Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1.exe

Overview

General Information

Sample name:1.exe
Analysis ID:1377928
MD5:0de31e650bcea7c72dd79073999a7dc1
SHA1:ec128afe544daf0ed9f4325c48772f5f360bcc48
SHA256:1c0d47e5753714456bce1435810059bee8d3cdf7f579f7d1de39d65ec7452cf0
Tags:exe
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Sigma detected: Drops fake system file at system root drive
System process connects to network (likely due to code injection or exploit)
Yara detected Njrat
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Creates autorun.inf (USB autostart)
Creates autostart registry keys with suspicious names
Drops PE files to the startup folder
Drops PE files with benign system names
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Protects its processes via BreakOnTermination flag
Uses netsh to modify the Windows network and firewall settings
Abnormal high CPU Usage
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • 1.exe (PID: 7480 cmdline: C:\Users\user\Desktop\1.exe MD5: 0DE31E650BCEA7C72DD79073999A7DC1)
    • svchost.exe (PID: 7580 cmdline: "C:\ProgramData\svchost.exe" MD5: 0DE31E650BCEA7C72DD79073999A7DC1)
      • netsh.exe (PID: 7660 cmdline: netsh firewall add allowedprogram "C:\ProgramData\svchost.exe" "svchost.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • conhost.exe (PID: 7668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 7972 cmdline: "C:\ProgramData\svchost.exe" .. MD5: 0DE31E650BCEA7C72DD79073999A7DC1)
  • svchost.exe (PID: 8180 cmdline: "C:\ProgramData\svchost.exe" .. MD5: 0DE31E650BCEA7C72DD79073999A7DC1)
  • svchost.exe (PID: 3548 cmdline: "C:\ProgramData\svchost.exe" .. MD5: 0DE31E650BCEA7C72DD79073999A7DC1)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Host": "6.tcp.eu.ngrok.io", "Port": "17387", "Version": "im523", "Campaign ID": "HacKed", "Install Name": "svchost.exe", "Install Dir": "AllUsersProfile"}
SourceRuleDescriptionAuthorStrings
1.exeJoeSecurity_NjratYara detected NjratJoe Security
    1.exeWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0x64c1:$a1: get_Registry
    • 0x7efa:$a3: Download ERROR
    • 0x81ec:$a5: netsh firewall delete allowedprogram "
    1.exenjrat1Identify njRatBrian Wallace @botnet_hunter
    • 0x80e2:$a1: netsh firewall add allowedprogram
    • 0x82dc:$b1: [TAP]
    • 0x8282:$b2: & exit
    • 0x824e:$c1: md.exe /k ping 0 & del
    1.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
    • 0x81ec:$s1: netsh firewall delete allowedprogram
    • 0x80e2:$s2: netsh firewall add allowedprogram
    • 0x824c:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
    • 0x7ed6:$s4: Execute ERROR
    • 0x7f36:$s4: Execute ERROR
    • 0x7efa:$s5: Download ERROR
    • 0x8292:$s6: [kl]
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exeJoeSecurity_NjratYara detected NjratJoe Security
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exeWindows_Trojan_Njrat_30f3c220unknownunknown
      • 0x64c1:$a1: get_Registry
      • 0x7efa:$a3: Download ERROR
      • 0x81ec:$a5: netsh firewall delete allowedprogram "
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exenjrat1Identify njRatBrian Wallace @botnet_hunter
      • 0x80e2:$a1: netsh firewall add allowedprogram
      • 0x82dc:$b1: [TAP]
      • 0x8282:$b2: & exit
      • 0x824e:$c1: md.exe /k ping 0 & del
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
      • 0x81ec:$s1: netsh firewall delete allowedprogram
      • 0x80e2:$s2: netsh firewall add allowedprogram
      • 0x824c:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
      • 0x7ed6:$s4: Execute ERROR
      • 0x7f36:$s4: Execute ERROR
      • 0x7efa:$s5: Download ERROR
      • 0x8292:$s6: [kl]
      C:\svchost.exeJoeSecurity_NjratYara detected NjratJoe Security
        Click to see the 7 entries
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.1633586364.0000000000682000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
          00000000.00000000.1633586364.0000000000682000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
          • 0x62c1:$a1: get_Registry
          • 0x7cfa:$a3: Download ERROR
          • 0x7fec:$a5: netsh firewall delete allowedprogram "
          00000000.00000000.1633586364.0000000000682000.00000002.00000001.01000000.00000003.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
          • 0x7ee2:$a1: netsh firewall add allowedprogram
          • 0x80dc:$b1: [TAP]
          • 0x8082:$b2: & exit
          • 0x804e:$c1: md.exe /k ping 0 & del
          Process Memory Space: 1.exe PID: 7480JoeSecurity_NjratYara detected NjratJoe Security
            SourceRuleDescriptionAuthorStrings
            0.0.1.exe.680000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
              0.0.1.exe.680000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
              • 0x64c1:$a1: get_Registry
              • 0x7efa:$a3: Download ERROR
              • 0x81ec:$a5: netsh firewall delete allowedprogram "
              0.0.1.exe.680000.0.unpacknjrat1Identify njRatBrian Wallace @botnet_hunter
              • 0x80e2:$a1: netsh firewall add allowedprogram
              • 0x82dc:$b1: [TAP]
              • 0x8282:$b2: & exit
              • 0x824e:$c1: md.exe /k ping 0 & del
              0.0.1.exe.680000.0.unpackMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
              • 0x81ec:$s1: netsh firewall delete allowedprogram
              • 0x80e2:$s2: netsh firewall add allowedprogram
              • 0x824c:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
              • 0x7ed6:$s4: Execute ERROR
              • 0x7f36:$s4: Execute ERROR
              • 0x7efa:$s5: Download ERROR
              • 0x8292:$s6: [kl]

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\ProgramData\svchost.exe, ProcessId: 7580, TargetFilename: C:\svchost.exe
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 1.exeAvira: detected
              Source: 6.tcp.eu.ngrok.ioAvira URL Cloud: Label: malware
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exeAvira: detection malicious, Label: TR/ATRAPS.Gen
              Source: C:\ProgramData\svchost.exeAvira: detection malicious, Label: TR/ATRAPS.Gen
              Source: C:\svchost.exeAvira: detection malicious, Label: TR/ATRAPS.Gen
              Source: 00000000.00000000.1633586364.0000000000682000.00000002.00000001.01000000.00000003.sdmpMalware Configuration Extractor: Njrat {"Host": "6.tcp.eu.ngrok.io", "Port": "17387", "Version": "im523", "Campaign ID": "HacKed", "Install Name": "svchost.exe", "Install Dir": "AllUsersProfile"}
              Source: 6.tcp.eu.ngrok.ioVirustotal: Detection: 9%Perma Link
              Source: 6.tcp.eu.ngrok.ioVirustotal: Detection: 9%Perma Link
              Source: C:\ProgramData\svchost.exeVirustotal: Detection: 79%Perma Link
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exeVirustotal: Detection: 79%Perma Link
              Source: C:\svchost.exeVirustotal: Detection: 79%Perma Link
              Source: Yara matchFile source: 1.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.1.exe.680000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1633586364.0000000000682000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 1.exe PID: 7480, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exe, type: DROPPED
              Source: Yara matchFile source: C:\svchost.exe, type: DROPPED
              Source: Yara matchFile source: C:\ProgramData\svchost.exe, type: DROPPED
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exeJoe Sandbox ML: detected
              Source: C:\ProgramData\svchost.exeJoe Sandbox ML: detected
              Source: C:\svchost.exeJoe Sandbox ML: detected
              Source: 1.exeJoe Sandbox ML: detected
              Source: 1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: C:\Users\user\Desktop\1.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
              Source: 1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Spreading

              barindex
              Source: C:\ProgramData\svchost.exeFile created: C:\autorun.infJump to behavior
              Source: 1.exe, 00000000.00000000.1633586364.0000000000682000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: autorun.inf
              Source: 1.exe, 00000000.00000000.1633586364.0000000000682000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: [autorun]
              Source: 1.exe, 00000000.00000002.1701956198.0000000002DC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
              Source: 1.exe, 00000000.00000002.1701956198.0000000002DC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
              Source: svchost.exe, 00000001.00000002.4101061596.0000000003B43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
              Source: svchost.exe, 00000001.00000002.4101061596.0000000003B43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
              Source: 1.exeBinary or memory string: autorun.inf
              Source: 1.exeBinary or memory string: [autorun]
              Source: autorun.inf.1.drBinary or memory string: [autorun]
              Source: 134cc1d0196af692d1e58df35504bc9f.exe.1.drBinary or memory string: autorun.inf
              Source: 134cc1d0196af692d1e58df35504bc9f.exe.1.drBinary or memory string: [autorun]
              Source: svchost.exe.0.drBinary or memory string: autorun.inf
              Source: svchost.exe.0.drBinary or memory string: [autorun]
              Source: svchost.exe.1.drBinary or memory string: autorun.inf
              Source: svchost.exe.1.drBinary or memory string: [autorun]

              Networking

              barindex
              Source: C:\ProgramData\svchost.exeNetwork Connect: 3.66.38.117 17387Jump to behavior
              Source: C:\ProgramData\svchost.exeNetwork Connect: 52.28.247.255 17387Jump to behavior
              Source: Malware configuration extractorURLs: 6.tcp.eu.ngrok.io
              Source: global trafficTCP traffic: 192.168.2.4:49729 -> 3.66.38.117:17387
              Source: global trafficTCP traffic: 192.168.2.4:49748 -> 52.28.247.255:17387
              Source: global trafficTCP traffic: 192.168.2.4:49761 -> 3.69.157.220:17387
              Source: Joe Sandbox ViewIP Address: 3.66.38.117 3.66.38.117
              Source: Joe Sandbox ViewIP Address: 52.28.247.255 52.28.247.255
              Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
              Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownDNS traffic detected: queries for: 6.tcp.eu.ngrok.io
              Source: 1.exe, 134cc1d0196af692d1e58df35504bc9f.exe.1.dr, svchost.exe.0.dr, svchost.exe.1.drString found in binary or memory: https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: 1.exe, kl.cs.Net Code: VKCodeToUnicode
              Source: svchost.exe.0.dr, kl.cs.Net Code: VKCodeToUnicode
              Source: 134cc1d0196af692d1e58df35504bc9f.exe.1.dr, kl.cs.Net Code: VKCodeToUnicode
              Source: svchost.exe.1.dr, kl.cs.Net Code: VKCodeToUnicode

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 1.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.1.exe.680000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1633586364.0000000000682000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 1.exe PID: 7480, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exe, type: DROPPED
              Source: Yara matchFile source: C:\svchost.exe, type: DROPPED
              Source: Yara matchFile source: C:\ProgramData\svchost.exe, type: DROPPED

              Operating System Destruction

              barindex
              Source: C:\ProgramData\svchost.exeProcess information set: 01 00 00 00 Jump to behavior

