65DC55B92BFB8AF17224F0D84DBD984CB6A3D224A808C771
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: select
                                                                                                    • String ID:
                                                                                                    • API String ID: 1274211008-0
                                                                                                    • Opcode ID: da4ebe06fe5f2db9deb54235b3dac88c49e940e8d192e2f7a7d29148d4e74472
                                                                                                    • Instruction ID: acad010f7698ce8b6cb632a00b9d42b6eb02084cf3478231bdf7b48ad5e1ad83
                                                                                                    • Opcode Fuzzy Hash: da4ebe06fe5f2db9deb54235b3dac88c49e940e8d192e2f7a7d29148d4e74472
                                                                                                    • Instruction Fuzzy Hash: 17215C755083849FDB22CF25D854AA2BFF8FF06210F09849AED84CB262D234A948DB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetFileType.KERNELBASE(?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 027BB009
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileType
                                                                                                    • String ID:
                                                                                                    • API String ID: 3081899298-0
                                                                                                    • Opcode ID: 54b7b4440040cbfb24b5b4d0ad49f343f3fc68ffb68992ad80d2521efdac26a4
                                                                                                    • Instruction ID: 8baab4f443ae96676d1a02dd81af92653cb91fd02898946050b45b935633a093
                                                                                                    • Opcode Fuzzy Hash: 54b7b4440040cbfb24b5b4d0ad49f343f3fc68ffb68992ad80d2521efdac26a4
                                                                                                    • Instruction Fuzzy Hash: 4321F5B54097806FE7128B15DC85FA2BFBCEF56324F0985D6ED808B2A3D264A909C771
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegSetValueExW.KERNELBASE(?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 027BA4F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: ecf31449ecb46d63672ff26a516b08f90bf942a99c8a676b71c21d1be1b1e51f
                                                                                                    • Instruction ID: f647868cdd855dacee75e243761fb3c805a7915845bd2a0921259e5ef78404e3
                                                                                                    • Opcode Fuzzy Hash: ecf31449ecb46d63672ff26a516b08f90bf942a99c8a676b71c21d1be1b1e51f
                                                                                                    • Instruction Fuzzy Hash: 972190725083806FE722CF11DC44FA7BFB8EF56214F08849AE985DB692D364E948CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • WSASocketW.WS2_32(?,?,?,?,?), ref: 05550762
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Socket
                                                                                                    • String ID:
                                                                                                    • API String ID: 38366605-0
                                                                                                    • Opcode ID: c34d43b6e130018140cb102966f1762d6570cb573027a4825273e7b4400186f0
                                                                                                    • Instruction ID: d49b7c18aace5d4994a400ddbedd289680efef705f5c063cc39794b0b10e66fa
                                                                                                    • Opcode Fuzzy Hash: c34d43b6e130018140cb102966f1762d6570cb573027a4825273e7b4400186f0
                                                                                                    • Instruction Fuzzy Hash: 04217171505780AFE721CF51DC49F56FFB8EF05220F04889AE9858B696D275E908CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileView
                                                                                                    • String ID:
                                                                                                    • API String ID: 3314676101-0
                                                                                                    • Opcode ID: ac92a91a348409a220a64d627c8a9ecb8d8ddc4e2be12cb633638ecf44934992
                                                                                                    • Instruction ID: dfdeffbe1c83449f4b40b1e221f3441421417dff4b48e9f7707d7a6f78f3b626
                                                                                                    • Opcode Fuzzy Hash: ac92a91a348409a220a64d627c8a9ecb8d8ddc4e2be12cb633638ecf44934992
                                                                                                    • Instruction Fuzzy Hash: C721B171405380AFEB22CB15DC44F96FFF8EF19224F14889EE9848B692D375E908CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 027BAF1D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 823142352-0
                                                                                                    • Opcode ID: 177bf0e15d8217962110d37dbd241fad575d0e25b2ccfa19231a5f3899f49807
                                                                                                    • Instruction ID: 46ecb625bcd0acb1ea4103a6b9eafe72de1c7fc99dc64ceb3d74897e781a9ee0
                                                                                                    • Opcode Fuzzy Hash: 177bf0e15d8217962110d37dbd241fad575d0e25b2ccfa19231a5f3899f49807
                                                                                                    • Instruction Fuzzy Hash: 0821C1B2500200AFEB21DF65DD45FA6FBE8EF09214F04886AE985DB755D375E408CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 05550CA3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DescriptorSecurity$ConvertString
                                                                                                    • String ID:
                                                                                                    • API String ID: 3907675253-0
                                                                                                    • Opcode ID: d5ebd4fdb820a07a3834844b60af6a8b8c2c6ffc2755441e0d82735af99364d4
                                                                                                    • Instruction ID: bf5da7400c73bd358e5dff5eac3214e312c9e6c1d3608a94bc516e4a65fb5ad3
                                                                                                    • Opcode Fuzzy Hash: d5ebd4fdb820a07a3834844b60af6a8b8c2c6ffc2755441e0d82735af99364d4
                                                                                                    • Instruction Fuzzy Hash: 8921B071600204AFEB20DE24DC45FAAFBE8FF14320F04886AED45DA695D674E5088AB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 05550BB8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: 1915d734875d62700af19283893173724e9cbbeb7f4933f0e9c82f296b60a4ef
                                                                                                    • Instruction ID: eebdcc18a3f075f14adb6b25269b18471bc61318c35291101dffd98431650cd4
                                                                                                    • Opcode Fuzzy Hash: 1915d734875d62700af19283893173724e9cbbeb7f4933f0e9c82f296b60a4ef
                                                                                                    • Instruction Fuzzy Hash: CB219071508380AFD721CF11DC84F66BBF8EF05324F08849AE985CB6A2D265E948CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 027BABD1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Open
                                                                                                    • String ID:
                                                                                                    • API String ID: 71445658-0
                                                                                                    • Opcode ID: fe13d3bbdee7e3768afe47e3cc160130c5b260e9a7bef3f8a3488da7750f2ead
                                                                                                    • Instruction ID: 3ff528fe66fe2a92c1ac6fcca7962c84ce8147c8f5da5354eb5b35a5b7092b1e
                                                                                                    • Opcode Fuzzy Hash: fe13d3bbdee7e3768afe47e3cc160130c5b260e9a7bef3f8a3488da7750f2ead
                                                                                                    • Instruction Fuzzy Hash: 3921AEB2500204AFEB21EF15DC84FABFBECEF24214F04846AE9459B655D734E948CAB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetProcessWorkingSetSize.KERNEL32(?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 05552EE7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ProcessSizeWorking
                                                                                                    • String ID:
                                                                                                    • API String ID: 3584180929-0
                                                                                                    • Opcode ID: 39ac7e8585e68f5cb422dd09f0566cdf2618713b86422ca9d4674b89c244c3e5
                                                                                                    • Instruction ID: 910e5915b0ca384acb75f85d4a814fa44cd62fa45ab8af8207f0bce5f45aa0cd
                                                                                                    • Opcode Fuzzy Hash: 39ac7e8585e68f5cb422dd09f0566cdf2618713b86422ca9d4674b89c244c3e5
                                                                                                    • Instruction Fuzzy Hash: 4621C5715083806FE722CB11DC45FA6BFB8EF45220F08849BF944DB256D274E908CB75
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • CreateMutexW.KERNELBASE(?,?), ref: 027BA6B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateMutex
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964310414-0
                                                                                                    • Opcode ID: b329cf8981b3319e87d836172bf4ed255826a37eb19e07e85c6c208d6412e264
                                                                                                    • Instruction ID: 12ae5b032ca1bbdba66eec5dbc07596dc7971010daf9575a7aaffb94ad61b422
                                                                                                    • Opcode Fuzzy Hash: b329cf8981b3319e87d836172bf4ed255826a37eb19e07e85c6c208d6412e264
                                                                                                    • Instruction Fuzzy Hash: 2521CFB5604200AFE721DF25DD85FA6FBE8EF14224F04886AED84CB745D775E808CA71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • shutdown.WS2_32(?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 055510DC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: shutdown
                                                                                                    • String ID:
                                                                                                    • API String ID: 2510479042-0
                                                                                                    • Opcode ID: 6d80ee536d8a5c55f4d9895559eaf9b7d0cabb70cf1abf6496b5e4cd86df6dbe
                                                                                                    • Instruction ID: cdb69b959b48a96148b05642efb8df3b4259776cb3a6fbdcaba3bc80f823e72d
                                                                                                    • Opcode Fuzzy Hash: 6d80ee536d8a5c55f4d9895559eaf9b7d0cabb70cf1abf6496b5e4cd86df6dbe
                                                                                                    • Instruction Fuzzy Hash: 2F2195714097846FD712CB10DC45F56FFB8EF46220F0885DBE9849B256D278A948CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • ReadFile.KERNELBASE(?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 055504ED
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 2738559852-0
                                                                                                    • Opcode ID: 8c236b160cfcceb44c3ff0650d4bc480c4bb64ec85ac3cb145ff160ab0b7d7a5
                                                                                                    • Instruction ID: 9913c17f200f13175c4d318fa84a7dcde55bc6a85a448194bb4bc2472ba71756
                                                                                                    • Opcode Fuzzy Hash: 8c236b160cfcceb44c3ff0650d4bc480c4bb64ec85ac3cb145ff160ab0b7d7a5
                                                                                                    • Instruction Fuzzy Hash: 8A219271405380AFDB22CF51DC44FA6BFB8EF55320F08849AE9849B656D235E508CB75
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 027BA40C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: 843ad45e31f2cf57cfeca163a5595247dc16a4aa38d8abe0e04ba185cdcb85d0
                                                                                                    • Instruction ID: 63b1c96aaa90647f22b11b3fc5ac062b24575662c2778279ac4f357852ca4131
                                                                                                    • Opcode Fuzzy Hash: 843ad45e31f2cf57cfeca163a5595247dc16a4aa38d8abe0e04ba185cdcb85d0
                                                                                                    • Instruction Fuzzy Hash: 3021AC71600200AFEB21DE15CC84FA6B7ECEF14614F08846AED45DB691D774E808CA71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • ioctlsocket.WS2_32(?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 055528BF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ioctlsocket
                                                                                                    • String ID:
                                                                                                    • API String ID: 3577187118-0
                                                                                                    • Opcode ID: 9844c52712ca2f43ec11b416a8c0d259fce0cae90ee673dcff2b8f2757f60144
                                                                                                    • Instruction ID: 0be0594a44915492490590795d965b137200267c201df247d1a796774778948c
                                                                                                    • Opcode Fuzzy Hash: 9844c52712ca2f43ec11b416a8c0d259fce0cae90ee673dcff2b8f2757f60144
                                                                                                    • Instruction Fuzzy Hash: B221C3715093846FE722CF50DC44FA6FFB8EF55220F08849BE9849B656C274E908C772
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SetFileAttributesW.KERNELBASE(?,?), ref: 027BAC97
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188754299-0
                                                                                                    • Opcode ID: 556bf8ef5f89e4c0d5e53a40330fa6c855c542b5c5479cef1e9bb1e6c8f931fa
                                                                                                    • Instruction ID: 31b29846829159d8a9671bfa984b0be90d096bb824b0e3c5a6b86f433f10b82e
                                                                                                    • Opcode Fuzzy Hash: 556bf8ef5f89e4c0d5e53a40330fa6c855c542b5c5479cef1e9bb1e6c8f931fa
                                                                                                    • Instruction Fuzzy Hash: 0821D4715093C45FEB12CF25DC85B92BFE4EF06224F0984EAE8858B267D274A849CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 027BB6F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseFindNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 2591292051-0
                                                                                                    • Opcode ID: 4914a832575c7c0676e26933c64fb1ed03b2ef285d10fee3db145fef325ddc6d
                                                                                                    • Instruction ID: 2a5641f1d59a0ce7119a57f7a04e02835f14d8eb1cedbb8bb01833efa27c4ad8
                                                                                                    • Opcode Fuzzy Hash: 4914a832575c7c0676e26933c64fb1ed03b2ef285d10fee3db145fef325ddc6d
                                                                                                    • Instruction Fuzzy Hash: 8B21AE725093C05FEB138B25DC55B92BFB4AF47224F0984DAEC858F663D274A908CB72
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • K32EnumProcesses.KERNEL32(?,?,?,F600D256,00000000,?,?,?,?,?,?,?,?,6C8B3C58), ref: 027BB7B2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnumProcesses
                                                                                                    • String ID:
                                                                                                    • API String ID: 84517404-0
                                                                                                    • Opcode ID: 70bf1222ea15b4b6ca0a3d1848784fa690613fa2a3b73adfe7bfadc5d727a434
                                                                                                    • Instruction ID: 535d63d41b8dcdca00446e0fadd6748da28b781961cd293debbc7b57786e43c3
                                                                                                    • Opcode Fuzzy Hash: 70bf1222ea15b4b6ca0a3d1848784fa690613fa2a3b73adfe7bfadc5d727a434
                                                                                                    • Instruction Fuzzy Hash: 86215E715093809FDB12CB65DC95B92BFF8EF06214F0984EAE985CB662D234A908CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • WSASocketW.WS2_32(?,?,?,?,?), ref: 05550762
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Socket
                                                                                                    • String ID:
                                                                                                    • API String ID: 38366605-0
                                                                                                    • Opcode ID: 96a70c5f1f8e7208ce39a3c478d0e700381344b860e33dcd13231a9af8463d1a
                                                                                                    • Instruction ID: 4cea3fef683bea90fb65f42701fb2f9956c646d55d742faaf36da18f52c945e2
                                                                                                    • Opcode Fuzzy Hash: 96a70c5f1f8e7208ce39a3c478d0e700381344b860e33dcd13231a9af8463d1a
                                                                                                    • Instruction Fuzzy Hash: E021D171500200AFEB21CF65DC48FA6FBE4FF08320F04886AED858A696D375E409CBB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileView
                                                                                                    • String ID:
                                                                                                    • API String ID: 3314676101-0
                                                                                                    • Opcode ID: 7407c9905da8632a3a25671fcd6cc028f3654107c782b77ed805fa612967432f
                                                                                                    • Instruction ID: 20a36225cb2f0caa56a8fdc1182b8c0cf86a62adf605f45eedf44ce5a9e6d038
                                                                                                    • Opcode Fuzzy Hash: 7407c9905da8632a3a25671fcd6cc028f3654107c782b77ed805fa612967432f
                                                                                                    • Instruction Fuzzy Hash: 4521AE71500200AFEB21CF15DD49FA6FBE8EF18324F14886AE9858B695D375E408CBB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 05551666
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Connect
                                                                                                    • String ID:
                                                                                                    • API String ID: 3144859779-0
                                                                                                    • Opcode ID: a9ff588feab2860964e61c3e2e6a11ec69b4b411ab322bca7d1d3e7888792cca
                                                                                                    • Instruction ID: d0884702d526b33af2cb93478cf19a28e02e9eccab8d5f639217c29fbed625e6
                                                                                                    • Opcode Fuzzy Hash: a9ff588feab2860964e61c3e2e6a11ec69b4b411ab322bca7d1d3e7888792cca
                                                                                                    • Instruction Fuzzy Hash: EB219271508780AFDB228F51DC54B62BFF4FF06210F0988DAED858B662D235A818DB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • LoadLibraryA.KERNELBASE(?,00000E24), ref: 05551A0B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad
                                                                                                    • String ID:
                                                                                                    • API String ID: 1029625771-0
                                                                                                    • Opcode ID: a442e7dc967a6bdec6b68dd7bded3ee7fac18cf7c5f55fb79d05cc99f360d8a7
                                                                                                    • Instruction ID: 628c8eaba13d08e28f37e66b2915b6bea245f9e8a3eebd2bad98a8ff439ff9d0
                                                                                                    • Opcode Fuzzy Hash: a442e7dc967a6bdec6b68dd7bded3ee7fac18cf7c5f55fb79d05cc99f360d8a7
                                                                                                    • Instruction Fuzzy Hash: C011E4714043406FE721CB11DC85FA6FFB8EF45320F04809AFD849B692C278E948CB62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegSetValueExW.KERNELBASE(?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 027BA4F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: 2308ed1b3ad60d40287cf0a3acc6dc52eebefc301bb8572dc2717b14bd91577b
                                                                                                    • Instruction ID: 2d62a2167069cd8f1f3e3565f71cddc62c1cf8ce027661ddfbca4ec00275e600
                                                                                                    • Opcode Fuzzy Hash: 2308ed1b3ad60d40287cf0a3acc6dc52eebefc301bb8572dc2717b14bd91577b
                                                                                                    • Instruction Fuzzy Hash: 6711BE72500600AFEB32DE15DC44FA6BBECEF14614F04846AED45DA795D374E908CAB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 05550BB8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: 30a03f77b9a3b8c1ab52216637190a78bdb1f5eafa72bbf8e0fc397dc61fdab6
                                                                                                    • Instruction ID: 85fc0fc96bf934d2f10c7bd87dd4a32cdb27915a58cea8500ff08048439674e4
                                                                                                    • Opcode Fuzzy Hash: 30a03f77b9a3b8c1ab52216637190a78bdb1f5eafa72bbf8e0fc397dc61fdab6
                                                                                                    • Instruction Fuzzy Hash: 2911AF72504200AFEB21CF15DC84FAAB7E8FF14734F04846AED458A6A5D774E448CAB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • CopyFileW.KERNELBASE(?,?,?), ref: 027BAE1E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CopyFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 1304948518-0
                                                                                                    • Opcode ID: a694f5bc0a5fa72a2aa39c2c9839dece989fb904b69d613b9c73fe72df4da5e9
                                                                                                    • Instruction ID: 49e7c381d960b6ec17c844640a6545657dd5a5c80d4a0c01ca29df0720387ee9
                                                                                                    • Opcode Fuzzy Hash: a694f5bc0a5fa72a2aa39c2c9839dece989fb904b69d613b9c73fe72df4da5e9
                                                                                                    • Instruction Fuzzy Hash: F11184755043809FDB21CF65DC86B97BFE8EF45210F0984AAE985DB652D334E804CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 027BA780
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseFindNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 2591292051-0
                                                                                                    • Opcode ID: 6e1427ba3d8e34d7eeac448613e9e853c4d3f7d80c53318b2746daa44878e4f8
                                                                                                    • Instruction ID: 2ce8a7ce5cff932a1491156675d71f91790a68ec0637e4b12258381da9d2df58
                                                                                                    • Opcode Fuzzy Hash: 6e1427ba3d8e34d7eeac448613e9e853c4d3f7d80c53318b2746daa44878e4f8
                                                                                                    • Instruction Fuzzy Hash: 0E21D5B15083809FD712CF55DC85B52BFA8EF02324F09849BED448B653D334A905CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetProcessTimes.KERNELBASE(?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 055513AD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ProcessTimes
                                                                                                    • String ID:
                                                                                                    • API String ID: 1995159646-0
                                                                                                    • Opcode ID: 8eaaa56c83e924f68adab788dae03a42e423cfaf548f9de2a52e61d09f6262e3
                                                                                                    • Instruction ID: 8ad2d8cd75f4d66697e96a6a59ca5ac2ae74f3c19f1b941692dd9854caa64bce
                                                                                                    • Opcode Fuzzy Hash: 8eaaa56c83e924f68adab788dae03a42e423cfaf548f9de2a52e61d09f6262e3
                                                                                                    • Instruction Fuzzy Hash: BD11D371900600AFEB21CF55DC44FAABBE8EF14224F14886AEE85CAA55D375E408CBB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetProcessWorkingSetSize.KERNEL32(?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 05552EE7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ProcessSizeWorking
                                                                                                    • String ID:
                                                                                                    • API String ID: 3584180929-0
                                                                                                    • Opcode ID: 868f7a3b377b882ce5fea6d05dbc9c70f65041f2581dbdf0029890356e5e6b9b
                                                                                                    • Instruction ID: 11f9e563bd379614177c04ccd33448bdd00809a3aa3693448c2b9b2f62f82b09
                                                                                                    • Opcode Fuzzy Hash: 868f7a3b377b882ce5fea6d05dbc9c70f65041f2581dbdf0029890356e5e6b9b
                                                                                                    • Instruction Fuzzy Hash: 0C110176500200AFEB21CF15EC45FAABBA8EF14224F04886AFD45CF645D374E808CBB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 027BB9B2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DuplicateHandle
                                                                                                    • String ID:
                                                                                                    • API String ID: 3793708945-0
                                                                                                    • Opcode ID: aca1f71b1012604296d80586064e21f0e68bdfeed1f2257dbcb23138ac494fe4
                                                                                                    • Instruction ID: 67b4b20ab844a0559d7d1f8783a450b82c805800d2c9970c81e3e50f4685704c
                                                                                                    • Opcode Fuzzy Hash: aca1f71b1012604296d80586064e21f0e68bdfeed1f2257dbcb23138ac494fe4
                                                                                                    • Instruction Fuzzy Hash: 59118171409780AFDB228F51DC44B62FFF4EF4A310F0888DAED858B662C275A918DB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetExitCodeProcess.KERNELBASE(?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 05552E08
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CodeExitProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 3861947596-0
                                                                                                    • Opcode ID: 87395347a44d2c45b904e02da7d4e0abfe1242e23f7dbb6406f932af4ff62400
                                                                                                    • Instruction ID: b71d5a35ea450f74fc69063779058247209259d6c48013b3344d77e2520a5d7c
                                                                                                    • Opcode Fuzzy Hash: 87395347a44d2c45b904e02da7d4e0abfe1242e23f7dbb6406f932af4ff62400
                                                                                                    • Instruction Fuzzy Hash: 1C11C175600200AFEB21CB15DC85FBAB7E8EF54224F04847AED45DB645D678E9088BB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • ReadFile.KERNELBASE(?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 055504ED
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 2738559852-0
                                                                                                    • Opcode ID: ab4b01271f011f46f9e86bfaf064199567b903f60f6a021faa084d9e6892c74a
                                                                                                    • Instruction ID: 10ff5110a1249bb97145034c71914eaafb897a18510e1f9aee6a51b6f8f1b8e1
                                                                                                    • Opcode Fuzzy Hash: ab4b01271f011f46f9e86bfaf064199567b903f60f6a021faa084d9e6892c74a
                                                                                                    • Instruction Fuzzy Hash: A711BF72500200EFEB21CF55EC44FAAFBA8EF54324F04886AED459A695D375E508CBB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SetProcessWorkingSetSize.KERNEL32(00000000,?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 05552FCB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ProcessSizeWorking
                                                                                                    • String ID:
                                                                                                    • API String ID: 3584180929-0
                                                                                                    • Opcode ID: 79050d630f0f41d0637f0bf375cf899abaef79a538245d5fc63b7ba642b933da
                                                                                                    • Instruction ID: b7993fb438508a2262b5588caa2d7671c1bc45abcafb4b035af6b2768b2a8cf8
                                                                                                    • Opcode Fuzzy Hash: 79050d630f0f41d0637f0bf375cf899abaef79a538245d5fc63b7ba642b933da
                                                                                                    • Instruction Fuzzy Hash: 011160715097806FEB22CF61CC58F57BFB8AF06614F08889AF985DB196D274E804CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • ioctlsocket.WS2_32(?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 055528BF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ioctlsocket
                                                                                                    • String ID:
                                                                                                    • API String ID: 3577187118-0
                                                                                                    • Opcode ID: 0ec9aa66527c77ea4feb3b77d5e972e1851019672bb54774116f25f138a9c6bd
                                                                                                    • Instruction ID: d8404d7dfe3536b5b8858dcc8387f3be0fa23304af0c431a3806f77f2f6a16aa