              System Summary

              barindex
              Source: 1.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: 1.exe, type: SAMPLEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
              Source: 1.exe, type: SAMPLEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: 0.0.1.exe.680000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: 0.0.1.exe.680000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
              Source: 0.0.1.exe.680000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: 00000000.00000000.1633586364.0000000000682000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: 00000000.00000000.1633586364.0000000000682000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\svchost.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: C:\svchost.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
              Source: C:\svchost.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\ProgramData\svchost.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
              Source: C:\ProgramData\svchost.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
              Source: C:\ProgramData\svchost.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
              Source: C:\ProgramData\svchost.exeProcess Stats: CPU usage > 49%
              Source: C:\ProgramData\svchost.exeCode function: 1_2_0342BEF2 NtSetInformationProcess,1_2_0342BEF2
              Source: C:\ProgramData\svchost.exeCode function: 1_2_0342BED0 NtSetInformationProcess,1_2_0342BED0
              Source: C:\ProgramData\svchost.exeCode function: 1_2_061C01C2 NtQuerySystemInformation,1_2_061C01C2
              Source: C:\ProgramData\svchost.exeCode function: 1_2_061C0187 NtQuerySystemInformation,1_2_061C0187
              Source: 1.exe, 00000000.00000002.1701244477.0000000000BAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs 1.exe
              Source: 1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 1.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: 1.exe, type: SAMPLEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
              Source: 1.exe, type: SAMPLEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: 0.0.1.exe.680000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: 0.0.1.exe.680000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
              Source: 0.0.1.exe.680000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: 00000000.00000000.1633586364.0000000000682000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: 00000000.00000000.1633586364.0000000000682000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
              Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\svchost.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: C:\svchost.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
              Source: C:\svchost.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: C:\ProgramData\svchost.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
              Source: C:\ProgramData\svchost.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
              Source: C:\ProgramData\svchost.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
              Source: classification engineClassification label: mal100.spre.troj.adwa.spyw.evad.winEXE@9/10@4/3
              Source: C:\ProgramData\svchost.exeCode function: 1_2_0342BBA2 AdjustTokenPrivileges,1_2_0342BBA2
              Source: C:\ProgramData\svchost.exeCode function: 1_2_0342BB6B AdjustTokenPrivileges,1_2_0342BB6B
              Source: C:\Users\user\Desktop\1.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\1.exe.logJump to behavior
              Source: C:\ProgramData\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7668:120:WilError_03
              Source: C:\ProgramData\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\134cc1d0196af692d1e58df35504bc9f
              Source: 1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: 1.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\1.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\Desktop\1.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
              Source: C:\Users\user\Desktop\1.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
              Source: C:\ProgramData\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
              Source: C:\ProgramData\svchost.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
              Source: C:\ProgramData\svchost.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
              Source: C:\ProgramData\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
              Source: C:\ProgramData\svchost.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
              Source: C:\ProgramData\svchost.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
              Source: C:\ProgramData\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
              Source: C:\ProgramData\svchost.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
              Source: C:\ProgramData\svchost.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
              Source: C:\ProgramData\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
              Source: C:\ProgramData\svchost.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
              Source: C:\ProgramData\svchost.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
              Source: C:\Users\user\Desktop\1.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Users\user\Desktop\1.exeFile read: C:\Users\user\Desktop\1.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\1.exe C:\Users\user\Desktop\1.exe
              Source: C:\Users\user\Desktop\1.exeProcess created: C:\ProgramData\svchost.exe "C:\ProgramData\svchost.exe"
              Source: C:\ProgramData\svchost.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\ProgramData\svchost.exe" "svchost.exe" ENABLE
              Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\ProgramData\svchost.exe "C:\ProgramData\svchost.exe" ..
              Source: unknownProcess created: C:\ProgramData\svchost.exe "C:\ProgramData\svchost.exe" ..
              Source: unknownProcess created: C:\ProgramData\svchost.exe "C:\ProgramData\svchost.exe" ..
              Source: C:\Users\user\Desktop\1.exeProcess created: C:\ProgramData\svchost.exe "C:\ProgramData\svchost.exe" Jump to behavior
              Source: C:\ProgramData\svchost.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\ProgramData\svchost.exe" "svchost.exe" ENABLEJump to behavior
              Source: C:\ProgramData\svchost.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
              Source: 1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: C:\Users\user\Desktop\1.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
              Source: 1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: 1.exe, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
              Source: svchost.exe.0.dr, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
              Source: 134cc1d0196af692d1e58df35504bc9f.exe.1.dr, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
              Source: svchost.exe.1.dr, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])

              Persistence and Installation Behavior

              barindex
              Source: C:\ProgramData\svchost.exeFile created: C:\svchost.exeJump to dropped file
              Source: C:\Users\user\Desktop\1.exeFile created: C:\ProgramData\svchost.exeJump to dropped file
              Source: C:\ProgramData\svchost.exeFile created: C:\svchost.exeJump to dropped file
              Source: C:\Users\user\Desktop\1.exeFile created: C:\ProgramData\svchost.exeJump to dropped file
              Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exeJump to dropped file
              Source: C:\Users\user\Desktop\1.exeFile created: C:\ProgramData\svchost.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\ProgramData\svchost.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 134cc1d0196af692d1e58df35504bc9fJump to behavior
              Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exeJump to dropped file
              Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exeJump to behavior
              Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exeJump to behavior
              Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exe\:Zone.Identifier:$DATAJump to behavior
              Source: C:\ProgramData\svchost.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 134cc1d0196af692d1e58df35504bc9fJump to behavior
              Source: C:\ProgramData\svchost.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 134cc1d0196af692d1e58df35504bc9fJump to behavior
              Source: C:\ProgramData\svchost.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 134cc1d0196af692d1e58df35504bc9fJump to behavior
              Source: C:\ProgramData\svchost.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 134cc1d0196af692d1e58df35504bc9fJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\1.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\ProgramData\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\ProgramData\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\ProgramData\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\ProgramData\svchost.exeWindow / User API: threadDelayed 3218Jump to behavior
              Source: C:\ProgramData\svchost.exeWindow / User API: threadDelayed 756Jump to behavior
              Source: C:\ProgramData\svchost.exeWindow / User API: threadDelayed 4465Jump to behavior
              Source: C:\ProgramData\svchost.exeWindow / User API: foregroundWindowGot 402Jump to behavior
              Source: C:\ProgramData\svchost.exeWindow / User API: foregroundWindowGot 1287Jump to behavior
              Source: C:\Users\user\Desktop\1.exe TID: 7504Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\ProgramData\svchost.exe TID: 7584Thread sleep time: -756000s >= -30000sJump to behavior
              Source: C:\ProgramData\svchost.exe TID: 7584Thread sleep time: -4465000s >= -30000sJump to behavior
              Source: C:\ProgramData\svchost.exe TID: 8012Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\ProgramData\svchost.exe TID: 7200Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\ProgramData\svchost.exe TID: 5756Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\1.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\ProgramData\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\ProgramData\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\ProgramData\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: svchost.exe, 00000001.00000002.4100204578.000000000167B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllZ,s
              Source: svchost.exe, 00000001.00000002.4100125063.0000000001670000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: netsh.exe, 00000003.00000003.1766803518.0000000000C01000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\ProgramData\svchost.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\ProgramData\svchost.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\1.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\ProgramData\svchost.exeNetwork Connect: 3.66.38.117 17387Jump to behavior
              Source: C:\ProgramData\svchost.exeNetwork Connect: 52.28.247.255 17387Jump to behavior
              Source: 1.exe, kl.csReference to suspicious API methods: MapVirtualKey(a, 0u)
              Source: 1.exe, kl.csReference to suspicious API methods: GetAsyncKeyState(num2)
              Source: 1.exe, OK.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, 100, ref lpszVer, 100)
              Source: C:\Users\user\Desktop\1.exeProcess created: C:\ProgramData\svchost.exe "C:\ProgramData\svchost.exe" Jump to behavior
              Source: svchost.exe, 00000001.00000002.4101061596.0000000003EC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.l(
              Source: svchost.exe, 00000001.00000002.4101061596.0000000003EC0000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.4101061596.0000000003F38000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.4101061596.0000000003D78000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: svchost.exe, 00000001.00000002.4101061596.0000000003D56000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.lL
              Source: svchost.exe, 00000001.00000002.4101061596.0000000003B43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.ll
              Source: svchost.exe, 00000001.00000002.4100204578.000000000167B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Rh Program Managerl
              Source: svchost.exe, 00000001.00000002.4101061596.0000000003EC0000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.4101061596.0000000003F38000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.4101061596.0000000004065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@9l
              Source: svchost.exe, 00000001.00000002.4101061596.0000000003D78000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.4101061596.0000000003DA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.lt
              Source: svchost.exe, 00000001.00000002.4101061596.0000000003D5B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.l4
              Source: svchost.exe, 00000001.00000002.4101061596.0000000003D70000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.4101061596.0000000003D62000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.lT
              Source: svchost.exe, 00000001.00000002.4101061596.0000000003C7C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.l<
              Source: svchost.exe, 00000001.00000002.4101061596.0000000003F38000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.4101061596.0000000003D4F000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.4101061596.0000000003C7C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program manager
              Source: svchost.exe, 00000001.00000002.4101061596.0000000003C7C000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.4101061596.0000000003B43000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.4101061596.0000000003E71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.l
              Source: svchost.exe, 00000001.00000002.4101061596.0000000003B43000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.ld
              Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\ProgramData\svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: C:\ProgramData\svchost.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\ProgramData\svchost.exe" "svchost.exe" ENABLE
              Source: C:\ProgramData\svchost.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\ProgramData\svchost.exe" "svchost.exe" ENABLE

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 1.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.1.exe.680000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1633586364.0000000000682000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 1.exe PID: 7480, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exe, type: DROPPED
              Source: Yara matchFile source: C:\svchost.exe, type: DROPPED
              Source: Yara matchFile source: C:\ProgramData\svchost.exe, type: DROPPED