                                                                                                    • Opcode Fuzzy Hash: 0ec9aa66527c77ea4feb3b77d5e972e1851019672bb54774116f25f138a9c6bd
                                                                                                    • Instruction Fuzzy Hash: FA11CE75900204AFEB21CF54DC84FA6FBA8EF54324F08886AED449B645C278E5088BB5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Initialize
                                                                                                    • String ID:
                                                                                                    • API String ID: 2538663250-0
                                                                                                    • Opcode ID: ccaec2e02aef01c71cc752c02bb1c4367aa1a64e4995574e845e24b15d2acd4a
                                                                                                    • Instruction ID: b55c4b030bf2c104f468cfb6a942c0ccbe8d01c25f9b33ca9547eea128e750fe
                                                                                                    • Opcode Fuzzy Hash: ccaec2e02aef01c71cc752c02bb1c4367aa1a64e4995574e845e24b15d2acd4a
                                                                                                    • Instruction Fuzzy Hash: CA1160715093C06FDB128B25DC55B92BFB4DF46220F0984DAED848F253C275A948CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • shutdown.WS2_32(?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 055510DC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: shutdown
                                                                                                    • String ID:
                                                                                                    • API String ID: 2510479042-0
                                                                                                    • Opcode ID: a3c34b667347f00ae0506f483ed304544852cd887bb7d107dbe68e1598a90bd9
                                                                                                    • Instruction ID: 5fc36d24e7aab786b201d0c1566e38fd57db2ccdb75489f1b150ffcbc8e6b180
                                                                                                    • Opcode Fuzzy Hash: a3c34b667347f00ae0506f483ed304544852cd887bb7d107dbe68e1598a90bd9
                                                                                                    • Instruction Fuzzy Hash: BE11C271500644AFEB21CF15DC45FA6FBA8EF44224F1488A7ED849F755D278E508CAB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SetErrorMode.KERNELBASE(?), ref: 027BA330
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorMode
                                                                                                    • String ID:
                                                                                                    • API String ID: 2340568224-0
                                                                                                    • Opcode ID: 28aee5a4084c49bd838ca0344e90c98403388788521e21085f87c81ee8fddfa8
                                                                                                    • Instruction ID: d63fcabcffa7e47f06f443b5f6e0f35a8cf9d055c3990fd27da0b17a28024a53
                                                                                                    • Opcode Fuzzy Hash: 28aee5a4084c49bd838ca0344e90c98403388788521e21085f87c81ee8fddfa8
                                                                                                    • Instruction Fuzzy Hash: 7A118F718093C06FDB238B15DC54BA2BFB4DF47220F0980CBED848B263C265A908D772
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • LoadLibraryA.KERNELBASE(?,00000E24), ref: 05551A0B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad
                                                                                                    • String ID:
                                                                                                    • API String ID: 1029625771-0
                                                                                                    • Opcode ID: d35eb2af0737bc31a0185d73169eb82b28ebfd427ffa09fa60fd26a8a7f0083d
                                                                                                    • Instruction ID: 8bfad37db181df23b90a5d857ea26d481fb2d810064bfbdb7d4a703c31a2f830
                                                                                                    • Opcode Fuzzy Hash: d35eb2af0737bc31a0185d73169eb82b28ebfd427ffa09fa60fd26a8a7f0083d
                                                                                                    • Instruction Fuzzy Hash: 3F11E571500740AEE721CB15DC45FB6FBA8EF14724F14845AEE449AB85D3B8F908CAB5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: select
                                                                                                    • String ID:
                                                                                                    • API String ID: 1274211008-0
                                                                                                    • Opcode ID: c29cf73153a719481b746ecc9e4fc1f11ff5c43d51c66c636da4188eceba1714
                                                                                                    • Instruction ID: b7cae8060336bbda043b77324e0886ba2881e6cdd3c60be04a8163ed88a35c59
                                                                                                    • Opcode Fuzzy Hash: c29cf73153a719481b746ecc9e4fc1f11ff5c43d51c66c636da4188eceba1714
                                                                                                    • Instruction Fuzzy Hash: 421149796042009FEB20CF55D884FA6FBE8FF04220F4888AADD49CB751D334E488CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: send
                                                                                                    • String ID:
                                                                                                    • API String ID: 2809346765-0
                                                                                                    • Opcode ID: b38b58a5c32806384bd7e24e83b81a35ced10be51b8f847ff64d46fe561330f3
                                                                                                    • Instruction ID: b4bf1afef23c6b646bb0f101a49439f4986357bffd7280cfeaa31666a34aaeb4
                                                                                                    • Opcode Fuzzy Hash: b38b58a5c32806384bd7e24e83b81a35ced10be51b8f847ff64d46fe561330f3
                                                                                                    • Instruction Fuzzy Hash: 3C119171509780AFDB22CF55DC44B52FFB4EF46224F08889AED848B652C275A918CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 027BB4BE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LookupPrivilegeValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3899507212-0
                                                                                                    • Opcode ID: 5c68bdd969bb9d1c33e6731004463885b1638b05c3c0e6d02ac481c19788d9f4
                                                                                                    • Instruction ID: 8997e9134b927f2840a7667be17a1a5e89eab98e6c930c37d462722cac179f0c
                                                                                                    • Opcode Fuzzy Hash: 5c68bdd969bb9d1c33e6731004463885b1638b05c3c0e6d02ac481c19788d9f4
                                                                                                    • Instruction Fuzzy Hash: 8411A1716042409FEB21CF2AD885BA6FBE8EF14224F0884AAED49DB751D334E408CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • CopyFileW.KERNELBASE(?,?,?), ref: 027BAE1E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CopyFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 1304948518-0
                                                                                                    • Opcode ID: 5c68bdd969bb9d1c33e6731004463885b1638b05c3c0e6d02ac481c19788d9f4
                                                                                                    • Instruction ID: 8e9b084ac39335e37831363d659c8a9836dd91aad42a7b8162c1bd02f2eb5a6e
                                                                                                    • Opcode Fuzzy Hash: 5c68bdd969bb9d1c33e6731004463885b1638b05c3c0e6d02ac481c19788d9f4
                                                                                                    • Instruction Fuzzy Hash: B51182756002409FEB21DF19D886B96FBE8EF04610F0884BADD49DB741D334E404CA71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetFileType.KERNELBASE(?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 027BB009
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileType
                                                                                                    • String ID:
                                                                                                    • API String ID: 3081899298-0
                                                                                                    • Opcode ID: 02140098977c8f00c75b665a4bfaca717e5978a375f3e01b618055941f8eb29f
                                                                                                    • Instruction ID: 1c72c5bbe1d8954577a0db03ae7e745eb88801c057e3d8ee38dbfef9392c1b9e
                                                                                                    • Opcode Fuzzy Hash: 02140098977c8f00c75b665a4bfaca717e5978a375f3e01b618055941f8eb29f
                                                                                                    • Instruction Fuzzy Hash: 2401C071504204AEE721CB05DD84FA6BBA8EF54628F14C0AAED449B785D378E908CAB5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • WaitForInputIdle.USER32(?,?), ref: 027BAA3B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: IdleInputWait
                                                                                                    • String ID:
                                                                                                    • API String ID: 2200289081-0
                                                                                                    • Opcode ID: 4f4f4dd5d06fc1082103677a4aaf76907777cdd97f3e280f70f7092a306a24fc
                                                                                                    • Instruction ID: 91102f8cff3b1ce4a1fdfe71b7080e28ed1c9f03d6d956e2280ce9f64ecf805d
                                                                                                    • Opcode Fuzzy Hash: 4f4f4dd5d06fc1082103677a4aaf76907777cdd97f3e280f70f7092a306a24fc
                                                                                                    • Instruction Fuzzy Hash: 0011A071408380AFDB22CF55DD84B52FFB4EF46220F0984DAED858F262D279A908CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • K32EnumProcesses.KERNEL32(?,?,?,F600D256,00000000,?,?,?,?,?,?,?,?,6C8B3C58), ref: 027BB7B2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnumProcesses
                                                                                                    • String ID:
                                                                                                    • API String ID: 84517404-0
                                                                                                    • Opcode ID: 01fae5ad85e66dbe0b180203b93c6e29bb51c71fc192c6e0bb198f5dd0921dae
                                                                                                    • Instruction ID: d359a149a6aff872ec3b025da0b12cd24add38a9a36420099bcb92ed7981fc40
                                                                                                    • Opcode Fuzzy Hash: 01fae5ad85e66dbe0b180203b93c6e29bb51c71fc192c6e0bb198f5dd0921dae
                                                                                                    • Instruction Fuzzy Hash: 1C11C0716002459FEB21CF29D884BA6FBE8EF04224F08C4ABED49CBB51D374E408CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 05551666
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Connect
                                                                                                    • String ID:
                                                                                                    • API String ID: 3144859779-0
                                                                                                    • Opcode ID: c6a46afee39d7b3c10600656c253812d152d53d2c441bd46fa2bc1cdf5bfee99
                                                                                                    • Instruction ID: 21563ac0e65c12fc19bd6675192b45c1e0770c473f5401bee268b45368dad130
                                                                                                    • Opcode Fuzzy Hash: c6a46afee39d7b3c10600656c253812d152d53d2c441bd46fa2bc1cdf5bfee99
                                                                                                    • Instruction Fuzzy Hash: DF117C31504A449FEB21CF55D944B62FFE5FF08220F0888AAED868BA62D335E418CF61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SetFileAttributesW.KERNELBASE(?,?), ref: 027BAC97
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188754299-0
                                                                                                    • Opcode ID: 99897c0a8107619bf678ab5fcec8a6a7aa3331f9e33d077ec26dec2c76cf006b
                                                                                                    • Instruction ID: 1633b076f2cebb81a72ebe9533ca0cb4927d977fb4fc1689434e0566f6f7c86e
                                                                                                    • Opcode Fuzzy Hash: 99897c0a8107619bf678ab5fcec8a6a7aa3331f9e33d077ec26dec2c76cf006b
                                                                                                    • Instruction Fuzzy Hash: 5901F5716012449FEB21DF19DC847A6FBE4EF04221F08C4AADD45DF742D374E404CA61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • EnumWindows.USER32(?,00000E24,?,?), ref: 027BA1C2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnumWindows
                                                                                                    • String ID:
                                                                                                    • API String ID: 1129996299-0
                                                                                                    • Opcode ID: eda924722a9716c7a88cabf7e376757ff347b1c6f5a1cf35602535ee88943c9e
                                                                                                    • Instruction ID: 220b5db8684cde4ee73e8136cb65d159ff6cfac8f3445240192e82393ee9ab4a
                                                                                                    • Opcode Fuzzy Hash: eda924722a9716c7a88cabf7e376757ff347b1c6f5a1cf35602535ee88943c9e
                                                                                                    • Instruction Fuzzy Hash: 5001BC71A00200ABD310DF16DC86B66FBE8EB88A20F14816AED489BB45D735F915CBE5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetVolumeInformationA.KERNELBASE(?,00000E24,?,?), ref: 05551766
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InformationVolume
                                                                                                    • String ID:
                                                                                                    • API String ID: 2039140958-0
                                                                                                    • Opcode ID: 26dbf1e290a6ce1be665b3a336c9f73cb3ab8a7629a12dcefb58aeb67510bad3
                                                                                                    • Instruction ID: be03b58b03c6f69df2491001ec46cdbaca38ca3bad824eab9e9231907b9fdafc
                                                                                                    • Opcode Fuzzy Hash: 26dbf1e290a6ce1be665b3a336c9f73cb3ab8a7629a12dcefb58aeb67510bad3
                                                                                                    • Instruction Fuzzy Hash: 5A01B171A00200ABD310DF16DC45B66FBE8EB88A20F14811AED489BB45D735F915CBE5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 027BB9B2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DuplicateHandle