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 1.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.1.exe.680000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1633586364.0000000000682000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 1.exe PID: 7480, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exe, type: DROPPED
              Source: Yara matchFile source: C:\svchost.exe, type: DROPPED
              Source: Yara matchFile source: C:\ProgramData\svchost.exe, type: DROPPED
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
              11
              Replication Through Removable Media
              1
              Native API
              221
              Registry Run Keys / Startup Folder
              1
              Access Token Manipulation
              11
              Masquerading
              1
              Input Capture
              11
              Security Software Discovery
              11
              Replication Through Removable Media
              1
              Input Capture
              Exfiltration Over Other Network Medium1
              Non-Standard Port
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
              Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts112
              Process Injection
              21
              Disable or Modify Tools
              LSASS Memory2
              Process Discovery
              Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
              Non-Application Layer Protocol
              SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
              Domain AccountsAtLogon Script (Windows)221
              Registry Run Keys / Startup Folder
              21
              Virtualization/Sandbox Evasion
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration11
              Application Layer Protocol
              Data Encrypted for ImpactDNS ServerEmail Addresses
              Local AccountsCronLogin HookLogin Hook1
              Access Token Manipulation
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput CaptureTraffic DuplicationProtocol ImpersonationData DestructionVirtual Private ServerEmployee Names
              Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script112
              Process Injection
              LSA Secrets1
              Peripheral Device Discovery
              SSHKeyloggingScheduled TransferFallback ChannelsData Encrypted for ImpactServerGather Victim Network Information
              Replication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Software Packing
              Cached Domain Credentials1
              File and Directory Discovery
              VNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
              External Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync12
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1377928 Sample: 1.exe Startdate: 20/01/2024 Architecture: WINDOWS Score: 100 36 6.tcp.eu.ngrok.io 2->36 44 Multi AV Scanner detection for domain / URL 2->44 46 Found malware configuration 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 12 other signatures 2->50 9 1.exe 1 6 2->9         started        13 svchost.exe 3 2->13         started        15 svchost.exe 2 2->15         started        17 svchost.exe 2 2->17         started        signatures3 process4 file5 34 C:\ProgramData\svchost.exe, PE32 9->34 dropped 60 Drops PE files with benign system names 9->60 19 svchost.exe 2 11 9->19         started        signatures6 process7 dnsIp8 38 6.tcp.eu.ngrok.io 3.66.38.117, 17387, 49729, 49736 AMAZON-02US United States 19->38 40 52.28.247.255, 17387, 49748, 49749 AMAZON-02US United States 19->40 42 3.69.157.220, 17387, 49761, 49762 AMAZON-02US United States 19->42 28 C:\svchost.exe, PE32 19->28 dropped 30 C:\...\134cc1d0196af692d1e58df35504bc9f.exe, PE32 19->30 dropped 32 C:\autorun.inf, Microsoft 19->32 dropped 52 Antivirus detection for dropped file 19->52 54 System process connects to network (likely due to code injection or exploit) 19->54 56 Multi AV Scanner detection for dropped file 19->56 58 8 other signatures 19->58 24 netsh.exe 2 19->24         started        file9 signatures10 process11 process12 26 conhost.exe 24->26         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              1.exe100%AviraTR/ATRAPS.Gen
              1.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exe100%AviraTR/ATRAPS.Gen
              C:\ProgramData\svchost.exe100%AviraTR/ATRAPS.Gen
              C:\svchost.exe100%AviraTR/ATRAPS.Gen
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exe100%Joe Sandbox ML
              C:\ProgramData\svchost.exe100%Joe Sandbox ML
              C:\svchost.exe100%Joe Sandbox ML
              C:\ProgramData\svchost.exe79%VirustotalBrowse
              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exe79%VirustotalBrowse
              C:\svchost.exe79%VirustotalBrowse
              No Antivirus matches
              SourceDetectionScannerLabelLink
              6.tcp.eu.ngrok.io10%VirustotalBrowse
              SourceDetectionScannerLabelLink
              6.tcp.eu.ngrok.io10%VirustotalBrowse
              6.tcp.eu.ngrok.io100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              6.tcp.eu.ngrok.io
              3.66.38.117
              truetrueunknown
              NameMaliciousAntivirus DetectionReputation
              6.tcp.eu.ngrok.iotrue
              • 10%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=01.exe, 134cc1d0196af692d1e58df35504bc9f.exe.1.dr, svchost.exe.0.dr, svchost.exe.1.drfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                3.66.38.117
                6.tcp.eu.ngrok.ioUnited States
                16509AMAZON-02UStrue
                52.28.247.255
                unknownUnited States
                16509AMAZON-02UStrue
                3.69.157.220
                unknownUnited States
                16509AMAZON-02USfalse
                Joe Sandbox version:38.0.0 Ammolite
                Analysis ID:1377928
                Start date and time:2024-01-20 09:40:07 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 8m 22s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:12
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:1.exe
                Detection:MAL
                Classification:mal100.spre.troj.adwa.spyw.evad.winEXE@9/10@4/3
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 99%
                • Number of executed functions: 179
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Override analysis time to 240000 for current running targets taking high CPU consumption
                • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                08:41:10AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run 134cc1d0196af692d1e58df35504bc9f "C:\ProgramData\svchost.exe" ..
                08:41:18AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run 134cc1d0196af692d1e58df35504bc9f "C:\ProgramData\svchost.exe" ..
                08:41:27AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run 134cc1d0196af692d1e58df35504bc9f "C:\ProgramData\svchost.exe" ..
                08:41:35AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exe
                09:41:40API Interceptor67157x Sleep call for process: svchost.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                3.66.38.117226dVJ2zRZ.exeGet hashmaliciousNjratBrowse
                  IsJb5hB84q.exeGet hashmaliciousNjratBrowse
                    Terraria.exeGet hashmaliciousNjratBrowse
                      rkIcS0Y2WY.exeGet hashmaliciousNjratBrowse
                        m5l9v13hIi.exeGet hashmaliciousNjratBrowse
                          QsKtlzYaKF.exeGet hashmaliciousNjratBrowse
                            dKe1GfZOs1.exeGet hashmaliciousNjratBrowse
                              bRxR.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                X5eo58PPCB.exeGet hashmaliciousNjratBrowse
                                  ZuXcnAYgVp.exeGet hashmaliciousNjratBrowse
                                    8AKGdJOQ8N.exeGet hashmaliciousNjratBrowse
                                      uPMGLG7QnV.exeGet hashmaliciousNjratBrowse
                                        X3vWrCoPG6.exeGet hashmaliciousNjratBrowse
                                          7U23YeVgmF.exeGet hashmaliciousNjratBrowse
                                            KD9rMPUEBM.exeGet hashmaliciousNjratBrowse
                                              8fZNpRy9pN.exeGet hashmaliciousNjratBrowse
                                                2CVeP16GYU.exeGet hashmaliciousNjratBrowse
                                                  QuX5A6qz9G.exeGet hashmaliciousNjratBrowse
                                                    OperaSetup.exeGet hashmaliciousQuasarBrowse
                                                      g8XyWsa2b6.exeGet hashmaliciousNjratBrowse
                                                        52.28.247.255rkIcS0Y2WY.exeGet hashmaliciousNjratBrowse
                                                          N1aqZIb7KG.exeGet hashmaliciousNjratBrowse
                                                            QsKtlzYaKF.exeGet hashmaliciousNjratBrowse
                                                              dKe1GfZOs1.exeGet hashmaliciousNjratBrowse
                                                                X5eo58PPCB.exeGet hashmaliciousNjratBrowse
                                                                  ZuXcnAYgVp.exeGet hashmaliciousNjratBrowse
                                                                    wiUnP1h5Ex.exeGet hashmaliciousNjratBrowse
                                                                      BqFosj9Wcb.exeGet hashmaliciousNjratBrowse
                                                                        d09l64ZAW6.exeGet hashmaliciousNjratBrowse
                                                                          8AKGdJOQ8N.exeGet hashmaliciousNjratBrowse
                                                                            uPMGLG7QnV.exeGet hashmaliciousNjratBrowse
                                                                              X3vWrCoPG6.exeGet hashmaliciousNjratBrowse
                                                                                8fZNpRy9pN.exeGet hashmaliciousNjratBrowse
                                                                                  2CVeP16GYU.exeGet hashmaliciousNjratBrowse
                                                                                    QuX5A6qz9G.exeGet hashmaliciousNjratBrowse
                                                                                      TdxWv8SpDq.exeGet hashmaliciousNjratBrowse
                                                                                        OperaSetup.exeGet hashmaliciousQuasarBrowse
                                                                                          HR0Hh3FsOH.exeGet hashmaliciousnjRatBrowse
                                                                                            r0EX1ZWE8C.exeGet hashmaliciousNjratBrowse
                                                                                              Android_USB_Jailbreaker.exeGet hashmaliciousNjratBrowse
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                6.tcp.eu.ngrok.io226dVJ2zRZ.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.69.157.220
                                                                                                IsJb5hB84q.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.66.38.117
                                                                                                Terraria.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.66.38.117
                                                                                                myidJB8lDL.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.69.115.178
                                                                                                rkIcS0Y2WY.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.69.115.178
                                                                                                30b4CoDmKk.exeGet hashmaliciousNjratBrowse
                                                                                                • 18.197.239.109
                                                                                                N1aqZIb7KG.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.68.171.119
                                                                                                m5l9v13hIi.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.66.38.117
                                                                                                QsKtlzYaKF.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.69.157.220
                                                                                                xZLQ8X9Cxo.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.69.157.220
                                                                                                sCXwkZrcZ3.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.68.171.119
                                                                                                dKe1GfZOs1.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.69.157.220
                                                                                                bRxR.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                                                • 18.197.239.109
                                                                                                X5eo58PPCB.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.69.157.220
                                                                                                ZuXcnAYgVp.exeGet hashmaliciousNjratBrowse
                                                                                                • 52.28.247.255
                                                                                                wiUnP1h5Ex.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.69.115.178
                                                                                                BqFosj9Wcb.exeGet hashmaliciousNjratBrowse
                                                                                                • 52.28.247.255
                                                                                                d09l64ZAW6.exeGet hashmaliciousNjratBrowse
                                                                                                • 52.28.247.255
                                                                                                8AKGdJOQ8N.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.68.171.119
                                                                                                uPMGLG7QnV.exeGet hashmaliciousNjratBrowse
                                                                                                • 3.66.38.117
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                AMAZON-02USODDBALL0.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                                                                • 3.163.101.10
                                                                                                bTcm.exeGet hashmaliciousNjratBrowse
                                                                                                • 54.94.248.37
                                                                                                https://cbiblec4me.com/svenska-tonaring-januari/?s=Vi&pvhem=7291&fbclid=IwAR0IJuMChf4diWNNNE_TVlaTVIj6q2oYBcrCU2ZjnsisQ53ajsuET3RHXPgGet hashmaliciousUnknownBrowse
                                                                                                • 3.20.84.35
                                                                                                bTbY.exeGet hashmaliciousNjratBrowse
                                                                                                • 54.94.248.37
                                                                                                bTbW.exeGet hashmaliciousNjratBrowse
                                                                                                • 54.94.248.37
                                                                                                VXl6IxOofO.exeGet hashmaliciousGurcu StealerBrowse
                                                                                                • 3.17.7.232
                                                                                                n199svrcQC.elfGet hashmaliciousMiraiBrowse
                                                                                                • 52.24.250.129
                                                                                                EpsilonApp.exeGet hashmaliciousUnknownBrowse
                                                                                                • 76.223.26.96
                                                                                                Bdk58TYebF.elfGet hashmaliciousMiraiBrowse
                                                                                                • 18.149.215.190
                                                                                                NrhVe4v2Zt.elfGet hashmaliciousMiraiBrowse
                                                                                                • 52.16.208.43
                                                                                                vveZnyJj0e.elfGet hashmaliciousMiraiBrowse
                                                                                                • 54.126.94.64
                                                                                                2XcXiCaqz1.elfGet hashmaliciousMiraiBrowse
                                                                                                • 108.137.250.47
                                                                                                yUhriZgNi4.elfGet hashmaliciousMiraiBrowse
                                                                                                • 13.208.205.148
                                                                                                7UunqDE3X2.exeGet hashmaliciousPureLog StealerBrowse
                                                                                                • 3.14.182.203
                                                                                                2zXf0uC9tq.elfGet hashmaliciousMiraiBrowse
                                                                                                • 52.196.204.167
                                                                                                D1E33311A3E42A9C958CED92087534253817C228A36A6.exeGet hashmaliciousUnknownBrowse
                                                                                                • 52.217.143.33
                                                                                                View - (1)Fax.emlGet hashmaliciousUnknownBrowse
                                                                                                • 63.33.254.192
                                                                                                5672D5B80770DEB68BF2435FEF12D521C04CE012250CC.exeGet hashmaliciousUnknownBrowse
                                                                                                • 54.231.172.145
                                                                                                https://m25z98brt5vb2m93fi0p.storage.googleapis.com/m25z98brt5vb2m93fi0p-i#cl/9810_md/1110/6902/1803/54/981368Get hashmaliciousPhisherBrowse
                                                                                                • 52.85.132.77
                                                                                                https://m25z98brt5vb2m93fi0p.storage.googleapis.com/m25z98brt5vb2m93fi0p-uGet hashmaliciousUnknownBrowse
                                                                                                • 54.149.11.4
                                                                                                AMAZON-02USODDBALL0.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                                                                • 3.163.101.10
                                                                                                bTcm.exeGet hashmaliciousNjratBrowse
                                                                                                • 54.94.248.37
                                                                                                https://cbiblec4me.com/svenska-tonaring-januari/?s=Vi&pvhem=7291&fbclid=IwAR0IJuMChf4diWNNNE_TVlaTVIj6q2oYBcrCU2ZjnsisQ53ajsuET3RHXPgGet hashmaliciousUnknownBrowse
                                                                                                • 3.20.84.35
                                                                                                bTbY.exeGet hashmaliciousNjratBrowse
                                                                                                • 54.94.248.37
                                                                                                bTbW.exeGet hashmaliciousNjratBrowse
                                                                                                • 54.94.248.37
                                                                                                VXl6IxOofO.exeGet hashmaliciousGurcu StealerBrowse
                                                                                                • 3.17.7.232
                                                                                                n199svrcQC.elfGet hashmaliciousMiraiBrowse
                                                                                                • 52.24.250.129
                                                                                                EpsilonApp.exeGet hashmaliciousUnknownBrowse
                                                                                                • 76.223.26.96
                                                                                                Bdk58TYebF.elfGet hashmaliciousMiraiBrowse
                                                                                                • 18.149.215.190
                                                                                                NrhVe4v2Zt.elfGet hashmaliciousMiraiBrowse
                                                                                                • 52.16.208.43
                                                                                                vveZnyJj0e.elfGet hashmaliciousMiraiBrowse
                                                                                                • 54.126.94.64
                                                                                                2XcXiCaqz1.elfGet hashmaliciousMiraiBrowse
                                                                                                • 108.137.250.47
                                                                                                yUhriZgNi4.elfGet hashmaliciousMiraiBrowse
                                                                                                • 13.208.205.148
                                                                                                7UunqDE3X2.exeGet hashmaliciousPureLog StealerBrowse
                                                                                                • 3.14.182.203
                                                                                                2zXf0uC9tq.elfGet hashmaliciousMiraiBrowse
                                                                                                • 52.196.204.167
                                                                                                D1E33311A3E42A9C958CED92087534253817C228A36A6.exeGet hashmaliciousUnknownBrowse
                                                                                                • 52.217.143.33
                                                                                                View - (1)Fax.emlGet hashmaliciousUnknownBrowse
                                                                                                • 63.33.254.192
                                                                                                5672D5B80770DEB68BF2435FEF12D521C04CE012250CC.exeGet hashmaliciousUnknownBrowse
                                                                                                • 54.231.172.145
                                                                                                https://m25z98brt5vb2m93fi0p.storage.googleapis.com/m25z98brt5vb2m93fi0p-i#cl/9810_md/1110/6902/1803/54/981368Get hashmaliciousPhisherBrowse
                                                                                                • 52.85.132.77
                                                                                                https://m25z98brt5vb2m93fi0p.storage.googleapis.com/m25z98brt5vb2m93fi0p-uGet hashmaliciousUnknownBrowse
                                                                                                • 54.149.11.4
                                                                                                AMAZON-02USODDBALL0.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                                                                • 3.163.101.10
                                                                                                bTcm.exeGet hashmaliciousNjratBrowse
                                                                                                • 54.94.248.37
                                                                                                https://cbiblec4me.com/svenska-tonaring-januari/?s=Vi&pvhem=7291&fbclid=IwAR0IJuMChf4diWNNNE_TVlaTVIj6q2oYBcrCU2ZjnsisQ53ajsuET3RHXPgGet hashmaliciousUnknownBrowse
                                                                                                • 3.20.84.35
                                                                                                bTbY.exeGet hashmaliciousNjratBrowse
                                                                                                • 54.94.248.37
                                                                                                bTbW.exeGet hashmaliciousNjratBrowse
                                                                                                • 54.94.248.37
                                                                                                VXl6IxOofO.exeGet hashmaliciousGurcu StealerBrowse
                                                                                                • 3.17.7.232
                                                                                                n199svrcQC.elfGet hashmaliciousMiraiBrowse
                                                                                                • 52.24.250.129
                                                                                                EpsilonApp.exeGet hashmaliciousUnknownBrowse
                                                                                                • 76.223.26.96
                                                                                                Bdk58TYebF.elfGet hashmaliciousMiraiBrowse
                                                                                                • 18.149.215.190
                                                                                                NrhVe4v2Zt.elfGet hashmaliciousMiraiBrowse
                                                                                                • 52.16.208.43
                                                                                                vveZnyJj0e.elfGet hashmaliciousMiraiBrowse
                                                                                                • 54.126.94.64
                                                                                                2XcXiCaqz1.elfGet hashmaliciousMiraiBrowse
                                                                                                • 108.137.250.47
                                                                                                yUhriZgNi4.elfGet hashmaliciousMiraiBrowse
                                                                                                • 13.208.205.148
                                                                                                7UunqDE3X2.exeGet hashmaliciousPureLog StealerBrowse
                                                                                                • 3.14.182.203
                                                                                                2zXf0uC9tq.elfGet hashmaliciousMiraiBrowse
                                                                                                • 52.196.204.167
                                                                                                D1E33311A3E42A9C958CED92087534253817C228A36A6.exeGet hashmaliciousUnknownBrowse
                                                                                                • 52.217.143.33
                                                                                                View - (1)Fax.emlGet hashmaliciousUnknownBrowse
                                                                                                • 63.33.254.192
                                                                                                5672D5B80770DEB68BF2435FEF12D521C04CE012250CC.exeGet hashmaliciousUnknownBrowse
                                                                                                • 54.231.172.145
                                                                                                https://m25z98brt5vb2m93fi0p.storage.googleapis.com/m25z98brt5vb2m93fi0p-i#cl/9810_md/1110/6902/1803/54/981368Get hashmaliciousPhisherBrowse
                                                                                                • 52.85.132.77
                                                                                                https://m25z98brt5vb2m93fi0p.storage.googleapis.com/m25z98brt5vb2m93fi0p-uGet hashmaliciousUnknownBrowse
                                                                                                • 54.149.11.4
                                                                                                No context
                                                                                                No context
                                                                                                Process:C:\Users\user\Desktop\1.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):37888
                                                                                                Entropy (8bit):5.574394315899761
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:1W6vEiTb/vpWNcZ0y8fDC7//DwLkyYd/rAF+rMRTyN/0L+EcoinblneHQM3epzX/:w6vTZ38fDC7/sVY1rM+rMRa8Nukh8t
                                                                                                MD5:0DE31E650BCEA7C72DD79073999A7DC1
                                                                                                SHA1:EC128AFE544DAF0ED9F4325C48772F5F360BCC48
                                                                                                SHA-256:1C0D47E5753714456BCE1435810059BEE8D3CDF7F579F7D1DE39D65EC7452CF0
                                                                                                SHA-512:2B6E295753A339C23683BBD4212B867657AB128B6DEF4F37C8FFCA78A456192CA7E754400ACF36D1E3C0EE1415A9981260D88ED441865F1644CD6E9D8015DFB9
                                                                                                Malicious:true
                                                                                                Yara Hits:
                                                                                                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\ProgramData\svchost.exe, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\ProgramData\svchost.exe, Author: unknown
                                                                                                • Rule: njrat1, Description: Identify njRat, Source: C:\ProgramData\svchost.exe, Author: Brian Wallace @botnet_hunter
                                                                                                • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\ProgramData\svchost.exe, Author: ditekSHen
                                                                                                Antivirus:
                                                                                                • Antivirus: Avira, Detection: 100%