                                                                                                    • String ID:
                                                                                                    • API String ID: 3793708945-0
                                                                                                    • Opcode ID: 158dcc3c402c45261b622a1e33e4d9db15d2333c1932fe160d3786c0ad975a01
                                                                                                    • Instruction ID: 68c088b9caa61baa79b7c3cc481d5e340069810687dab03d9ec54301d88144b0
                                                                                                    • Opcode Fuzzy Hash: 158dcc3c402c45261b622a1e33e4d9db15d2333c1932fe160d3786c0ad975a01
                                                                                                    • Instruction Fuzzy Hash: D501AD32404640DFDB22CF55D944B66FBE0EF08324F0888AAEE898A661C375E418CF62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 027BA780
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseFindNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 2591292051-0
                                                                                                    • Opcode ID: 09730a11371ee311fea09a1ac26c6f20e06f4a73981e02fc45c5adb7d3d78244
                                                                                                    • Instruction ID: c195ee7e97fd201619282eed66a4af0b968fed2dcd93a1a7cdba2e37db8b5de7
                                                                                                    • Opcode Fuzzy Hash: 09730a11371ee311fea09a1ac26c6f20e06f4a73981e02fc45c5adb7d3d78244
                                                                                                    • Instruction Fuzzy Hash: 6D01D4715042409FEB11DF15D9847A5FBE4DF04220F08C4ABDD459FB56D374E408CAA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 027BB6F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseFindNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 2591292051-0
                                                                                                    • Opcode ID: 1735ec27c107fecc4c1f2b11206c5f1ed05a65c2845c13d268877ef94df71a0b
                                                                                                    • Instruction ID: 98ad293cbe73dca320c287fb30c7241748d1ec2f1e3e02d9415bc0893c87ad88
                                                                                                    • Opcode Fuzzy Hash: 1735ec27c107fecc4c1f2b11206c5f1ed05a65c2845c13d268877ef94df71a0b
                                                                                                    • Instruction Fuzzy Hash: 4701D4715042408FDB21CF19D985796FBE4EF44224F08C4ABDD499FB55C274E408CE72
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 055506AA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: de557e5b95444bfb7b93b79ca9bf1decb59d79328a610838a7e37e82d0d707b3
                                                                                                    • Instruction ID: 47cad7c8c40ab76fa5f5df8a498790b062572241b5f8e574844c4a8e2ee0b4fc
                                                                                                    • Opcode Fuzzy Hash: de557e5b95444bfb7b93b79ca9bf1decb59d79328a610838a7e37e82d0d707b3
                                                                                                    • Instruction Fuzzy Hash: 8001A271500600ABD310DF16DC46B66FBE8FB88A20F14811AED489BB81D775F925CBE5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SetProcessWorkingSetSize.KERNEL32(00000000,?,00000E24,F600D256,00000000,00000000,00000000,00000000), ref: 05552FCB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078477653.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ProcessSizeWorking
                                                                                                    • String ID:
                                                                                                    • API String ID: 3584180929-0
                                                                                                    • Opcode ID: ac44f3a43ec7dd8d066691b62589e87deb96079095d2113bcd4ebccb8b734b74
                                                                                                    • Instruction ID: 109a6991163321d35b9fa60460c80fb248e7abb774ecf44bb55ab5178a993840
                                                                                                    • Opcode Fuzzy Hash: ac44f3a43ec7dd8d066691b62589e87deb96079095d2113bcd4ebccb8b734b74
                                                                                                    • Instruction Fuzzy Hash: A3011A70500740AFEB21CF65CC85F66BBECAF18614F148859B989DB695D678E804CB70
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: send
                                                                                                    • String ID:
                                                                                                    • API String ID: 2809346765-0
                                                                                                    • Opcode ID: a68d90b74b724bcc1837c8cbc3fa78ac61544c25b398e9773b0d3a46eeb35be9
                                                                                                    • Instruction ID: 64432e865607fdfc5ae77de0eaa26826fd71f431cf2b887a14f09f59ed2d15c3
                                                                                                    • Opcode Fuzzy Hash: a68d90b74b724bcc1837c8cbc3fa78ac61544c25b398e9773b0d3a46eeb35be9
                                                                                                    • Instruction Fuzzy Hash: 7F01B1315046409FEB21DF55D984BA1FBE0EF48320F08C8AADD499F656D375E408CB72
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • WaitForInputIdle.USER32(?,?), ref: 027BAA3B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: IdleInputWait
                                                                                                    • String ID:
                                                                                                    • API String ID: 2200289081-0
                                                                                                    • Opcode ID: 6f466a8be1b674a62f1fa4d5703eacb5a4302948fc67f57d8945a68354e5b034
                                                                                                    • Instruction ID: 1609ab05fd7a1c20687825cff3ecf965aa3ab14e499b04071afb2a5166b9be32
                                                                                                    • Opcode Fuzzy Hash: 6f466a8be1b674a62f1fa4d5703eacb5a4302948fc67f57d8945a68354e5b034
                                                                                                    • Instruction Fuzzy Hash: BD01DF319042409FEB21DF09D984BA2FBE4EF05220F08C8AADD499F756D379E408CAB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Initialize
                                                                                                    • String ID:
                                                                                                    • API String ID: 2538663250-0
                                                                                                    • Opcode ID: d811c44c6cfd99ad5f68b56dec7a3335f44cfbd26661d338e74b52528f76ec68
                                                                                                    • Instruction ID: 9c733caaed292bf4d82b9cc14fae4ddf1a49217c4dfb8c8b8b37714d6ba624b5
                                                                                                    • Opcode Fuzzy Hash: d811c44c6cfd99ad5f68b56dec7a3335f44cfbd26661d338e74b52528f76ec68
                                                                                                    • Instruction Fuzzy Hash: 7301D1719042409FEB21DF15D9847A2FBE4EF44220F08C8AADD489F756D379E448CEB2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SetErrorMode.KERNELBASE(?), ref: 027BA330
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075771478.00000000027BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorMode
                                                                                                    • String ID:
                                                                                                    • API String ID: 2340568224-0
                                                                                                    • Opcode ID: 32c6e93a7133bb44827b8fb2a339ce7aebe86d80ebafe6be75cf5f0b53296023
                                                                                                    • Instruction ID: 8fe2e28febd53c11ffa5314e404216e7daf574ff0967ca65ce28fa0d97f6fa12
                                                                                                    • Opcode Fuzzy Hash: 32c6e93a7133bb44827b8fb2a339ce7aebe86d80ebafe6be75cf5f0b53296023
                                                                                                    • Instruction Fuzzy Hash: 54F08C359042409FEB21DF09D9847A1FFE0EF04221F08C0AADD495F752D379E408CAA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4076041880.0000000002801000.00000040.00000020.00020000.00000000.sdmp, Offset: 02801000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_2801000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: ad009d65ac27344247c99b71c4c6178c316ba5dc5573759e79cbb8743a6e7c77
                                                                                                    • Instruction ID: 3c56432fac53e45933165394650a22201679265d60c39f6391ae4c76fee8a17c
                                                                                                    • Opcode Fuzzy Hash: ad009d65ac27344247c99b71c4c6178c316ba5dc5573759e79cbb8743a6e7c77
                                                                                                    • Instruction Fuzzy Hash: 89216D3910D3C08FC703CB608855A55BFB1EF4B718F1A86DAD488CB6A3C33A8856CB52
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078632251.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5960000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e17cd08c058be45c4e7464ce6737c44e6c8676f9692c6e428105f7576ad25579
                                                                                                    • Instruction ID: 8c7b1f837c63562b5d344c42f069efb151268a15ac482d58b3bc8b430a9b9ce2
                                                                                                    • Opcode Fuzzy Hash: e17cd08c058be45c4e7464ce6737c44e6c8676f9692c6e428105f7576ad25579
                                                                                                    • Instruction Fuzzy Hash: 7711B6B5908341AFD350CF19D880A5BFBE4FB98664F14896EF99897311D231E9188FA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4076041880.0000000002801000.00000040.00000020.00020000.00000000.sdmp, Offset: 02801000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_2801000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 71a457a13ae44df29b35e08526beb5f9304719e93543dd8b4022e910c27fa716
                                                                                                    • Instruction ID: 1432bbf49bca87e3d8dccb3f2ae5764cdeee62936b43a8dedbc48371c067c4dd
                                                                                                    • Opcode Fuzzy Hash: 71a457a13ae44df29b35e08526beb5f9304719e93543dd8b4022e910c27fa716
                                                                                                    • Instruction Fuzzy Hash: 2911E4382042849FD755CB54D984B26BBE1AB8971CF28C9ACE44D8BB92C73BD803CA51
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4076041880.0000000002801000.00000040.00000020.00020000.00000000.sdmp, Offset: 02801000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_2801000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8e561fd7ca1f4e2a5ccd5607ff373a856e17e95475ab2cb2bca0a42a7fc25944
                                                                                                    • Instruction ID: 5e0ef81a6f69db9f8cdf2f4061db9fa90d64f630432df9f0f046b905ee558e3c
                                                                                                    • Opcode Fuzzy Hash: 8e561fd7ca1f4e2a5ccd5607ff373a856e17e95475ab2cb2bca0a42a7fc25944
                                                                                                    • Instruction Fuzzy Hash: 7C215E7910D3C49FC707CB50C9A4B11BFB1AF4B714F1A85DAD4898BAA3C33A9816CB52
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078632251.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5960000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 65382417fb9333fdb671223bb7ecd08a9ee646c5dff218c07d64761439b565d9
                                                                                                    • Instruction ID: 162f4e7d8635a6128b10f04cd830e040ff5ac7014dfb3da4af7e437f279529c5
                                                                                                    • Opcode Fuzzy Hash: 65382417fb9333fdb671223bb7ecd08a9ee646c5dff218c07d64761439b565d9
                                                                                                    • Instruction Fuzzy Hash: 8E11FAB5908301AFD750CF09DC80E5BFBE8EB88660F14892EF95997311D231E908CFA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075827513.00000000027CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027CA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ca000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2bfafa62c6e79742ecfaf5e992fe35235c5a84dca9216defb4bb2bb50be69412
                                                                                                    • Instruction ID: 3fba2eecc8804ac02055b0ded27aeff008e2aa5a659d39ecc83890435e52a151
                                                                                                    • Opcode Fuzzy Hash: 2bfafa62c6e79742ecfaf5e992fe35235c5a84dca9216defb4bb2bb50be69412
                                                                                                    • Instruction Fuzzy Hash: C411FAB5908301AFD350CF09DC40E5BFBE8EB98660F14892EF95997311D231E908CFA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4076041880.0000000002801000.00000040.00000020.00020000.00000000.sdmp, Offset: 02801000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_2801000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 59c0e09748076c2fb87bfc6ebdc117b91751ae4a907fa1f5e22c6ab4ce1515bc
                                                                                                    • Instruction ID: 5efeb0293c7065ef62d0064077c1039b21ed9377e4c48f314fd6a45e710d5e24
                                                                                                    • Opcode Fuzzy Hash: 59c0e09748076c2fb87bfc6ebdc117b91751ae4a907fa1f5e22c6ab4ce1515bc
                                                                                                    • Instruction Fuzzy Hash: 1D01A2B65487806FD7118B45EC40852FFE8EF8623070984ABE8498B652D239B908CBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4076041880.0000000002801000.00000040.00000020.00020000.00000000.sdmp, Offset: 02801000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_2801000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0e3ffe0ab8b8bec43b0eca7ca5da45ad1ed39b609236ae5c53b800e7332b5d85
                                                                                                    • Instruction ID: 07252666d4d0f9ed36414c105984f025cf0685a36062e567b64e4978ddbd62fb
                                                                                                    • Opcode Fuzzy Hash: 0e3ffe0ab8b8bec43b0eca7ca5da45ad1ed39b609236ae5c53b800e7332b5d85
                                                                                                    • Instruction Fuzzy Hash: 91F01D39108644DFC706CB40D984B15FBA2FB89718F24CAADE94947B52C337D813DA81
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4076041880.0000000002801000.00000040.00000020.00020000.00000000.sdmp, Offset: 02801000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_2801000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3db65f45cb93e3768d43eac69ef2f2bc0872fcbac2cf8be750732ea54c257f17
                                                                                                    • Instruction ID: 7937a471374ebcc86ac0557f41829d756564d39da2429824aaf8a36141677542
                                                                                                    • Opcode Fuzzy Hash: 3db65f45cb93e3768d43eac69ef2f2bc0872fcbac2cf8be750732ea54c257f17
                                                                                                    • Instruction Fuzzy Hash: 71E092B6A046405B9650CF0AFC41452F7D8EB84631718C47FDC0D8B701D235F908CAA6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078632251.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5960000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 47f8be74dad80cce0d41ee6df3459ce310b2a0065cdef21e6abda0ff5ace0742
                                                                                                    • Instruction ID: 4e088e24577ba1145898629cf76ba2517fe3814fa11d8860efa60800a0abfe0e
                                                                                                    • Opcode Fuzzy Hash: 47f8be74dad80cce0d41ee6df3459ce310b2a0065cdef21e6abda0ff5ace0742
                                                                                                    • Instruction Fuzzy Hash: BBE092B290020467D6609E06AC45F53FB98DB80931F188566ED091A752D172B5148AB5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078632251.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5960000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a515e065827a26389723f91e212fcb60eac9335d08af80bede345d7113567520
                                                                                                    • Instruction ID: 5408e4bd90edcfc6a2e3add645c738f3775d6493cc67369236c5b81cf70ef4f8
                                                                                                    • Opcode Fuzzy Hash: a515e065827a26389723f91e212fcb60eac9335d08af80bede345d7113567520
                                                                                                    • Instruction Fuzzy Hash: 55E0D8B294020067D220DF06AC45F53FB98DB80931F18C567ED091B741D172F514CAF5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4078632251.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_5960000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c19b63768476d4f678971c412a6ca207edd9680b27b09350ad0b16966b042a69
                                                                                                    • Instruction ID: bb805c66b29f30223069fce4199328e666b3a81e7ae6ac6b83dca96ef68e4cad
                                                                                                    • Opcode Fuzzy Hash: c19b63768476d4f678971c412a6ca207edd9680b27b09350ad0b16966b042a69
                                                                                                    • Instruction Fuzzy Hash: 01E0D8B294020067D6608F06AC45F53FB98DB94931F18C567ED081B741D171F514CAF5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075827513.00000000027CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 027CA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27ca000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a7c0c3e1bbeddcadf182d34b7e48a859ec53368351010e58c506eee3dca185de
                                                                                                    • Instruction ID: faa0001c6d326b2a601ba70ffd0beb453563b71b78ff90efe61152c99e51826e
                                                                                                    • Opcode Fuzzy Hash: a7c0c3e1bbeddcadf182d34b7e48a859ec53368351010e58c506eee3dca185de
                                                                                                    • Instruction Fuzzy Hash: 79E0D8B294020467D2208F06AC45F53FB98DB90A31F18C567ED095B742D171F914CAF5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075739175.00000000027B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B2000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27b2000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9cc5fabfb295ef84b8abbe658f77501f63cda702f2d75a004e34bbf287da885b
                                                                                                    • Instruction ID: d0f074b065167860a78439ce4e5fbed40c580f30bb1f7512c5800b71c1a94560
                                                                                                    • Opcode Fuzzy Hash: 9cc5fabfb295ef84b8abbe658f77501f63cda702f2d75a004e34bbf287da885b
                                                                                                    • Instruction Fuzzy Hash: BED02E393026D04FD3238A0CC2A8BC53BD4AF41708F0A08F9AC00CBB63CB28D880D600
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.4075739175.00000000027B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B2000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_27b2000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0242d0a935e0634d7886a0fcd861a97a1ad8c4a2e9f6ea9fa54b1246b4b9d669
                                                                                                    • Instruction ID: 805eb4f7ec126a0dd15b181bc1ad345469a2d37100bc8ed22fbfdadb09632dcf
                                                                                                    • Opcode Fuzzy Hash: 0242d0a935e0634d7886a0fcd861a97a1ad8c4a2e9f6ea9fa54b1246b4b9d669
                                                                                                    • Instruction Fuzzy Hash: 68D05E342012814BC726DA0CC6D4F9937D4AF45718F0648E8AC108B762C7A4D8C0DA10
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:18.4%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:0%
                                                                                                    Total number of Nodes:12
                                                                                                    Total number of Limit Nodes:0
                                                                                                    execution_graph 549 25ca646 552 25ca67e CreateMutexW 549->552 551 25ca6c1 552->551 565 25ca361 566 25ca392 RegQueryValueExW 565->566 568 25ca41b 566->568 561 25ca612 564 25ca646 CreateMutexW 561->564 563 25ca6c1 564->563 569 25ca462 571 25ca486 RegSetValueExW 569->571 572 25ca507 571->572

                                                                                                    Callgraph

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 0 4ec0310-4ec0334 2 4ec033e-4ec0346 0->2 3 4ec0336-4ec0338 0->3 4 4ec034e-4ec0391 2->4 5 4ec0348-4ec034d 2->5 3->2 8 4ec03d8-4ec0418 4->8 9 4ec0393-4ec03ce 4->9 16 4ec041f-4ec0434 8->16 17 4ec041a 8->17 9->8 19 4ec046b-4ec0523 16->19 20 4ec0436-4ec0460 16->20 17->16 39 4ec0525-4ec0569 19->39 40 4ec0570-4ec0587 19->40 20->19 39->40 41 4ec058d-4ec05bf 40->41 42 4ec0880 40->42 41->42
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.1929062378.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_4ec0000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: [-j^$-[-j^$=[-j^
                                                                                                    • API String ID: 0-254388292
                                                                                                    • Opcode ID: 1236d53acfac69694dde2841d764c40f51244c34f6561a815ae6549835b3860f
                                                                                                    • Instruction ID: aac3842eee54585c567ea121cb268d88df4c99adb0ab06b68beff5d77ff748ee
                                                                                                    • Opcode Fuzzy Hash: 1236d53acfac69694dde2841d764c40f51244c34f6561a815ae6549835b3860f
                                                                                                    • Instruction Fuzzy Hash: EC511330B002118FC728ABB998506BE37E7ABC5348B58456DE402DB3D5EF39DC069B96
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 53 4ec03bd-4ec0418 61 4ec041f-4ec0434 53->61 62 4ec041a 53->62 64 4ec046b-4ec0523 61->64 65 4ec0436-4ec0460 61->65 62->61 84 4ec0525-4ec0569 64->84 85 4ec0570-4ec0587 64->85 65->64 84->85 86 4ec058d-4ec05bf 85->86 87 4ec0880 85->87 86->87
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.1929062378.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_4ec0000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: [-j^$-[-j^$=[-j^
                                                                                                    • API String ID: 0-254388292
                                                                                                    • Opcode ID: dfda12bd8b254192c0d832fe3e351b60375a1fd35f202552e0df43b156f94a1d
                                                                                                    • Instruction ID: 531eebdbc135e8cb3143e4ceb6a4cf3afe7ffc81d35b3939cda224c1da23f9c6
                                                                                                    • Opcode Fuzzy Hash: dfda12bd8b254192c0d832fe3e351b60375a1fd35f202552e0df43b156f94a1d
                                                                                                    • Instruction Fuzzy Hash: A841DA31B001118BC728B7BD95106BE36D76FC5248B58457DD402EB3A5EF39CC069BE6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 98 25ca612-25ca695 102 25ca69a-25ca6a3 98->102 103 25ca697 98->103 104 25ca6a8-25ca6b1 102->104 105 25ca6a5 102->105 103->102 106 25ca702-25ca707 104->106 107 25ca6b3-25ca6d7 CreateMutexW 104->107 105->104 106->107 110 25ca709-25ca70e 107->110 111 25ca6d9-25ca6ff 107->111 110->111
                                                                                                    APIs
                                                                                                    • CreateMutexW.KERNELBASE(?,?), ref: 025CA6B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.1928726467.00000000025CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 025CA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_25ca000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateMutex
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964310414-0
                                                                                                    • Opcode ID: 0a72f936950b373375dbe273b349bb905ddf3f72d53431ad8a34d8e3041bd125
                                                                                                    • Instruction ID: abb07391e1090daaf274a6244f9b1273d8faa6e9d5292ddafca1a78f85e2a808
                                                                                                    • Opcode Fuzzy Hash: 0a72f936950b373375dbe273b349bb905ddf3f72d53431ad8a34d8e3041bd125
                                                                                                    • Instruction Fuzzy Hash: C031CFB55093846FE712CB61CC84B96BFF8EF06214F18849AE984CB292E374E909C771
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 114 25ca361-25ca3cf 117 25ca3d4-25ca3dd 114->117 118 25ca3d1 114->118 119 25ca3df 117->119 120 25ca3e2-25ca3e8 117->120 118->117 119->120 121 25ca3ed-25ca404 120->121 122 25ca3ea 120->122 124 25ca43b-25ca440 121->124 125 25ca406-25ca419 RegQueryValueExW 121->125 122->121 124->125 126 25ca41b-25ca438 125->126 127 25ca442-25ca447 125->127 127->126
                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(?,00000E24,F761E865,00000000,00000000,00000000,00000000), ref: 025CA40C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.1928726467.00000000025CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 025CA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_25ca000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: dae52c0285131003a42fbb799dfba85325dcec7f72f835e0a696ddfc4fe24257
                                                                                                    • Instruction ID: ad04b8c7771ab249ffc9152a20544663d6cb6dc788aa74e1d4656003a0a68745
                                                                                                    • Opcode Fuzzy Hash: dae52c0285131003a42fbb799dfba85325dcec7f72f835e0a696ddfc4fe24257
                                                                                                    • Instruction Fuzzy Hash: 29319E75509784AFE722CF51CC84F92BFF8EF06614F08849AE985CB692D324E909CB75
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 131 25ca462-25ca4c3 134 25ca4c8-25ca4d4 131->134 135 25ca4c5 131->135 136 25ca4d9-25ca4f0 134->136 137 25ca4d6 134->137 135->134 139 25ca527-25ca52c 136->139 140 25ca4f2-25ca505 RegSetValueExW 136->140 137->136 139->140 141 25ca52e-25ca533 140->141 142 25ca507-25ca524 140->142 141->142
                                                                                                    APIs
                                                                                                    • RegSetValueExW.KERNELBASE(?,00000E24,F761E865,00000000,00000000,00000000,00000000), ref: 025CA4F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.1928726467.00000000025CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 025CA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_25ca000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: f5e698f2c5b62c877d479d2c80404df8fa7bf1c2353004de50b1d4db33b26cf5
                                                                                                    • Instruction ID: c579e7e89d31c53ce8974481530bcb2c1c5f99aeb7af467e708c5441f0eeab35
                                                                                                    • Opcode Fuzzy Hash: f5e698f2c5b62c877d479d2c80404df8fa7bf1c2353004de50b1d4db33b26cf5
                                                                                                    • Instruction Fuzzy Hash: B421B0725083846FEB22CF51DC44FA7BFB8EF06614F08849AE985CB652D364E808C771
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 146 25ca646-25ca695 149 25ca69a-25ca6a3 146->149 150 25ca697 146->150 151 25ca6a8-25ca6b1 149->151 152 25ca6a5 149->152 150->149 153 25ca702-25ca707 151->153 154 25ca6b3-25ca6bb CreateMutexW 151->154 152->151 153->154 155 25ca6c1-25ca6d7 154->155 157 25ca709-25ca70e 155->157 158 25ca6d9-25ca6ff 155->158 157->158
                                                                                                    APIs
                                                                                                    • CreateMutexW.KERNELBASE(?,?), ref: 025CA6B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.1928726467.00000000025CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 025CA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_25ca000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateMutex
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964310414-0
                                                                                                    • Opcode ID: 525a6856dbf27d39291b3a03f09c091464536540d556c3c95c49392fafcc4018
                                                                                                    • Instruction ID: 0d5313f24df621f3265972c85993f3dd07e3d148e97d35d21f4a310b69eda97f
                                                                                                    • Opcode Fuzzy Hash: 525a6856dbf27d39291b3a03f09c091464536540d556c3c95c49392fafcc4018
                                                                                                    • Instruction Fuzzy Hash: 7721DE71A00244AFE720DF65DD85BA6FBE8EF04224F14886EE9848B745E374E808CA75
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 161 25ca392-25ca3cf 163 25ca3d4-25ca3dd 161->163 164 25ca3d1 161->164 165 25ca3df 163->165 166 25ca3e2-25ca3e8 163->166 164->163 165->166 167 25ca3ed-25ca404 166->167 168 25ca3ea 166->168 170 25ca43b-25ca440 167->170 171 25ca406-25ca419 RegQueryValueExW 167->171 168->167 170->171 172 25ca41b-25ca438 171->172 173 25ca442-25ca447 171->173 173->172
                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(?,00000E24,F761E865,00000000,00000000,00000000,00000000), ref: 025CA40C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.1928726467.00000000025CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 025CA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_25ca000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: aa89d665e7b8662e9b388a7ae62e3044648c71c24c3e40c75acaca27c4bd7ae5
                                                                                                    • Instruction ID: 3cad51d1257d00de5db61f73d3d4c422d0280539ce7f115ad202b5149e19432c
                                                                                                    • Opcode Fuzzy Hash: aa89d665e7b8662e9b388a7ae62e3044648c71c24c3e40c75acaca27c4bd7ae5
                                                                                                    • Instruction Fuzzy Hash: 1F218C75600208AFEB21CF55CC88FA6BBECEF04614F18846AED45CB651E774E809CA75