                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                • Antivirus: Virustotal, Detection: 79%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...._.e................................. ........@.. ....................................@.................................l...O.......@............................................................................ ............... ..H............text....... ...................... ..`.rsrc...@...........................@..@.reloc..............................@..B........................H........e...E..........................................................&.(......**..(......*.s.........s.........s.........s..........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                                                                                Process:C:\Users\user\Desktop\1.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):26
                                                                                                Entropy (8bit):3.95006375643621
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:ggPYV:rPYV
                                                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                Malicious:false
                                                                                                Reputation:high, very likely benign file
                                                                                                Preview:[ZoneTransfer]....ZoneId=0
                                                                                                Process:C:\Users\user\Desktop\1.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:modified
                                                                                                Size (bytes):525
                                                                                                Entropy (8bit):5.259753436570609
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                                                                                MD5:260E01CC001F9C4643CA7A62F395D747
                                                                                                SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                                                                                SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                                                                                SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                                                                                Malicious:false
                                                                                                Reputation:moderate, very likely benign file
                                                                                                Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                                                                                Process:C:\ProgramData\svchost.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):525
                                                                                                Entropy (8bit):5.259753436570609
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                                                                                MD5:260E01CC001F9C4643CA7A62F395D747
                                                                                                SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                                                                                SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                                                                                SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                                                                                Malicious:false
                                                                                                Reputation:moderate, very likely benign file
                                                                                                Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                                                                                Process:C:\ProgramData\svchost.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):37888
                                                                                                Entropy (8bit):5.574394315899761
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:1W6vEiTb/vpWNcZ0y8fDC7//DwLkyYd/rAF+rMRTyN/0L+EcoinblneHQM3epzX/:w6vTZ38fDC7/sVY1rM+rMRa8Nukh8t
                                                                                                MD5:0DE31E650BCEA7C72DD79073999A7DC1
                                                                                                SHA1:EC128AFE544DAF0ED9F4325C48772F5F360BCC48
                                                                                                SHA-256:1C0D47E5753714456BCE1435810059BEE8D3CDF7F579F7D1DE39D65EC7452CF0
                                                                                                SHA-512:2B6E295753A339C23683BBD4212B867657AB128B6DEF4F37C8FFCA78A456192CA7E754400ACF36D1E3C0EE1415A9981260D88ED441865F1644CD6E9D8015DFB9
                                                                                                Malicious:true
                                                                                                Yara Hits:
                                                                                                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exe, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exe, Author: unknown
                                                                                                • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exe, Author: Brian Wallace @botnet_hunter
                                                                                                • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\134cc1d0196af692d1e58df35504bc9f.exe, Author: ditekSHen
                                                                                                Antivirus:
                                                                                                • Antivirus: Avira, Detection: 100%
                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                • Antivirus: Virustotal, Detection: 79%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...._.e................................. ........@.. ....................................@.................................l...O.......@............................................................................ ............... ..H............text....... ...................... ..`.rsrc...@...........................@..@.reloc..............................@..B........................H........e...E..........................................................&.(......**..(......*.s.........s.........s.........s..........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                                                                                Process:C:\ProgramData\svchost.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):26
                                                                                                Entropy (8bit):3.95006375643621
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:ggPYV:rPYV
                                                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                Malicious:false
                                                                                                Preview:[ZoneTransfer]....ZoneId=0
                                                                                                Process:C:\ProgramData\svchost.exe
                                                                                                File Type:Microsoft Windows Autorun file
                                                                                                Category:modified
                                                                                                Size (bytes):50
                                                                                                Entropy (8bit):4.320240000427043
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:It1KV2LKMACovK0x:e1KzxvD
                                                                                                MD5:5B0B50BADE67C5EC92D42E971287A5D9
                                                                                                SHA1:90D5C99143E7A56AD6E5EE401015F8ECC093D95A
                                                                                                SHA-256:04DDE2489D2D2E6846D42250D813AB90B5CA847D527F8F2C022E6C327DC6DB53
                                                                                                SHA-512:C064DC3C4185A38D1CAEBD069ACB9FDBB85DFB650D6A241036E501A09BC89FD06E267BE9D400D20E6C14B4068473D1C6557962E8D82FDFD191DB7EABB6E66821
                                                                                                Malicious:true
                                                                                                Preview:[autorun]..open=C:\svchost.exe..shellexecute=C:\..
                                                                                                Process:C:\ProgramData\svchost.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):37888
                                                                                                Entropy (8bit):5.574394315899761
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:1W6vEiTb/vpWNcZ0y8fDC7//DwLkyYd/rAF+rMRTyN/0L+EcoinblneHQM3epzX/:w6vTZ38fDC7/sVY1rM+rMRa8Nukh8t
                                                                                                MD5:0DE31E650BCEA7C72DD79073999A7DC1
                                                                                                SHA1:EC128AFE544DAF0ED9F4325C48772F5F360BCC48
                                                                                                SHA-256:1C0D47E5753714456BCE1435810059BEE8D3CDF7F579F7D1DE39D65EC7452CF0
                                                                                                SHA-512:2B6E295753A339C23683BBD4212B867657AB128B6DEF4F37C8FFCA78A456192CA7E754400ACF36D1E3C0EE1415A9981260D88ED441865F1644CD6E9D8015DFB9
                                                                                                Malicious:true
                                                                                                Yara Hits:
                                                                                                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\svchost.exe, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\svchost.exe, Author: unknown
                                                                                                • Rule: njrat1, Description: Identify njRat, Source: C:\svchost.exe, Author: Brian Wallace @botnet_hunter
                                                                                                • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\svchost.exe, Author: ditekSHen
                                                                                                Antivirus:
                                                                                                • Antivirus: Avira, Detection: 100%
                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                • Antivirus: Virustotal, Detection: 79%, Browse
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...._.e................................. ........@.. ....................................@.................................l...O.......@............................................................................ ............... ..H............text....... ...................... ..`.rsrc...@...........................@..@.reloc..............................@..B........................H........e...E..........................................................&.(......**..(......*.s.........s.........s.........s..........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                                                                                Process:C:\ProgramData\svchost.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):26
                                                                                                Entropy (8bit):3.95006375643621
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:ggPYV:rPYV
                                                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                Malicious:false
                                                                                                Preview:[ZoneTransfer]....ZoneId=0
                                                                                                Process:C:\Windows\SysWOW64\netsh.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):313
                                                                                                Entropy (8bit):4.971939296804078
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
                                                                                                MD5:689E2126A85BF55121488295EE068FA1
                                                                                                SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
                                                                                                SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
                                                                                                SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
                                                                                                Malicious:false
                                                                                                Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
                                                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Entropy (8bit):5.574394315899761
                                                                                                TrID:
                                                                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                • Windows Screen Saver (13104/52) 0.07%
                                                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                File name:1.exe
                                                                                                File size:37'888 bytes
                                                                                                MD5:0de31e650bcea7c72dd79073999a7dc1
                                                                                                SHA1:ec128afe544daf0ed9f4325c48772f5f360bcc48
                                                                                                SHA256:1c0d47e5753714456bce1435810059bee8d3cdf7f579f7d1de39d65ec7452cf0
                                                                                                SHA512:2b6e295753a339c23683bbd4212b867657ab128b6def4f37c8ffca78a456192ca7e754400acf36d1e3c0ee1415a9981260d88ed441865f1644cd6e9d8015dfb9
                                                                                                SSDEEP:384:1W6vEiTb/vpWNcZ0y8fDC7//DwLkyYd/rAF+rMRTyN/0L+EcoinblneHQM3epzX/:w6vTZ38fDC7/sVY1rM+rMRa8Nukh8t
                                                                                                TLSH:ED033A4D7FE18168C5FD067B05B2D412077BE04B6E23D90E8EF264AA37636C18B50AF2
                                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...._.e................................. ........@.. ....................................@................................
                                                                                                Icon Hash:90cececece8e8eb0
                                                                                                Entrypoint:0x40abbe
                                                                                                Entrypoint Section:.text
                                                                                                Digitally signed:false
                                                                                                Imagebase:0x400000
                                                                                                Subsystem:windows gui
                                                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                Time Stamp:0x65AB5FC7 [Sat Jan 20 05:53:11 2024 UTC]
                                                                                                TLS Callbacks:
                                                                                                CLR (.Net) Version:
                                                                                                OS Version Major:4
                                                                                                OS Version Minor:0
                                                                                                File Version Major:4
                                                                                                File Version Minor:0
                                                                                                Subsystem Version Major:4
                                                                                                Subsystem Version Minor:0
                                                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                Instruction
                                                                                                jmp dword ptr [00402000h]
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xab6c0x4f.text
                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x240.rsrc
                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xe0000xc.reloc
                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                .text0x20000x8bc40x8c00False0.4636439732142857data5.605891842367962IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                .rsrc0xc0000x2400x400False0.3134765625data4.968771659524424IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                .reloc0xe0000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                RT_MANIFEST0xc0580x1e7XML 1.0 document, ASCII text, with CRLF line terminators0.5338809034907598
                                                                                                DLLImport
                                                                                                mscoree.dll_CorExeMain
                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Jan 20, 2024 09:41:11.712822914 CET4972917387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:11.915596008 CET17387497293.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:12.424320936 CET4972917387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:12.627223969 CET17387497293.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:13.127494097 CET4972917387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:13.330347061 CET17387497293.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:13.834378004 CET4972917387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:14.037357092 CET17387497293.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:14.549057007 CET4972917387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:14.751702070 CET17387497293.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:16.770979881 CET4973617387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:16.976404905 CET17387497363.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:17.486641884 CET4973617387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:17.691643000 CET17387497363.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:18.205421925 CET4973617387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:18.410609007 CET17387497363.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:18.924032927 CET4973617387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:19.128968954 CET17387497363.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:19.642810106 CET4973617387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:19.849062920 CET17387497363.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:21.863398075 CET4973717387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:22.068361044 CET17387497373.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:22.580513954 CET4973717387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:22.786015987 CET17387497373.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:23.299151897 CET4973717387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:23.504059076 CET17387497373.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:24.017998934 CET4973717387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:24.222985983 CET17387497373.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:24.736558914 CET4973717387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:24.941884041 CET17387497373.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:27.050839901 CET4973817387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:27.252768993 CET17387497383.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:27.767905951 CET4973817387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:27.970029116 CET17387497383.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:28.471054077 CET4973817387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:28.673047066 CET17387497383.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:29.174330950 CET4973817387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:29.376384020 CET17387497383.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:29.877262115 CET4973817387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:30.079513073 CET17387497383.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:32.082487106 CET4973917387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:32.283849955 CET17387497393.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:32.799088001 CET4973917387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:33.000164032 CET17387497393.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:33.502227068 CET4973917387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:33.703367949 CET17387497393.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:34.205257893 CET4973917387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:34.406229973 CET17387497393.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:34.908370018 CET4973917387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:35.109736919 CET17387497393.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:37.112896919 CET4974017387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:37.314481974 CET17387497403.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:37.830219030 CET4974017387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:38.031657934 CET17387497403.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:38.533330917 CET4974017387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:38.734723091 CET17387497403.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:39.252080917 CET4974017387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:39.453576088 CET17387497403.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:39.955228090 CET4974017387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:40.156522036 CET17387497403.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:42.160154104 CET4974117387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:42.362605095 CET17387497413.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:42.877306938 CET4974117387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:43.080209970 CET17387497413.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:43.580411911 CET4974117387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:43.783242941 CET17387497413.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:44.283412933 CET4974117387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:44.486099958 CET17387497413.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:44.986759901 CET4974117387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:45.189344883 CET17387497413.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:48.332163095 CET4974217387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:48.532831907 CET17387497423.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:49.036346912 CET4974217387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:49.237174034 CET17387497423.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:49.752166986 CET4974217387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:49.953001022 CET17387497423.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:50.455251932 CET4974217387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:50.656164885 CET17387497423.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:51.158301115 CET4974217387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:51.359184980 CET17387497423.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:53.363338947 CET4974417387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:53.565553904 CET17387497443.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:54.080372095 CET4974417387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:54.282128096 CET17387497443.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:54.783376932 CET4974417387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:54.985537052 CET17387497443.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:55.486478090 CET4974417387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:55.688302994 CET17387497443.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:56.189651966 CET4974417387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:56.391432047 CET17387497443.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:58.394903898 CET4974517387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:58.598195076 CET17387497453.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:59.111443043 CET4974517387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:41:59.317725897 CET17387497453.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:41:59.830178976 CET4974517387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:42:00.033164024 CET17387497453.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:42:00.533267021 CET4974517387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:42:00.736185074 CET17387497453.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:42:01.252094984 CET4974517387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:42:01.455178022 CET17387497453.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:42:03.684804916 CET4974617387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:42:03.887736082 CET17387497463.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:42:04.392615080 CET4974617387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:42:04.595284939 CET17387497463.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:42:05.111394882 CET4974617387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:42:05.313913107 CET17387497463.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:42:05.814503908 CET4974617387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:42:06.017216921 CET17387497463.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:42:06.517810106 CET4974617387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:42:06.720513105 CET17387497463.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:42:08.740482092 CET4974717387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:42:08.942466974 CET17387497473.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:42:09.455121994 CET4974717387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:42:09.659456015 CET17387497473.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:42:10.173928022 CET4974717387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:42:10.375895977 CET17387497473.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:42:10.877151966 CET4974717387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:42:11.079377890 CET17387497473.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:42:11.580329895 CET4974717387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:42:11.782465935 CET17387497473.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:42:13.909955025 CET4974817387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:14.111680031 CET173874974852.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:14.627088070 CET4974817387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:14.828419924 CET173874974852.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:15.330092907 CET4974817387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:15.531686068 CET173874974852.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:16.033309937 CET4974817387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:16.234769106 CET173874974852.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:16.736433029 CET4974817387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:16.938069105 CET173874974852.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:18.942706108 CET4974917387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:19.142683983 CET173874974952.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:19.658184052 CET4974917387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:19.858252048 CET173874974952.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:20.366559982 CET4974917387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:20.566680908 CET173874974952.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:21.080040932 CET4974917387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:21.280054092 CET173874974952.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:21.892571926 CET4974917387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:22.092673063 CET173874974952.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:24.098567963 CET4975017387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:24.298947096 CET173874975052.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:24.895518064 CET4975017387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:25.095995903 CET173874975052.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:25.689419031 CET4975017387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:25.890708923 CET173874975052.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:26.392560959 CET4975017387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:26.592905045 CET173874975052.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:27.095676899 CET4975017387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:27.295939922 CET173874975052.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:29.300738096 CET4975117387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:29.502739906 CET173874975152.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:30.017656088 CET4975117387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:30.219652891 CET173874975152.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:30.720665932 CET4975117387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:30.922718048 CET173874975152.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:31.424012899 CET4975117387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:31.626112938 CET173874975152.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:32.127130032 CET4975117387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:32.329087019 CET173874975152.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:34.332341909 CET4975217387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:34.533792019 CET173874975252.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:35.080142975 CET4975217387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:35.281635046 CET173874975252.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:35.892528057 CET4975217387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:36.093977928 CET173874975252.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:36.595658064 CET4975217387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:36.797179937 CET173874975252.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:37.392512083 CET4975217387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:37.594363928 CET173874975252.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:40.738593102 CET4975317387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:40.941148996 CET173874975352.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:41.517721891 CET4975317387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:41.720206976 CET173874975352.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:42.314372063 CET4975317387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:42.516952991 CET173874975352.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:43.017477036 CET4975317387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:43.220329046 CET173874975352.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:43.814456940 CET4975317387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:44.017178059 CET173874975352.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:45.772676945 CET4975417387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:45.974843979 CET173874975452.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:46.486217022 CET4975417387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:46.688153982 CET173874975452.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:47.189331055 CET4975417387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:47.391483068 CET173874975452.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:47.892462015 CET4975417387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:48.094822884 CET173874975452.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:48.595588923 CET4975417387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:48.797736883 CET173874975452.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:50.442320108 CET4975517387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:50.644423008 CET173874975552.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:51.158080101 CET4975517387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:51.360260010 CET173874975552.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:51.861361980 CET4975517387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:52.063479900 CET173874975552.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:52.564507961 CET4975517387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:52.766633987 CET173874975552.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:53.267657042 CET4975517387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:53.470069885 CET173874975552.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:55.006591082 CET4975617387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:55.209012985 CET173874975652.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:55.720901012 CET4975617387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:55.923330069 CET173874975652.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:56.517560959 CET4975617387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:56.719949007 CET173874975652.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:57.220727921 CET4975617387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:57.422817945 CET173874975652.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:57.923854113 CET4975617387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:58.126861095 CET173874975652.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:42:59.550348997 CET4975717387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:42:59.752300978 CET173874975752.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:43:00.267441988 CET4975717387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:43:00.469166994 CET173874975752.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:43:00.970668077 CET4975717387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:43:01.172367096 CET173874975752.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:43:01.673695087 CET4975717387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:43:01.875493050 CET173874975752.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:43:02.376801968 CET4975717387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:43:02.580440044 CET173874975752.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:43:03.910856962 CET4975817387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:43:04.114578009 CET173874975852.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:43:04.626806021 CET4975817387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:43:04.830526114 CET173874975852.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:43:05.345532894 CET4975817387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:43:05.549376965 CET173874975852.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:43:06.064261913 CET4975817387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:43:06.267836094 CET173874975852.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:43:06.783040047 CET4975817387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:43:06.987273932 CET173874975852.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:43:08.241580963 CET4975917387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:43:08.445373058 CET173874975952.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:43:08.954988003 CET4975917387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:43:09.158669949 CET173874975952.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:43:09.673780918 CET4975917387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:43:09.877614975 CET173874975952.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:43:10.392388105 CET4975917387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:43:10.596318007 CET173874975952.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:43:11.111318111 CET4975917387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:43:11.315485001 CET173874975952.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:43:12.471856117 CET4976017387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:43:12.676924944 CET173874976052.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:43:13.189378977 CET4976017387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:43:13.394315004 CET173874976052.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:43:13.907990932 CET4976017387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:43:14.112977028 CET173874976052.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:43:14.626940012 CET4976017387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:43:14.831836939 CET173874976052.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:43:15.345530987 CET4976017387192.168.2.452.28.247.255
                                                                                                Jan 20, 2024 09:43:15.550561905 CET173874976052.28.247.255192.168.2.4
                                                                                                Jan 20, 2024 09:43:16.751164913 CET4976117387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:16.952608109 CET17387497613.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:17.454989910 CET4976117387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:17.655560017 CET17387497613.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:18.158000946 CET4976117387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:18.358114958 CET17387497613.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:18.861231089 CET4976117387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:19.061671019 CET17387497613.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:19.564243078 CET4976117387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:19.764523983 CET17387497613.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:20.784641981 CET4976217387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:20.987299919 CET17387497623.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:21.501744986 CET4976217387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:21.704408884 CET17387497623.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:22.205013037 CET4976217387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:22.407737017 CET17387497623.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:22.908097029 CET4976217387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:23.110822916 CET17387497623.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:23.611242056 CET4976217387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:23.814141035 CET17387497623.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:24.753384113 CET4976317387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:24.957695007 CET17387497633.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:25.470509052 CET4976317387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:25.674915075 CET17387497633.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:26.189218044 CET4976317387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:26.393640041 CET17387497633.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:26.907980919 CET4976317387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:27.112152100 CET17387497633.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:27.626735926 CET4976317387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:27.830682993 CET17387497633.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:28.724868059 CET4976417387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:28.928689003 CET17387497643.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:29.439292908 CET4976417387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:29.643161058 CET17387497643.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:30.158094883 CET4976417387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:30.361573935 CET17387497643.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:30.876699924 CET4976417387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:31.080394983 CET17387497643.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:31.595468044 CET4976417387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:31.799479008 CET17387497643.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:32.628735065 CET4976517387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:32.832262039 CET17387497653.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:33.345613956 CET4976517387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:33.549182892 CET17387497653.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:34.064306974 CET4976517387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:34.267715931 CET17387497653.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:34.782967091 CET4976517387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:34.986388922 CET17387497653.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:35.501952887 CET4976517387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:35.705705881 CET17387497653.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:36.472922087 CET4976617387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:36.673332930 CET17387497663.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:37.189260960 CET4976617387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:37.390182018 CET17387497663.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:37.892450094 CET4976617387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:38.092808962 CET17387497663.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:38.595525026 CET4976617387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:38.796003103 CET17387497663.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:39.298648119 CET4976617387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:39.499110937 CET17387497663.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:40.222223043 CET4976717387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:40.425297022 CET17387497673.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:40.939182997 CET4976717387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:41.141282082 CET17387497673.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:41.642565966 CET4976717387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:41.845123053 CET17387497673.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:42.345417023 CET4976717387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:42.547763109 CET17387497673.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:43.048830032 CET4976717387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:43.251351118 CET17387497673.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:43.927217960 CET4976817387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:44.131257057 CET17387497683.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:44.642301083 CET4976817387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:44.845941067 CET17387497683.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:45.361114979 CET4976817387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:45.564698935 CET17387497683.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:46.079879045 CET4976817387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:46.283467054 CET17387497683.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:46.798639059 CET4976817387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:47.002389908 CET17387497683.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:47.629395962 CET4976917387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:47.831688881 CET17387497693.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:48.345618010 CET4976917387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:48.547888041 CET17387497693.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:49.048755884 CET4976917387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:49.251250982 CET17387497693.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:49.751749992 CET4976917387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:49.955554008 CET17387497693.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:50.470558882 CET4976917387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:50.673055887 CET17387497693.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:51.254292965 CET4977017387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:51.455020905 CET17387497703.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:51.970520020 CET4977017387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:52.170619011 CET17387497703.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:52.673531055 CET4977017387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:52.873877048 CET17387497703.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:53.376652956 CET4977017387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:53.577233076 CET17387497703.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:54.079875946 CET4977017387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:54.280071974 CET17387497703.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:54.832355976 CET4977117387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:55.036303997 CET17387497713.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:55.548552990 CET4977117387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:55.752510071 CET17387497713.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:56.267339945 CET4977117387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:56.471343994 CET17387497713.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:56.986124039 CET4977117387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:57.190490961 CET17387497713.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:57.704812050 CET4977117387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:57.908915997 CET17387497713.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:58.668939114 CET4977217387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:58.872946978 CET17387497723.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:43:59.376621008 CET4977217387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:43:59.580449104 CET17387497723.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:00.283040047 CET4977217387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:00.487010956 CET17387497723.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:01.079838991 CET4977217387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:01.284128904 CET17387497723.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:01.915122986 CET4977217387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:02.118837118 CET17387497723.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:02.596961021 CET4977317387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:02.798979998 CET17387497733.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:03.314233065 CET4977317387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:03.516113997 CET17387497733.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:04.017364025 CET4977317387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:04.219769955 CET17387497733.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:04.720376968 CET4977317387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:04.922791004 CET17387497733.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:05.423629045 CET4977317387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:05.625566006 CET17387497733.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:06.081537962 CET4977417387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:06.285464048 CET17387497743.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:06.798568010 CET4977417387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:07.002304077 CET17387497743.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:07.517467976 CET4977417387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:07.721292973 CET17387497743.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:08.235949993 CET4977417387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:08.439965010 CET17387497743.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:08.954720974 CET4977417387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:09.158763885 CET17387497743.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:09.580920935 CET4977517387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:09.782244921 CET17387497753.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:10.282860041 CET4977517387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:10.484473944 CET17387497753.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:10.985950947 CET4977517387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:11.187494993 CET17387497753.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:11.689069986 CET4977517387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:11.890635014 CET17387497753.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:12.392189980 CET4977517387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:12.593883991 CET17387497753.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:12.987263918 CET4977617387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:13.189534903 CET17387497763.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:13.689640045 CET4977617387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:13.891593933 CET17387497763.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:14.392208099 CET4977617387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:14.594176054 CET17387497763.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:15.095340014 CET4977617387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:15.297683001 CET17387497763.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:15.798540115 CET4977617387192.168.2.43.69.157.220
                                                                                                Jan 20, 2024 09:44:16.000572920 CET17387497763.69.157.220192.168.2.4
                                                                                                Jan 20, 2024 09:44:16.485835075 CET4977717387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:16.688868999 CET17387497773.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:17.204689026 CET4977717387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:17.407442093 CET17387497773.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:17.923635960 CET4977717387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:18.126425982 CET17387497773.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:18.626580000 CET4977717387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:18.829551935 CET17387497773.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:19.329863071 CET4977717387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:19.532891035 CET17387497773.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:19.881983995 CET4977817387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:20.082356930 CET17387497783.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:20.595415115 CET4977817387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:20.795949936 CET17387497783.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:21.298554897 CET4977817387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:21.498984098 CET17387497783.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:22.001743078 CET4977817387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:22.202167988 CET17387497783.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:22.704720974 CET4977817387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:22.905137062 CET17387497783.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:23.221935034 CET4977917387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:23.424501896 CET17387497793.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:23.939085960 CET4977917387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:24.141297102 CET17387497793.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:24.642244101 CET4977917387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:24.844896078 CET17387497793.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:25.345359087 CET4977917387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:25.547791958 CET17387497793.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:26.048420906 CET4977917387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:26.250541925 CET17387497793.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:26.550436020 CET4978017387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:26.753328085 CET17387497803.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:27.267160892 CET4978017387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:27.469779968 CET17387497803.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:27.970288038 CET4978017387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:28.172929049 CET17387497803.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:28.673557043 CET4978017387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:28.876292944 CET17387497803.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:29.392236948 CET4978017387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:29.595045090 CET17387497803.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:29.878786087 CET4978117387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:30.078660011 CET17387497813.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:30.579674006 CET4978117387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:30.779625893 CET17387497813.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:31.407804966 CET4978117387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:31.607754946 CET17387497813.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:32.220303059 CET4978117387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:32.420172930 CET17387497813.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:33.017270088 CET4978117387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:33.217226982 CET17387497813.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:33.472126007 CET4978217387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:33.672651052 CET17387497823.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:34.220268011 CET4978217387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:34.420603991 CET17387497823.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:35.017167091 CET4978217387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:35.217677116 CET17387497823.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:35.720263004 CET4978217387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:35.923007965 CET17387497823.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:36.517180920 CET4978217387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:36.717418909 CET17387497823.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:36.962258101 CET4978317387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:37.166451931 CET17387497833.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:37.673435926 CET4978317387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:37.877624989 CET17387497833.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:38.392875910 CET4978317387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:38.597028017 CET17387497833.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:39.110893011 CET4978317387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:39.315748930 CET17387497833.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:39.829629898 CET4978317387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:40.033857107 CET17387497833.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:40.268909931 CET4978417387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:40.470607042 CET17387497843.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:40.971462965 CET4978417387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:41.172988892 CET17387497843.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:41.689007044 CET4978417387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:41.890573978 CET17387497843.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:42.392119884 CET4978417387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:42.593415022 CET17387497843.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:43.095243931 CET4978417387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:43.296634912 CET17387497843.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:43.519356966 CET4978517387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:43.720329046 CET17387497853.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:44.220256090 CET4978517387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:44.421288967 CET17387497853.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:44.923588037 CET4978517387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:45.124808073 CET17387497853.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:45.626547098 CET4978517387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:45.827615976 CET17387497853.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:46.345215082 CET4978517387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:46.546237946 CET17387497853.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:47.052879095 CET4978617387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:47.254530907 CET17387497863.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:47.767122984 CET4978617387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:47.968853951 CET17387497863.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:48.470285892 CET4978617387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:48.672122002 CET17387497863.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:49.173388004 CET4978617387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:49.375302076 CET17387497863.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:49.876676083 CET4978617387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:50.078453064 CET17387497863.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:50.270226955 CET4978717387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:50.472978115 CET17387497873.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:50.986011028 CET4978717387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:51.188870907 CET17387497873.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:51.704674006 CET4978717387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:51.907336950 CET17387497873.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:52.407718897 CET4978717387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:52.610443115 CET17387497873.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:53.110857010 CET4978717387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:53.313384056 CET17387497873.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:53.498095989 CET4978817387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:53.699814081 CET17387497883.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:54.204582930 CET4978817387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:54.406153917 CET17387497883.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:54.907711029 CET4978817387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:55.109282017 CET17387497883.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:55.610872030 CET4978817387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:55.812469959 CET17387497883.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:56.313990116 CET4978817387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:56.515527010 CET17387497883.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:56.675440073 CET4978917387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:56.876529932 CET17387497893.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:57.376470089 CET4978917387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:57.577590942 CET17387497893.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:58.079575062 CET4978917387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:58.280482054 CET17387497893.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:58.782682896 CET4978917387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:58.983817101 CET17387497893.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:59.485831976 CET4978917387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:44:59.687067032 CET17387497893.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:44:59.846929073 CET4979017387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:45:00.048918009 CET17387497903.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:45:00.720195055 CET4979017387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:45:00.922353029 CET17387497903.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:45:01.517081022 CET4979017387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:45:01.719330072 CET17387497903.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:45:02.220192909 CET4979017387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:45:02.422441959 CET17387497903.66.38.117192.168.2.4
                                                                                                Jan 20, 2024 09:45:03.017060041 CET4979017387192.168.2.43.66.38.117
                                                                                                Jan 20, 2024 09:45:03.219079971 CET17387497903.66.38.117192.168.2.4
                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Jan 20, 2024 09:41:11.230612040 CET6165353192.168.2.41.1.1.1
                                                                                                Jan 20, 2024 09:41:11.351042032 CET53616531.1.1.1192.168.2.4
                                                                                                Jan 20, 2024 09:42:13.786719084 CET6383153192.168.2.41.1.1.1
                                                                                                Jan 20, 2024 09:42:13.908655882 CET53638311.1.1.1192.168.2.4
                                                                                                Jan 20, 2024 09:43:16.628700972 CET5048053192.168.2.41.1.1.1
                                                                                                Jan 20, 2024 09:43:16.749082088 CET53504801.1.1.1192.168.2.4
                                                                                                Jan 20, 2024 09:44:16.362341881 CET5925453192.168.2.41.1.1.1
                                                                                                Jan 20, 2024 09:44:16.482773066 CET53592541.1.1.1192.168.2.4
                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                Jan 20, 2024 09:41:11.230612040 CET192.168.2.41.1.1.10x4fc2Standard query (0)6.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                                                Jan 20, 2024 09:42:13.786719084 CET192.168.2.41.1.1.10x631dStandard query (0)6.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                                                Jan 20, 2024 09:43:16.628700972 CET192.168.2.41.1.1.10xcb84Standard query (0)6.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                                                Jan 20, 2024 09:44:16.362341881 CET192.168.2.41.1.1.10xc05Standard query (0)6.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                Jan 20, 2024 09:41:11.351042032 CET1.1.1.1192.168.2.40x4fc2No error (0)6.tcp.eu.ngrok.io3.66.38.117A (IP address)IN (0x0001)false
                                                                                                Jan 20, 2024 09:42:13.908655882 CET1.1.1.1192.168.2.40x631dNo error (0)6.tcp.eu.ngrok.io52.28.247.255A (IP address)IN (0x0001)false
                                                                                                Jan 20, 2024 09:43:16.749082088 CET1.1.1.1192.168.2.40xcb84No error (0)6.tcp.eu.ngrok.io3.69.157.220A (IP address)IN (0x0001)false
                                                                                                Jan 20, 2024 09:44:16.482773066 CET1.1.1.1192.168.2.40xc05No error (0)6.tcp.eu.ngrok.io3.66.38.117A (IP address)IN (0x0001)false