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 177 25ca486-25ca4c3 179 25ca4c8-25ca4d4 177->179 180 25ca4c5 177->180 181 25ca4d9-25ca4f0 179->181 182 25ca4d6 179->182 180->179 184 25ca527-25ca52c 181->184 185 25ca4f2-25ca505 RegSetValueExW 181->185 182->181 184->185 186 25ca52e-25ca533 185->186 187 25ca507-25ca524 185->187 186->187
                                                                                                    APIs
                                                                                                    • RegSetValueExW.KERNELBASE(?,00000E24,F761E865,00000000,00000000,00000000,00000000), ref: 025CA4F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.1928726467.00000000025CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 025CA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_25ca000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: 8d8a934fb21564abda37dd5882c7dfcbda7963ea4faf4e2e16e4640f73f75fa2
                                                                                                    • Instruction ID: 34e8e859e9f0133890d96d06fd2a87a4d5fa62b2d94e6d1f00144ce7ba618e00
                                                                                                    • Opcode Fuzzy Hash: 8d8a934fb21564abda37dd5882c7dfcbda7963ea4faf4e2e16e4640f73f75fa2
                                                                                                    • Instruction Fuzzy Hash: 6811BE76600204AFEB21CE55DC84FA6BFECEF14614F14846AED459AB51E374E808CAB5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 191 4ec0080-4ec00ad 194 4ec00b8-4ec02f9 191->194
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.1929062378.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_4ec0000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 16ac1fede49c15924671d4b41de9aa0e432b339f4871361dcbfa40fc8a384cda
                                                                                                    • Instruction ID: c225cdcdfea9e79f246132fb8e875bc944899d6710dd005bdcedf3a9a4f167f6
                                                                                                    • Opcode Fuzzy Hash: 16ac1fede49c15924671d4b41de9aa0e432b339f4871361dcbfa40fc8a384cda
                                                                                                    • Instruction Fuzzy Hash: 9E513130605A92CBC714FF39ED85A9A77A3AB8424C7488D7DD005CB76EEB385D09DB81
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 232 4ec0018-4ec006d 234 4ec0070 call 4ec03bd 232->234 235 4ec0070 call 2601047 232->235 236 4ec0070 call 4ec0310 232->236 237 4ec0070 call 4ec0301 232->237 238 4ec0070 call 260106e 232->238 233 4ec0076 234->233 235->233 236->233 237->233 238->233
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.1929062378.0000000004EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EC0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_4ec0000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4190d20e5c723d28882309360325908305a5885805d393c63ad51e0736e0ada5
                                                                                                    • Instruction ID: 391beaa43e2184bf8a5b4b5a94528c7f277589b1e38ff6ab9af08c998669a9d2
                                                                                                    • Opcode Fuzzy Hash: 4190d20e5c723d28882309360325908305a5885805d393c63ad51e0736e0ada5
                                                                                                    • Instruction Fuzzy Hash: 87F05AA684E3C01FDB534B645CAA5E53FB09D2711034A05C3D882CB8A3E41D5A0FDB66
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 239 2601047-2601088 241 260108e-26010ab 239->241
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.1928796333.0000000002601000.00000040.00000020.00020000.00000000.sdmp, Offset: 02601000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_2601000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c7e336f75b0342e2b2bafa9214f01a60da8584d8ba2d619f9b904cf7e1e0b4e5
                                                                                                    • Instruction ID: 47e5274d67c8cc29698247f0e49d36bfd74e7a04a852ba79db0f6590769adc6c
                                                                                                    • Opcode Fuzzy Hash: c7e336f75b0342e2b2bafa9214f01a60da8584d8ba2d619f9b904cf7e1e0b4e5
                                                                                                    • Instruction Fuzzy Hash: 0F0149B50087805FC3518B06EC40893BFE8DF8663030984ABEC898B722D275BD08CBB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 242 260106e-2601088 243 260108e-26010ab 242->243
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.1928796333.0000000002601000.00000040.00000020.00020000.00000000.sdmp, Offset: 02601000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_2601000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 46b63dc5b081347e175d8578caa2c970dec88688a7ba96f5344c018a87d01484
                                                                                                    • Instruction ID: 1108d1535dbcf2b8fffc51b5fcf933feb8e2ee3401d56cad5077d54469a92fcd
                                                                                                    • Opcode Fuzzy Hash: 46b63dc5b081347e175d8578caa2c970dec88688a7ba96f5344c018a87d01484
                                                                                                    • Instruction Fuzzy Hash: A3E092B66046408B9650CF0BEC45452F7D8EB88A30718C47FDC0D8BB01E275F508CAA6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 244 25c23f4-25c23ff 245 25c2401-25c240e 244->245 246 25c2412-25c2417 244->246 245->246 247 25c2419 246->247 248 25c241a 246->248 249 25c2420-25c2421 248->249
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.1928715487.00000000025C2000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C2000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_25c2000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 459a9819f883e6fac73b8a71e41194b9719f93e7177c4673491e0679542e45ca
                                                                                                    • Instruction ID: bd7dc70f79c043a3e3821abe24909c1fa8509872774d41b0eb9701052b36f3bf
                                                                                                    • Opcode Fuzzy Hash: 459a9819f883e6fac73b8a71e41194b9719f93e7177c4673491e0679542e45ca
                                                                                                    • Instruction Fuzzy Hash: 24D05E7A2056D14FD3269A1CC6A8B953BE4BB55718F5A48FDAC00CB763CB78D581D600
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 250 25c23bc-25c23c3 251 25c23c5-25c23d2 250->251 252 25c23d6-25c23db 250->252 251->252 253 25c23dd-25c23e0 252->253 254 25c23e1 252->254 255 25c23e7-25c23e8 254->255
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.1928715487.00000000025C2000.00000040.00000800.00020000.00000000.sdmp, Offset: 025C2000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_25c2000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b8d26d5d760faf2536dce800fe2141a96f71df0d866a84b9c1fa2a07e3f6cf76
                                                                                                    • Instruction ID: 5451e17b5fc4485977eed7483c2ee699fe343d1b2839ecbbc85393679e8c38c6
                                                                                                    • Opcode Fuzzy Hash: b8d26d5d760faf2536dce800fe2141a96f71df0d866a84b9c1fa2a07e3f6cf76
                                                                                                    • Instruction Fuzzy Hash: DED05E343102814FC725DA0CC6D4F593BD4BB45B18F1648ECAC10CB762C7A8D8C0DA00
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:18.4%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:0%
                                                                                                    Total number of Nodes:12
                                                                                                    Total number of Limit Nodes:0
                                                                                                    execution_graph 564 12ba462 566 12ba486 RegSetValueExW 564->566 567 12ba507 566->567 572 12ba612 573 12ba646 CreateMutexW 572->573 575 12ba6c1 573->575 568 12ba361 569 12ba392 RegQueryValueExW 568->569 571 12ba41b 569->571 560 12ba646 561 12ba67e CreateMutexW 560->561 563 12ba6c1 561->563

                                                                                                    Callgraph

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 0 5550310-5550334 2 5550336-5550338 0->2 3 555033e-5550346 0->3 2->3 4 555034e-5550391 3->4 5 5550348-555034d 3->5 8 5550393-55503ce 4->8 9 55503d8-5550418 4->9 8->9 16 555041f-5550434 9->16 17 555041a 9->17 19 5550436-5550460 16->19 20 555046b-5550523 16->20 17->16 19->20 39 5550525-5550569 20->39 40 5550570-5550587 20->40 39->40 41 5550880 40->41 42 555058d-55505bf 40->42 42->41
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2023322687.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: [^k^$-[^k^$=[^k^
                                                                                                    • API String ID: 0-3832217768
                                                                                                    • Opcode ID: 1a7d094b579c8261e6c1c2c76692f4cefe567da3d21b403e5095317a31a5a486
                                                                                                    • Instruction ID: 5045ad3f499b4e12708ed86583f5e574c8cebedbd1e1c95242c92fbac0359e11
                                                                                                    • Opcode Fuzzy Hash: 1a7d094b579c8261e6c1c2c76692f4cefe567da3d21b403e5095317a31a5a486
                                                                                                    • Instruction Fuzzy Hash: 9151FE307002008BD718EB7994686BE37E7BBC5384B048969E906DB3E0DF398C4687A2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 53 55503bd-5550418 61 555041f-5550434 53->61 62 555041a 53->62 64 5550436-5550460 61->64 65 555046b-5550523 61->65 62->61 64->65 84 5550525-5550569 65->84 85 5550570-5550587 65->85 84->85 86 5550880 85->86 87 555058d-55505bf 85->87 87->86
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2023322687.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: [^k^$-[^k^$=[^k^
                                                                                                    • API String ID: 0-3832217768
                                                                                                    • Opcode ID: ab37992690d683c906f00588f20717d3bc78f03876ba30ab17bcd25e4f00b33b
                                                                                                    • Instruction ID: fbd97e2e9612653f4e5e2924718d5f174d65bc99e4b16a945ea8ef6ffa624a03
                                                                                                    • Opcode Fuzzy Hash: ab37992690d683c906f00588f20717d3bc78f03876ba30ab17bcd25e4f00b33b
                                                                                                    • Instruction Fuzzy Hash: DA41E231B002118BD718E77990686BD32E7AFD5688704496DE506EF3E4DF3D8C4687A2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 98 12ba612-12ba695 102 12ba69a-12ba6a3 98->102 103 12ba697 98->103 104 12ba6a8-12ba6b1 102->104 105 12ba6a5 102->105 103->102 106 12ba6b3-12ba6d7 CreateMutexW 104->106 107 12ba702-12ba707 104->107 105->104 110 12ba709-12ba70e 106->110 111 12ba6d9-12ba6ff 106->111 107->106 110->111
                                                                                                    APIs
                                                                                                    • CreateMutexW.KERNELBASE(?,?), ref: 012BA6B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2022873809.00000000012BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_12ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateMutex
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964310414-0
                                                                                                    • Opcode ID: e234394b4bc356b2d343e9510bee8e8afca3323629514d55c736f3d875c4d91d
                                                                                                    • Instruction ID: 02ea0d0edd63ad69f45631709cc52841a58f49f54e164d7bfa49373e0fb684dd
                                                                                                    • Opcode Fuzzy Hash: e234394b4bc356b2d343e9510bee8e8afca3323629514d55c736f3d875c4d91d
                                                                                                    • Instruction Fuzzy Hash: 1E318FB55093806FE722CB25DC85B96BFF8EF06310F08849AE984CB293D375E909C761
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 114 12ba361-12ba3cf 117 12ba3d1 114->117 118 12ba3d4-12ba3dd 114->118 117->118 119 12ba3df 118->119 120 12ba3e2-12ba3e8 118->120 119->120 121 12ba3ea 120->121 122 12ba3ed-12ba404 120->122 121->122 124 12ba43b-12ba440 122->124 125 12ba406-12ba419 RegQueryValueExW 122->125 124->125 126 12ba41b-12ba438 125->126 127 12ba442-12ba447 125->127 127->126
                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(?,00000E24,7D8F8FA0,00000000,00000000,00000000,00000000), ref: 012BA40C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2022873809.00000000012BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_12ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: 1d3a2e57694d26e3df9093fe3ba64241972a87da7c42eea392a25623393afd26
                                                                                                    • Instruction ID: 44daada3c385ec194121bca171b4c52ef8302b47949b12285547d2fd0b83e9a6
                                                                                                    • Opcode Fuzzy Hash: 1d3a2e57694d26e3df9093fe3ba64241972a87da7c42eea392a25623393afd26
                                                                                                    • Instruction Fuzzy Hash: D7318E75509780AFE722CF15DC84F92BBF8EF06310F08849AE985CB292D364E909CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 131 12ba462-12ba4c3 134 12ba4c8-12ba4d4 131->134 135 12ba4c5 131->135 136 12ba4d9-12ba4f0 134->136 137 12ba4d6 134->137 135->134 139 12ba4f2-12ba505 RegSetValueExW 136->139 140 12ba527-12ba52c 136->140 137->136 141 12ba52e-12ba533 139->141 142 12ba507-12ba524 139->142 140->139 141->142
                                                                                                    APIs
                                                                                                    • RegSetValueExW.KERNELBASE(?,00000E24,7D8F8FA0,00000000,00000000,00000000,00000000), ref: 012BA4F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2022873809.00000000012BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_12ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: 9f140467ff6736515fb5129cac3743e216b944ea763f35ea52c6727c495962bd
                                                                                                    • Instruction ID: 9fe3f08093a6cbe3c39bf43cfb2e3a024ae385803c9dfe1314c5b60adf02904b
                                                                                                    • Opcode Fuzzy Hash: 9f140467ff6736515fb5129cac3743e216b944ea763f35ea52c6727c495962bd
                                                                                                    • Instruction Fuzzy Hash: 302181725043806FE7228F15DC44FA7BFB8DF45310F08849AE985DB652D364E948C771
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 146 12ba646-12ba695 149 12ba69a-12ba6a3 146->149 150 12ba697 146->150 151 12ba6a8-12ba6b1 149->151 152 12ba6a5 149->152 150->149 153 12ba6b3-12ba6bb CreateMutexW 151->153 154 12ba702-12ba707 151->154 152->151 156 12ba6c1-12ba6d7 153->156 154->153 157 12ba709-12ba70e 156->157 158 12ba6d9-12ba6ff 156->158 157->158
                                                                                                    APIs
                                                                                                    • CreateMutexW.KERNELBASE(?,?), ref: 012BA6B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2022873809.00000000012BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_12ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateMutex
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964310414-0
                                                                                                    • Opcode ID: 0f9c55da4058b08e1c5a195c3acdf9d24be16afa84ee47837121682b60bc1b75
                                                                                                    • Instruction ID: bdd742063a65b40ce9a9c14308506061ecedd09e17b34efd95a91dc7a0c28826