                                                                                                Click to jump to process

                                                                                                Click to jump to process

                                                                                                Click to dive into process behavior distribution

                                                                                                Click to jump to process

                                                                                                Target ID:0
                                                                                                Start time:09:40:54
                                                                                                Start date:20/01/2024
                                                                                                Path:C:\Users\user\Desktop\1.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\Desktop\1.exe
                                                                                                Imagebase:0x680000
                                                                                                File size:37'888 bytes
                                                                                                MD5 hash:0DE31E650BCEA7C72DD79073999A7DC1
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.1633586364.0000000000682000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000000.1633586364.0000000000682000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                                                                • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000000.1633586364.0000000000682000.00000002.00000001.01000000.00000003.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:1
                                                                                                Start time:09:41:00
                                                                                                Start date:20/01/2024
                                                                                                Path:C:\ProgramData\svchost.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\ProgramData\svchost.exe"
                                                                                                Imagebase:0xe70000
                                                                                                File size:37'888 bytes
                                                                                                MD5 hash:0DE31E650BCEA7C72DD79073999A7DC1
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\ProgramData\svchost.exe, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\ProgramData\svchost.exe, Author: unknown
                                                                                                • Rule: njrat1, Description: Identify njRat, Source: C:\ProgramData\svchost.exe, Author: Brian Wallace @botnet_hunter
                                                                                                • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\ProgramData\svchost.exe, Author: ditekSHen
                                                                                                Antivirus matches:
                                                                                                • Detection: 100%, Avira
                                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                                • Detection: 79%, Virustotal, Browse
                                                                                                Reputation:low
                                                                                                Has exited:false

                                                                                                Target ID:3
                                                                                                Start time:09:41:06
                                                                                                Start date:20/01/2024
                                                                                                Path:C:\Windows\SysWOW64\netsh.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:netsh firewall add allowedprogram "C:\ProgramData\svchost.exe" "svchost.exe" ENABLE
                                                                                                Imagebase:0x1560000
                                                                                                File size:82'432 bytes
                                                                                                MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:moderate
                                                                                                Has exited:true

                                                                                                Target ID:4
                                                                                                Start time:09:41:06
                                                                                                Start date:20/01/2024
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff7699e0000
                                                                                                File size:862'208 bytes
                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:6
                                                                                                Start time:09:41:18
                                                                                                Start date:20/01/2024
                                                                                                Path:C:\ProgramData\svchost.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\ProgramData\svchost.exe" ..
                                                                                                Imagebase:0x660000
                                                                                                File size:37'888 bytes
                                                                                                MD5 hash:0DE31E650BCEA7C72DD79073999A7DC1
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:9
                                                                                                Start time:09:41:27
                                                                                                Start date:20/01/2024
                                                                                                Path:C:\ProgramData\svchost.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\ProgramData\svchost.exe" ..
                                                                                                Imagebase:0x5d0000
                                                                                                File size:37'888 bytes
                                                                                                MD5 hash:0DE31E650BCEA7C72DD79073999A7DC1
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:10
                                                                                                Start time:09:41:35
                                                                                                Start date:20/01/2024
                                                                                                Path:C:\ProgramData\svchost.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\ProgramData\svchost.exe" ..
                                                                                                Imagebase:0x530000
                                                                                                File size:37'888 bytes
                                                                                                MD5 hash:0DE31E650BCEA7C72DD79073999A7DC1
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Reset < >

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:8.6%
                                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                                  Signature Coverage:0%
                                                                                                  Total number of Nodes:37
                                                                                                  Total number of Limit Nodes:1
                                                                                                  execution_graph 1718 cca8a4 1721 cca8c6 SetFileAttributesW 1718->1721 1720 cca90b 1721->1720 1722 ccac24 1723 ccac46 ShellExecuteExW 1722->1723 1725 ccac88 1723->1725 1670 cca8c6 1673 cca8ef SetFileAttributesW 1670->1673 1672 cca90b 1673->1672 1674 ccac46 1675 ccac6c ShellExecuteExW 1674->1675 1677 ccac88 1675->1677 1678 cca646 1679 cca67e CreateMutexW 1678->1679 1681 cca6c1 1679->1681 1710 ccaa07 1712 ccaa3e CopyFileW 1710->1712 1713 ccaa8e 1712->1713 1702 cca361 1704 cca392 RegQueryValueExW 1702->1704 1705 cca41b 1704->1705 1706 cca462 1708 cca486 RegSetValueExW 1706->1708 1709 cca507 1708->1709 1686 cca2fe 1687 cca32a SetErrorMode 1686->1687 1688 cca353 1686->1688 1689 cca33f 1687->1689 1688->1687 1690 ccaa3e 1692 ccaa67 CopyFileW 1690->1692 1693 ccaa8e 1692->1693 1698 cca2d2 1699 cca2d6 SetErrorMode 1698->1699 1701 cca33f 1699->1701 1714 cca612 1716 cca646 CreateMutexW 1714->1716 1717 cca6c1 1716->1717

                                                                                                  Callgraph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  • Opacity -> Relevance
                                                                                                  • Disassembly available
                                                                                                  callgraph 0 Function_04F80878 26 Function_012D0606 0->26 53 Function_012D05E0 0->53 1 Function_00CCA74E 2 Function_00CCAACF 3 Function_04F806FE 4 Function_00CC2044 5 Function_00CCA646 6 Function_00CCA8C6 7 Function_00CCAC46 8 Function_00CCA7C7 9 Function_00CCACC7 10 Function_00CCA540 11 Function_04F807E8 12 Function_00CCA45C 13 Function_00CCA25E 14 Function_00CC2458 15 Function_012D0734 16 Function_00CC20D0 17 Function_00CCA2D2 18 Function_00CCA952 19 Function_04F80958 19->26 19->53 20 Function_04F80F58 21 Function_04F80759 22 Function_012D000C 23 Function_00CCA56E 24 Function_00CC2364 25 Function_00CC2264 27 Function_04F80E55 28 Function_00CCA361 29 Function_00CCAAE1 30 Function_012D0000 31 Function_00CCA462 32 Function_00CC247C 33 Function_00CCA2FE 34 Function_00CCA97E 35 Function_00CCA078 36 Function_00CCACFA 37 Function_00CC23F4 38 Function_04F80D40 39 Function_00CCA1F4 40 Function_00CCAB74 41 Function_00CC21F0 42 Function_012D0710 43 Function_00CCA172 44 Function_04F80938 45 Function_012D026D 46 Function_04F803BD 46->19 46->26 46->53 47 Function_012D066A 48 Function_00CC2005 49 Function_00CCA005 50 Function_00CCAB06 51 Function_00CCA486 52 Function_00CCAA07 54 Function_04F80BA8 55 Function_00CCA81E 56 Function_00CCAB9E 57 Function_012D067F 58 Function_00CC2098 59 Function_00CCA09A 60 Function_00CC2194 61 Function_012D0074 62 Function_04F80C22 63 Function_00CC2310 64 Function_00CCA710 65 Function_00CCAC11 66 Function_00CCA392 67 Function_00CCA612 68 Function_04F80D98 69 Function_00CCA02E 70 Function_04F8069B 71 Function_012D0649 71->47 72 Function_04F80310 72->19 72->26 72->53 73 Function_00CCA8A4 74 Function_00CCAC24 75 Function_00CCA120 76 Function_012D05C0 77 Function_00CC23BC 78 Function_00CC213C 79 Function_00CCA23C 80 Function_00CC253D 81 Function_00CCAA3E 82 Function_04F80C8D 83 Function_04F80080 84 Function_04F80301 84->19 84->26 84->53 85 Function_04F80B03 86 Function_00CC2430 87 Function_04F80F05 88 Function_012D05D0 89 Function_04F80006