                                                                                                    • Opcode Fuzzy Hash: 0f9c55da4058b08e1c5a195c3acdf9d24be16afa84ee47837121682b60bc1b75
                                                                                                    • Instruction Fuzzy Hash: CC21B0B56142009FEB21CF29DD85BA6FBE8EF04320F048469EE85CB746D775E808CA71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 161 12ba392-12ba3cf 163 12ba3d1 161->163 164 12ba3d4-12ba3dd 161->164 163->164 165 12ba3df 164->165 166 12ba3e2-12ba3e8 164->166 165->166 167 12ba3ea 166->167 168 12ba3ed-12ba404 166->168 167->168 170 12ba43b-12ba440 168->170 171 12ba406-12ba419 RegQueryValueExW 168->171 170->171 172 12ba41b-12ba438 171->172 173 12ba442-12ba447 171->173 173->172
                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(?,00000E24,7D8F8FA0,00000000,00000000,00000000,00000000), ref: 012BA40C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2022873809.00000000012BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_12ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: c51fbd2f4e153791f2df91adb3c64e92b9a3a3aac47ed74116a510de5084c8b4
                                                                                                    • Instruction ID: 7bf4084b5f448a1ccd844643f942216f8d6e4ca0d12980f041c6ffbc09e1b590
                                                                                                    • Opcode Fuzzy Hash: c51fbd2f4e153791f2df91adb3c64e92b9a3a3aac47ed74116a510de5084c8b4
                                                                                                    • Instruction Fuzzy Hash: 9321AE71610200AFE721CF15DC84FA6BBECEF04750F08846AEA45DB751D7B4E808CA71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 177 12ba486-12ba4c3 179 12ba4c8-12ba4d4 177->179 180 12ba4c5 177->180 181 12ba4d9-12ba4f0 179->181 182 12ba4d6 179->182 180->179 184 12ba4f2-12ba505 RegSetValueExW 181->184 185 12ba527-12ba52c 181->185 182->181 186 12ba52e-12ba533 184->186 187 12ba507-12ba524 184->187 185->184 186->187
                                                                                                    APIs
                                                                                                    • RegSetValueExW.KERNELBASE(?,00000E24,7D8F8FA0,00000000,00000000,00000000,00000000), ref: 012BA4F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2022873809.00000000012BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 012BA000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_12ba000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: 89e015a8d3e8c4bb73a2cc52f1d0d258a3b058544c6259715e381f1f41afb80d
                                                                                                    • Instruction ID: 1015fb3df5644470d9d6f32206143ed38aa9ebd091082b286ca93ed933e33ff6
                                                                                                    • Opcode Fuzzy Hash: 89e015a8d3e8c4bb73a2cc52f1d0d258a3b058544c6259715e381f1f41afb80d
                                                                                                    • Instruction Fuzzy Hash: A611AF72510200AFEB218E15DC85FA6BBECEF14710F04845AEE859B756D374E9088A71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 191 5550080-55500ad 194 55500b8-55502f9 191->194
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2023322687.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 56871a1dfba28eb66be30d525718ef19880cc0a87af27b673b5eb3e2afffb922
                                                                                                    • Instruction ID: f87ba0625168bc7897af7453be429955da3ed6af32779d5869ae6b65c863939f
                                                                                                    • Opcode Fuzzy Hash: 56871a1dfba28eb66be30d525718ef19880cc0a87af27b673b5eb3e2afffb922
                                                                                                    • Instruction Fuzzy Hash: 6E512E38201242CFD724DB38F58998A77E3FFC52483448979E1058B36AEB7C5D8ACB91
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 232 5550006-555006b 234 5550070 call 5550301 232->234 235 5550070 call 5550310 232->235 236 5550070 call 2e01047 232->236 237 5550070 call 55503bd 232->237 238 5550070 call 2e0106e 232->238 233 5550076 234->233 235->233 236->233 237->233 238->233
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2023322687.0000000005550000.00000040.00000800.00020000.00000000.sdmp, Offset: 05550000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_5550000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 031c41dbe6b9cb954b98105e8df615fb5a90f575847b59181585e5b978536fe5
                                                                                                    • Instruction ID: d99c27c725e716977511567ee45433307e6708b506f6abc346bda0521de0284b
                                                                                                    • Opcode Fuzzy Hash: 031c41dbe6b9cb954b98105e8df615fb5a90f575847b59181585e5b978536fe5
                                                                                                    • Instruction Fuzzy Hash: 03015BA644E7C44FC74382706C759A13F74AE6321470F05C7D880CB1B3E4486A5AE332
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 239 2e01047-2e01088 241 2e0108e-2e010ab 239->241
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2023122464.0000000002E01000.00000040.00000020.00020000.00000000.sdmp, Offset: 02E01000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_2e01000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f89793825593981484a33bbe1ccd970ff08f2c7c65193bbdad7aff122749623b
                                                                                                    • Instruction ID: 36b6a53770633a18ced309100c1bec528c40b024c3149c1a5857106ef4b2667c
                                                                                                    • Opcode Fuzzy Hash: f89793825593981484a33bbe1ccd970ff08f2c7c65193bbdad7aff122749623b
                                                                                                    • Instruction Fuzzy Hash: 8001A2B55093805FD7128B16AC40862FFB8DF86230709C5AFEC598B652D229A809CBA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 242 2e0106e-2e01088 243 2e0108e-2e010ab 242->243
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2023122464.0000000002E01000.00000040.00000020.00020000.00000000.sdmp, Offset: 02E01000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_2e01000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 60f9b0a2aa55ea18d4814e4db91812b6d46634752faf50024f7d1461d73345d9
                                                                                                    • Instruction ID: f6ca1aa7a252a730c5a117c7d6824352d50cd0843d704d1a1ab64cc973c34078
                                                                                                    • Opcode Fuzzy Hash: 60f9b0a2aa55ea18d4814e4db91812b6d46634752faf50024f7d1461d73345d9
                                                                                                    • Instruction Fuzzy Hash: CAE092B66046008F9750CF0AFC41462F7E8EB84630B08C47FDC0D8B701D235B908CAA6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 244 12b23f4-12b23ff 245 12b2412-12b2417 244->245 246 12b2401-12b240e 244->246 247 12b241a 245->247 248 12b2419 245->248 246->245 249 12b2420-12b2421 247->249
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2022860930.00000000012B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 012B2000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_12b2000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9a30d55328179c2e28dd1c3b8062b0c2ebde62069ccac438ca4f4f03d70fafe0
                                                                                                    • Instruction ID: e089440eb605787e860fc62c8bde49750c112665b4eb074208aff278dc04806d
                                                                                                    • Opcode Fuzzy Hash: 9a30d55328179c2e28dd1c3b8062b0c2ebde62069ccac438ca4f4f03d70fafe0
                                                                                                    • Instruction Fuzzy Hash: C5D0C2392007A18EE3128A0CC194BC53BA4AB41704F0604B998008BB62C728E4C0D500
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 250 12b23bc-12b23c3 251 12b23d6-12b23db 250->251 252 12b23c5-12b23d2 250->252 253 12b23dd-12b23e0 251->253 254 12b23e1 251->254 252->251 255 12b23e7-12b23e8 254->255
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.2022860930.00000000012B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 012B2000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_12b2000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 6d8d9f12387adb49dfa38219707b660c2784e2c3ff941ab6c6b6081102e041b6
                                                                                                    • Instruction ID: 689d1f234731801455c6800c40af8b06d889c090da40a8e597cb9e60feb74a64
                                                                                                    • Opcode Fuzzy Hash: 6d8d9f12387adb49dfa38219707b660c2784e2c3ff941ab6c6b6081102e041b6
                                                                                                    • Instruction Fuzzy Hash: B7D05E342012828BD725DB0CC6D4F993BD4AB45714F0648E8BD108B762C7A4E8C0DA10
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:9.8%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:0%
                                                                                                    Total number of Nodes:19
                                                                                                    Total number of Limit Nodes:1
                                                                                                    execution_graph 706 191a361 707 191a392 RegQueryValueExW 706->707 709 191a41b 707->709 698 191a710 699 191a74e FindCloseChangeNotification 698->699 701 191a788 699->701 702 191a612 704 191a646 CreateMutexW 702->704 705 191a6c1 704->705 710 191a462 712 191a486 RegSetValueExW 710->712 713 191a507 712->713 690 191a646 691 191a67e CreateMutexW 690->691 693 191a6c1 691->693 694 191a74e 695 191a7b9 694->695 696 191a77a FindCloseChangeNotification 694->696 695->696 697 191a788 696->697

                                                                                                    Callgraph

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 0 191a612-191a695 4 191a697 0->4 5 191a69a-191a6a3 0->5 4->5 6 191a6a5 5->6 7 191a6a8-191a6b1 5->7 6->7 8 191a6b3-191a6d7 CreateMutexW 7->8 9 191a702-191a707 7->9 12 191a709-191a70e 8->12 13 191a6d9-191a6ff 8->13 9->8 12->13
                                                                                                    APIs
                                                                                                    • CreateMutexW.KERNELBASE(?,?), ref: 0191A6B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2104394279.000000000191A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0191A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_191a000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateMutex
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964310414-0
                                                                                                    • Opcode ID: 7e94069fbaf69299849ed58683210d9fc5115c40ccd5f43bc8cc828fb6200cf8
                                                                                                    • Instruction ID: 049e2325be33fdca8aa13e240a5ebb4ab735fe0461beed342ed98b19d7c86760
                                                                                                    • Opcode Fuzzy Hash: 7e94069fbaf69299849ed58683210d9fc5115c40ccd5f43bc8cc828fb6200cf8
                                                                                                    • Instruction Fuzzy Hash: 003191B55093846FE712CB25DC85B96BFF8EF06210F08849AE988CB297D375E909C771
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 16 191a361-191a3cf 19 191a3d1 16->19 20 191a3d4-191a3dd 16->20 19->20 21 191a3e2-191a3e8 20->21 22 191a3df 20->22 23 191a3ea 21->23 24 191a3ed-191a404 21->24 22->21 23->24 26 191a406-191a419 RegQueryValueExW 24->26 27 191a43b-191a440 24->27 28 191a442-191a447 26->28 29 191a41b-191a438 26->29 27->26 28->29
                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(?,00000E24,2F3A9DA7,00000000,00000000,00000000,00000000), ref: 0191A40C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2104394279.000000000191A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0191A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_191a000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: 9b2c3861ad176a1deb5017a2741ea4586a82ea88f7c65c78ed11e7aa5cf293e1
                                                                                                    • Instruction ID: 46b5d0462038ff9f4b852f1c2d7e13b98e6067e94de124f9abdc7c3fa5016987
                                                                                                    • Opcode Fuzzy Hash: 9b2c3861ad176a1deb5017a2741ea4586a82ea88f7c65c78ed11e7aa5cf293e1
                                                                                                    • Instruction Fuzzy Hash: C631AE71509384AFE722CF15CC84F92BBFCEF06610F08849AE9858B296D364E849CB71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 33 191a462-191a4c3 36 191a4c5 33->36 37 191a4c8-191a4d4 33->37 36->37 38 191a4d6 37->38 39 191a4d9-191a4f0 37->39 38->39 41 191a4f2-191a505 RegSetValueExW 39->41 42 191a527-191a52c 39->42 43 191a507-191a524 41->43 44 191a52e-191a533 41->44 42->41 44->43
                                                                                                    APIs
                                                                                                    • RegSetValueExW.KERNELBASE(?,00000E24,2F3A9DA7,00000000,00000000,00000000,00000000), ref: 0191A4F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2104394279.000000000191A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0191A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_191a000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: d0443be71b49cd127903c5b3319bcaade143027a44d4389712117bd4b49ee3f3
                                                                                                    • Instruction ID: e3b3a599d174f2f09f08976fd06b30ce6ce6f2c850c41edb1523c38642deda88
                                                                                                    • Opcode Fuzzy Hash: d0443be71b49cd127903c5b3319bcaade143027a44d4389712117bd4b49ee3f3
                                                                                                    • Instruction Fuzzy Hash: 5121A1725093846FE7228B15DC44F67BFBCDF05610F08849AE985DB696C364E848C771
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 48 191a646-191a695 51 191a697 48->51 52 191a69a-191a6a3 48->52 51->52 53 191a6a5 52->53 54 191a6a8-191a6b1 52->54 53->54 55 191a6b3-191a6bb CreateMutexW 54->55 56 191a702-191a707 54->56 58 191a6c1-191a6d7 55->58 56->55 59 191a709-191a70e 58->59 60 191a6d9-191a6ff 58->60 59->60
                                                                                                    APIs
                                                                                                    • CreateMutexW.KERNELBASE(?,?), ref: 0191A6B9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2104394279.000000000191A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0191A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_191a000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateMutex
                                                                                                    • String ID:
                                                                                                    • API String ID: 1964310414-0
                                                                                                    • Opcode ID: 21029c6d821ea12f4e0434eaaf1ab58c895ad105878cbae15f9c2341eed1e634
                                                                                                    • Instruction ID: bcb63691ba52fb3d37d1bb9075984c65ce36f3b6387de9f4d8468e5c10d6d935
                                                                                                    • Opcode Fuzzy Hash: 21029c6d821ea12f4e0434eaaf1ab58c895ad105878cbae15f9c2341eed1e634
                                                                                                    • Instruction Fuzzy Hash: FF21B0756012449FEB21CB29CD85BA6FBE8EF04210F048869E989CB749D775E948CA71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 63 191a392-191a3cf 65 191a3d1 63->65 66 191a3d4-191a3dd 63->66 65->66 67 191a3e2-191a3e8 66->67 68 191a3df 66->68 69 191a3ea 67->69 70 191a3ed-191a404 67->70 68->67 69->70 72 191a406-191a419 RegQueryValueExW 70->72 73 191a43b-191a440 70->73 74 191a442-191a447 72->74 75 191a41b-191a438 72->75 73->72 74->75
                                                                                                    APIs
                                                                                                    • RegQueryValueExW.KERNELBASE(?,00000E24,2F3A9DA7,00000000,00000000,00000000,00000000), ref: 0191A40C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2104394279.000000000191A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0191A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_191a000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3660427363-0
                                                                                                    • Opcode ID: f3d9d22bea9431395b05bec359a2802e7fa7d73740a7fb07c4ae6a3daf4a1bc5
                                                                                                    • Instruction ID: 6797d6fd5b9d63a9da1c3d7baf7d929da52a4863840cd2bfb1e66dd2d07def45
                                                                                                    • Opcode Fuzzy Hash: f3d9d22bea9431395b05bec359a2802e7fa7d73740a7fb07c4ae6a3daf4a1bc5
                                                                                                    • Instruction Fuzzy Hash: 1221C071601244AFE721CF19CC84FA6F7ECEF04610F04846AE949DB795D374E849CA71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 79 191a710-191a778 81 191a7b9-191a7be 79->81 82 191a77a-191a782 FindCloseChangeNotification 79->82 81->82 84 191a788-191a79a 82->84 85 191a7c0-191a7c5 84->85 86 191a79c-191a7b8 84->86 85->86
                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 0191A780
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2104394279.000000000191A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0191A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_191a000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseFindNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 2591292051-0
                                                                                                    • Opcode ID: 0f42e1b29edd045baf148080e2aabe6ae7856807899b5652348f5caa6294d234
                                                                                                    • Instruction ID: 3efc0506bc72987ab44bfa13830c9292fe0ecfeac65f62c3a864d59f2704fd66
                                                                                                    • Opcode Fuzzy Hash: 0f42e1b29edd045baf148080e2aabe6ae7856807899b5652348f5caa6294d234
                                                                                                    • Instruction Fuzzy Hash: 6621A1B19093809FD7128B15DC85752BFB8EF03324F0984DBD9858B6A3D235A949CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 88 191a486-191a4c3 90 191a4c5 88->90 91 191a4c8-191a4d4 88->91 90->91 92 191a4d6 91->92 93 191a4d9-191a4f0 91->93 92->93 95 191a4f2-191a505 RegSetValueExW 93->95 96 191a527-191a52c 93->96 97 191a507-191a524 95->97 98 191a52e-191a533 95->98 96->95 98->97
                                                                                                    APIs
                                                                                                    • RegSetValueExW.KERNELBASE(?,00000E24,2F3A9DA7,00000000,00000000,00000000,00000000), ref: 0191A4F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2104394279.000000000191A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0191A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_191a000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value
                                                                                                    • String ID:
                                                                                                    • API String ID: 3702945584-0
                                                                                                    • Opcode ID: 9a1249a31c4cb82821f3bd8cc58fb19e6962dce8297b2554e532a8f9dad6df89
                                                                                                    • Instruction ID: 21659fac41e4d7998ee1f9a4861a16869b43d897294a978735fa08cc6b65968c
                                                                                                    • Opcode Fuzzy Hash: 9a1249a31c4cb82821f3bd8cc58fb19e6962dce8297b2554e532a8f9dad6df89
                                                                                                    • Instruction Fuzzy Hash: 7211B176500244AFE721CE15DC44FA6BBECEF14610F04845AED49DB799D374E848CA71
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 102 191a74e-191a778 103 191a7b9-191a7be 102->103 104 191a77a-191a782 FindCloseChangeNotification 102->104 103->104 106 191a788-191a79a 104->106 107 191a7c0-191a7c5 106->107 108 191a79c-191a7b8 106->108 107->108
                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 0191A780
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2104394279.000000000191A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0191A000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_191a000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseFindNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 2591292051-0
                                                                                                    • Opcode ID: de56bc68ca678ca94b845c7b6aae8d8207189214007d800e2577f3ffbcdb86d3
                                                                                                    • Instruction ID: 37f726e9c4c809ba7e014c865aecb85da731579092fe5fcc2b1a087b6c32aabb
                                                                                                    • Opcode Fuzzy Hash: de56bc68ca678ca94b845c7b6aae8d8207189214007d800e2577f3ffbcdb86d3
                                                                                                    • Instruction Fuzzy Hash: 9E01D4719012448FEB11CF19D984765FBE4DF04220F08C4ABDC4ADF75AD279E948CAA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 110 33d0310-33d0334 112 33d033e-33d0346 110->112 113 33d0336-33d0338 110->113 114 33d034e-33d0391 112->114 115 33d0348-33d034d 112->115 113->112 118 33d03d8-33d03ff 114->118 119 33d0393-33d03bb 114->119 125 33d040a-33d0418 118->125 124 33d03ce 119->124 124->118 126 33d041f-33d0434 125->126 127 33d041a 125->127 129 33d046b-33d0523 126->129 130 33d0436-33d0460 126->130 127->126 149 33d0525-33d0569 129->149 150 33d0570-33d0587 129->150 130->129 149->150 151 33d058d-33d05bf 150->151 152 33d0880 150->152 151->152
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2104598457.00000000033D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_33d0000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 7f2dfe6d22491685f549e1f6178dd6169a3d837de658dc142f5d465ba866d9dd
                                                                                                    • Instruction ID: 5e50f03f0078cd7f2485b6102deb32accefc632ec62feef8650bca0c8c74164d
                                                                                                    • Opcode Fuzzy Hash: 7f2dfe6d22491685f549e1f6178dd6169a3d837de658dc142f5d465ba866d9dd
                                                                                                    • Instruction Fuzzy Hash: 9151F231B042118FC728EB79A450A6E77E7EFC9244B144569E40ADB3E4DF3ECD4687A2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 163 33d0006-33d00ad 166 33d00b8-33d02f9 163->166
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2104598457.00000000033D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_33d0000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 6ae976383fa3d43eb1ac2d3248dbbab6d1486d01698919d6520088373af847f7
                                                                                                    • Instruction ID: 66f00a959767285c245a5c445e6e8fce9aa65ca41bd8760fb4c596d06028219b
                                                                                                    • Opcode Fuzzy Hash: 6ae976383fa3d43eb1ac2d3248dbbab6d1486d01698919d6520088373af847f7
                                                                                                    • Instruction Fuzzy Hash: 10715F351092818FC725DF38E954A8D7BB2EFE624830585AAD0448B3A7DB3D5D4BCBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 204 33d03bd-33d0418 212 33d041f-33d0434 204->212 213 33d041a 204->213 215 33d046b-33d0523 212->215 216 33d0436-33d0460 212->216 213->212 235 33d0525-33d0569 215->235 236 33d0570-33d0587 215->236 216->215 235->236 237 33d058d-33d05bf 236->237 238 33d0880 236->238 237->238
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2104598457.00000000033D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033D0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_33d0000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 45a0fa93b9d4bb5f846925a4ddd7a9b3576a26cedfc8e8d0cf0df09f990f92c3
                                                                                                    • Instruction ID: 9eac80553ecb16e079ba2458e8c4854e837aca2b142e353dd18bf57bbe0c7755
                                                                                                    • Opcode Fuzzy Hash: 45a0fa93b9d4bb5f846925a4ddd7a9b3576a26cedfc8e8d0cf0df09f990f92c3
                                                                                                    • Instruction Fuzzy Hash: 64412331B001158BCB28EB7990146BD72E7AFD5648B144039E40ADF3E8DF3ECD4687A2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 249 3401001-340101b 250 3401035-340103b 249->250 251 340101d-3401026 249->251 252 3401075-3401088 250->252 253 340103d-3401046 250->253 254 340108e-34010ab 252->254
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2104623730.0000000003401000.00000040.00000020.00020000.00000000.sdmp, Offset: 03401000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_3401000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c566c6ada1f77487d1ecf1ef890fca9e01820abb8808e5d08138d18d9b7529b4
                                                                                                    • Instruction ID: 598d6de13c0cb43c235006520cb67741d75927d9bfa33360117195275524b084
                                                                                                    • Opcode Fuzzy Hash: c566c6ada1f77487d1ecf1ef890fca9e01820abb8808e5d08138d18d9b7529b4
                                                                                                    • Instruction Fuzzy Hash: E601F2756093C00FC7428B25AC51091BFE0DF43370B5884EFC8888F653C22A990ACB56
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 256 3401048-340104b 257 3401095-34010ab 256->257 258 340104d-340106b 256->258 261 340106e-3401088 258->261 262 340108e-3401094 261->262 262->257
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2104623730.0000000003401000.00000040.00000020.00020000.00000000.sdmp, Offset: 03401000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_3401000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d28027ef1f6e87c5ef8e42f979b0657c4b9f878fcb216aeecc923a2ee7b80eb7
                                                                                                    • Instruction ID: 3e73d792420a02e69a337267b8346d5144182b58f7494be4ee74abf39d9bf1c5
                                                                                                    • Opcode Fuzzy Hash: d28027ef1f6e87c5ef8e42f979b0657c4b9f878fcb216aeecc923a2ee7b80eb7
                                                                                                    • Instruction Fuzzy Hash: 5601A7B65493C05FD7128F169C50862BFB8DE86630709C4EFED898F652D235A809CB76
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 263 3401028-340102b 264 3401055-340106b 263->264 265 340102d-3401036 263->265 267 340106e-3401088 264->267 265->264 268 340108e-34010ab 267->268
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2104623730.0000000003401000.00000040.00000020.00020000.00000000.sdmp, Offset: 03401000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_3401000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 072932ff82305231d3884407e73eaed8b609b0ed2df573ee3b0ae018fb40965b
                                                                                                    • Instruction ID: 898e73ccd6e27ee33374e6628e361e125c81bf81adccd94fdf505c388f39ca8c
                                                                                                    • Opcode Fuzzy Hash: 072932ff82305231d3884407e73eaed8b609b0ed2df573ee3b0ae018fb40965b
                                                                                                    • Instruction Fuzzy Hash: 090126B55083806FC7118B16AC40863FFE8EB86270709C4AFEC498B652D235B809CB76
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 270 34010ae-34010b3 271 3401065-3401088 270->271 272 34010b5-34010cd call 34010d2 270->272 276 340108e-34010ab 271->276
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2104623730.0000000003401000.00000040.00000020.00020000.00000000.sdmp, Offset: 03401000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_3401000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 48c460af02d20d7f776e5855651e10ce107dfcde54e9de33d7a00a2e4048065e
                                                                                                    • Instruction ID: 1cf37bf3e776ec30802c82d40e991b09ecabf91ccc566f843f340741f969cf67
                                                                                                    • Opcode Fuzzy Hash: 48c460af02d20d7f776e5855651e10ce107dfcde54e9de33d7a00a2e4048065e
                                                                                                    • Instruction Fuzzy Hash: 81018F7A5093804FD3118F16EC41892BBE4EB46330B0884BFD849CB653D239A809CB66
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2104623730.0000000003401000.00000040.00000020.00020000.00000000.sdmp, Offset: 03401000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_3401000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d0ee727de0f1c47459b816005e0b86e258abde7a6e7d144c79cff7c2930891e7
                                                                                                    • Instruction ID: 5f867ad69e838a81708798ca0fb367cfa1bf05a6cb068b2b7fa9eb78f35ec964
                                                                                                    • Opcode Fuzzy Hash: d0ee727de0f1c47459b816005e0b86e258abde7a6e7d144c79cff7c2930891e7
                                                                                                    • Instruction Fuzzy Hash: FFE092B6A006004F9650CF0BEC81462F7D8EB84630B08C47FDC0D8BB01D236B508CAA6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2104382102.0000000001912000.00000040.00000800.00020000.00000000.sdmp, Offset: 01912000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_1912000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5046e0c2d52255d56f01eb7cd34b49d67a3b83aa449f9e9527c68ff5d94f0e2c
                                                                                                    • Instruction ID: 02c8facb41a01ea8791f299c897c2be3eab5c16d8bb146f0e432244365989702
                                                                                                    • Opcode Fuzzy Hash: 5046e0c2d52255d56f01eb7cd34b49d67a3b83aa449f9e9527c68ff5d94f0e2c
                                                                                                    • Instruction Fuzzy Hash: D1D02B792446D04FE3129B0CC154B853BE86B41B04F0604F99800CB7A7C728E4C0D500
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000A.00000002.2104382102.0000000001912000.00000040.00000800.00020000.00000000.sdmp, Offset: 01912000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_10_2_1912000_Svchost.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 03eb1c1ebba9c08112f98437f71eefde1116ec6752c1ed45c4725d512579da9f
                                                                                                    • Instruction ID: 7f49c3702825c46f9bf3cbe2fe6bc0efabe79f05778fbe5c425a65fe43c17cd0
                                                                                                    • Opcode Fuzzy Hash: 03eb1c1ebba9c08112f98437f71eefde1116ec6752c1ed45c4725d512579da9f
                                                                                                    • Instruction Fuzzy Hash: 91D05E342002854FD725EB0CC6D4F993BD8AB45B15F1648E8AC108B766C7A4D8C1EA00
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%