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 0 4f80310-4f80334 2 4f8033e-4f80346 0->2 3 4f80336-4f80338 0->3 4 4f80348-4f8034d 2->4 5 4f8034e-4f80391 2->5 3->2 8 4f803d8-4f80418 5->8 9 4f80393-4f803bb 5->9 16 4f8041a 8->16 17 4f8041f 8->17 14 4f803ce 9->14 14->8 16->17 53 4f8041f call 4f80958 17->53 54 4f8041f call 12d0606 17->54 55 4f8041f call 12d05e0 17->55 18 4f80425-4f80434 19 4f8046b-4f80523 18->19 20 4f80436-4f80460 18->20 39 4f80570-4f80587 19->39 40 4f80525-4f80569 19->40 20->19 41 4f8058d-4f805bf 39->41 42 4f80880 39->42 40->39 41->42 53->18 54->18 55->18
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1702101475.0000000004F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_4f80000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 2l$2l$2l
                                                                                                  • API String ID: 0-1498361692
                                                                                                  • Opcode ID: 2a2242f2df27336fc11723f1a1dfe8f642644939d582cbb59183ee7a5a89da2f
                                                                                                  • Instruction ID: 499cf393f1d191a3e7901f723b68007c0d4336d58d5b25a0d4aa98a5f0947a83
                                                                                                  • Opcode Fuzzy Hash: 2a2242f2df27336fc11723f1a1dfe8f642644939d582cbb59183ee7a5a89da2f
                                                                                                  • Instruction Fuzzy Hash: D65125327202128FD718AB79C4517BE37E6AF85304B55446EE006DF39ADF39DC0A97A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 56 4f803bd-4f80418 64 4f8041a 56->64 65 4f8041f 56->65 64->65 101 4f8041f call 4f80958 65->101 102 4f8041f call 12d0606 65->102 103 4f8041f call 12d05e0 65->103 66 4f80425-4f80434 67 4f8046b-4f80523 66->67 68 4f80436-4f80460 66->68 87 4f80570-4f80587 67->87 88 4f80525-4f80569 67->88 68->67 89 4f8058d-4f805bf 87->89 90 4f80880 87->90 88->87 89->90 101->66 102->66 103->66
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1702101475.0000000004F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_4f80000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 2l$2l$2l
                                                                                                  • API String ID: 0-1498361692
                                                                                                  • Opcode ID: b6beb7efc820bce89d11c704f0c696331b6fc8079f07d123fc3664535220264b
                                                                                                  • Instruction ID: 37b24e91dd45e8a7328ed7db9ac6789bfbe1d464155c4ec5edd573ee8bc9565b
                                                                                                  • Opcode Fuzzy Hash: b6beb7efc820bce89d11c704f0c696331b6fc8079f07d123fc3664535220264b
                                                                                                  • Instruction Fuzzy Hash: FD4103327101128FDB18BB7980657BD32D3AFD5208754406EE006DF796DF29DC0A97A3
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 104 4f80958-4f80993 106 4f80999-4f80a22 104->106 107 4f80a2e-4f80a30 104->107 257 4f80a24 call 12d0606 106->257 258 4f80a24 call 12d05e0 106->258 108 4f80a37-4f80a3c 107->108 110 4f80b1e-4f80bc2 108->110 111 4f80a42-4f80a7a 108->111 147 4f80bc8-4f80c8b 110->147 148 4f80c9e-4f80ca7 110->148 127 4f80a7c-4f80a9a 111->127 128 4f80aa1-4f80afc 111->128 127->128 167 4f80b01 128->167 147->148 152 4f80cad-4f80d3e 148->152 153 4f80d51-4f80d5a 148->153 149 4f80a2a-4f80a2c 149->107 151 4f80a32 149->151 151->108 152->153 154 4f80d7a-4f80d83 153->154 155 4f80d5c-4f80d73 153->155 157 4f80da9-4f80db2 154->157 158 4f80d85-4f80d96 154->158 155->154 161 4f80db8-4f80e06 157->161 162 4f80f33-4f80f3a 157->162 158->157 184 4f80f1c-4f80f2d 161->184 167->110 184->162 186 4f80e0b-4f80e14 184->186 188 4f80e1a-4f80f1a 186->188 189 4f80f40-4f80fd1 186->189 188->184 238 4f80f3b 188->238 220 4f810ca 189->220 221 4f80fd7-4f80fe8 189->221 223 4f810cc-4f810d3 220->223 227 4f80fea-4f8100b 221->227 236 4f8100d 227->236 237 4f81012-4f81048 227->237 236->237 244 4f8104a 237->244 245 4f8104f-4f81077 237->245 238->189 244->245 249 4f81079-4f8107b 245->249 250 4f8107d-4f810a1 245->250 249->223 253 4f810aa-4f810b4 250->253 254 4f810a3-4f810a8 250->254 255 4f810ba-4f810c4 253->255 256 4f810b6-4f810b8 253->256 254->223 255->220 255->227 256->223 257->149 258->149
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1702101475.0000000004F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_4f80000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: :@k$\Ol
                                                                                                  • API String ID: 0-2913639173
                                                                                                  • Opcode ID: 81d99713c3de1e735e7e3e31ef9cb0a0fcaffa68ec2f107dffb4125b3a08077f
                                                                                                  • Instruction ID: fccdcd75e3fb0a51c44a0eb1f1bf87e66ed7864511855d923623fdd32a3bd771
                                                                                                  • Opcode Fuzzy Hash: 81d99713c3de1e735e7e3e31ef9cb0a0fcaffa68ec2f107dffb4125b3a08077f
                                                                                                  • Instruction Fuzzy Hash: 12027032720212CFDB18EB74D4517AE73E2AF88308B154479D406DB7AADF39AC46CB51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 259 cca612-cca695 263 cca69a-cca6a3 259->263 264 cca697 259->264 265 cca6a8-cca6b1 263->265 266 cca6a5 263->266 264->263 267 cca702-cca707 265->267 268 cca6b3-cca6d7 CreateMutexW 265->268 266->265 267->268 271 cca709-cca70e 268->271 272 cca6d9-cca6ff 268->272 271->272
                                                                                                  APIs
                                                                                                  • CreateMutexW.KERNELBASE(?,?), ref: 00CCA6B9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1701484414.0000000000CCA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_cca000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateMutex
                                                                                                  • String ID:
                                                                                                  • API String ID: 1964310414-0
                                                                                                  • Opcode ID: 1eb2103ec6cd452b8951803924f61812f66be4e716daf0b9d340464e73d7d3b2
                                                                                                  • Instruction ID: 9c51d217e8cd797e1b6b19f2483dc2029bf2d43539f0af53ea559fd735079f3d
                                                                                                  • Opcode Fuzzy Hash: 1eb2103ec6cd452b8951803924f61812f66be4e716daf0b9d340464e73d7d3b2
                                                                                                  • Instruction Fuzzy Hash: 853170715093846FE711CB65CC85B96BFF8EF06314F08849AE984CF292D375A909C762
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 275 cca361-cca3cf 278 cca3d4-cca3dd 275->278 279 cca3d1 275->279 280 cca3df 278->280 281 cca3e2-cca3e8 278->281 279->278 280->281 282 cca3ed-cca404 281->282 283 cca3ea 281->283 285 cca43b-cca440 282->285 286 cca406-cca419 RegQueryValueExW 282->286 283->282 285->286 287 cca41b-cca438 286->287 288 cca442-cca447 286->288 288->287
                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E24,786378CC,00000000,00000000,00000000,00000000), ref: 00CCA40C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1701484414.0000000000CCA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_cca000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: 589e45c4d1d8765f15b925f3ce2fc7ca6739e3e61d04853c7370be55f204db0b
                                                                                                  • Instruction ID: 917833b9fbe729d34825b32aa1d07db42812076cde8e951d0ad69b56105f8bc1
                                                                                                  • Opcode Fuzzy Hash: 589e45c4d1d8765f15b925f3ce2fc7ca6739e3e61d04853c7370be55f204db0b
                                                                                                  • Instruction Fuzzy Hash: B631C375505784AFE722CF15CC84F92BBF8EF06314F08849AE985CB292D324E948CB72
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 292 cca462-cca4c3 295 cca4c8-cca4d4 292->295 296 cca4c5 292->296 297 cca4d9-cca4f0 295->297 298 cca4d6 295->298 296->295 300 cca527-cca52c 297->300 301 cca4f2-cca505 RegSetValueExW 297->301 298->297 300->301 302 cca52e-cca533 301->302 303 cca507-cca524 301->303 302->303
                                                                                                  APIs
                                                                                                  • RegSetValueExW.KERNELBASE(?,00000E24,786378CC,00000000,00000000,00000000,00000000), ref: 00CCA4F8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1701484414.0000000000CCA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_cca000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value
                                                                                                  • String ID:
                                                                                                  • API String ID: 3702945584-0
                                                                                                  • Opcode ID: e748aa9b8d09b1ab7d548f7ce02cabf9029c5f58c38e6e98bee3ecee4fa95238
                                                                                                  • Instruction ID: c935e5d4bf6240977698965668177af342d90c5bd17e37eab0b79e4ca640d327
                                                                                                  • Opcode Fuzzy Hash: e748aa9b8d09b1ab7d548f7ce02cabf9029c5f58c38e6e98bee3ecee4fa95238
                                                                                                  • Instruction Fuzzy Hash: B721AE725047846FD7228B11DC44FA7BFB8EF46214F08859AE985CB692C364E948C772
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 307 cca646-cca695 310 cca69a-cca6a3 307->310 311 cca697 307->311 312 cca6a8-cca6b1 310->312 313 cca6a5 310->313 311->310 314 cca702-cca707 312->314 315 cca6b3-cca6bb CreateMutexW 312->315 313->312 314->315 317 cca6c1-cca6d7 315->317 318 cca709-cca70e 317->318 319 cca6d9-cca6ff 317->319 318->319
                                                                                                  APIs
                                                                                                  • CreateMutexW.KERNELBASE(?,?), ref: 00CCA6B9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1701484414.0000000000CCA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_cca000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateMutex
                                                                                                  • String ID:
                                                                                                  • API String ID: 1964310414-0
                                                                                                  • Opcode ID: 0101d6531354824694e6a4c2353870c436a31327e899a350c383271ac8a52be0
                                                                                                  • Instruction ID: 42bbe4ad51df30a7892f4923edfd9423b575c5c1bba723df55531abba7e6086c
                                                                                                  • Opcode Fuzzy Hash: 0101d6531354824694e6a4c2353870c436a31327e899a350c383271ac8a52be0
                                                                                                  • Instruction Fuzzy Hash: 0821AF71600244AFE720DB66CD49FA6FBE8EF04314F088469E948CB641D371E909CA76
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 322 ccaa07-ccaa65 324 ccaa6a-ccaa70 322->324 325 ccaa67 322->325 326 ccaa75-ccaa7e 324->326 327 ccaa72 324->327 325->324 328 ccaa80-ccaaa0 CopyFileW 326->328 329 ccaac1-ccaac6 326->329 327->326 332 ccaac8-ccaacd 328->332 333 ccaaa2-ccaabe 328->333 329->328 332->333
                                                                                                  APIs
                                                                                                  • CopyFileW.KERNELBASE(?,?,?), ref: 00CCAA86
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1701484414.0000000000CCA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_cca000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CopyFile
                                                                                                  • String ID:
                                                                                                  • API String ID: 1304948518-0
                                                                                                  • Opcode ID: a27dfcdd6ded956b88231ca0aa6274c7a2051f669f3589b421ac6d348dc8f1b4
                                                                                                  • Instruction ID: 6f0fb0a7c262d39f887eddc39cd5546a819a110b7e9839ae8c33c2774483bebf
                                                                                                  • Opcode Fuzzy Hash: a27dfcdd6ded956b88231ca0aa6274c7a2051f669f3589b421ac6d348dc8f1b4
                                                                                                  • Instruction Fuzzy Hash: 152171B15053849FD711CB25DD45B52BFF8EF06714F0984AAE984CF163D235D908DB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 335 cca392-cca3cf 337 cca3d4-cca3dd 335->337 338 cca3d1 335->338 339 cca3df 337->339 340 cca3e2-cca3e8 337->340 338->337 339->340 341 cca3ed-cca404 340->341 342 cca3ea 340->342 344 cca43b-cca440 341->344 345 cca406-cca419 RegQueryValueExW 341->345 342->341 344->345 346 cca41b-cca438 345->346 347 cca442-cca447 345->347 347->346
                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E24,786378CC,00000000,00000000,00000000,00000000), ref: 00CCA40C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1701484414.0000000000CCA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_cca000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: f6c11ba9efd666cff2430003c0ff2289d1bd594ccb14bff21ec5c87c02fbab5e
                                                                                                  • Instruction ID: 19093f53d11d1c1924b71989f5959b7fd1c062250946c28675765463aadffe0a
                                                                                                  • Opcode Fuzzy Hash: f6c11ba9efd666cff2430003c0ff2289d1bd594ccb14bff21ec5c87c02fbab5e
                                                                                                  • Instruction Fuzzy Hash: D9219D75600608AFE720CF16CC88FA6F7ECEF04714F08846AE945CB691D360E949CAB2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 351 cca486-cca4c3 353 cca4c8-cca4d4 351->353 354 cca4c5 351->354 355 cca4d9-cca4f0 353->355 356 cca4d6 353->356 354->353 358 cca527-cca52c 355->358 359 cca4f2-cca505 RegSetValueExW 355->359 356->355 358->359 360 cca52e-cca533 359->360 361 cca507-cca524 359->361 360->361
                                                                                                  APIs
                                                                                                  • RegSetValueExW.KERNELBASE(?,00000E24,786378CC,00000000,00000000,00000000,00000000), ref: 00CCA4F8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1701484414.0000000000CCA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_cca000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value
                                                                                                  • String ID:
                                                                                                  • API String ID: 3702945584-0
                                                                                                  • Opcode ID: df1db4f412e62e55faebc642ab7911ff77ffd899ea9a49c8e74e0585c44696a3
                                                                                                  • Instruction ID: c048973c0b13b0af6e1783eacd972d0d481a1f525c4b0573f727362bde61fa41
                                                                                                  • Opcode Fuzzy Hash: df1db4f412e62e55faebc642ab7911ff77ffd899ea9a49c8e74e0585c44696a3
                                                                                                  • Instruction Fuzzy Hash: BE11D372600604AFE721CE15DC49FA7FBECEF14718F08855AED45CA641D370E948CAB2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 365 cca2d2-cca2d4 366 cca2de-cca328 365->366 367 cca2d6-cca2dd 365->367 369 cca32a-cca33d SetErrorMode 366->369 370 cca353-cca358 366->370 367->366 371 cca33f-cca352 369->371 372 cca35a-cca35f 369->372 370->369 372->371
                                                                                                  APIs
                                                                                                  • SetErrorMode.KERNELBASE(?), ref: 00CCA330
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1701484414.0000000000CCA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_cca000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorMode
                                                                                                  • String ID:
                                                                                                  • API String ID: 2340568224-0
                                                                                                  • Opcode ID: 7e0fd1fc5835307f59e2812e82043e499fc94e8c2dbb98c19160148d37d65a48
                                                                                                  • Instruction ID: a281bd8856cfe367f1eafa1ba8548c6ad2856042f0081af27c46e644efdbd4c5
                                                                                                  • Opcode Fuzzy Hash: 7e0fd1fc5835307f59e2812e82043e499fc94e8c2dbb98c19160148d37d65a48
                                                                                                  • Instruction Fuzzy Hash: 3B212C7150E3C45FD7138B25DC59A62BFB49F47624F0D80DBDD848F1A3C265A808DB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 375 ccac24-ccac6a 377 ccac6c 375->377 378 ccac6f-ccac78 375->378 377->378 379 ccacb9-ccacbe 378->379 380 ccac7a-ccac9a ShellExecuteExW 378->380 379->380 383 ccac9c-ccacb8 380->383 384 ccacc0-ccacc5 380->384 384->383
                                                                                                  APIs
                                                                                                  • ShellExecuteExW.SHELL32(?), ref: 00CCAC80
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1701484414.0000000000CCA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_cca000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExecuteShell
                                                                                                  • String ID:
                                                                                                  • API String ID: 587946157-0
                                                                                                  • Opcode ID: c16fc65f94ef1a9fc83889d9bc57227bc970293ef3542dfc60f7eecfb3d2bebd
                                                                                                  • Instruction ID: 6007ffe9b86c1a3dc73375f5532da89902c76cb43c127b83150599a685e7b4da
                                                                                                  • Opcode Fuzzy Hash: c16fc65f94ef1a9fc83889d9bc57227bc970293ef3542dfc60f7eecfb3d2bebd
                                                                                                  • Instruction Fuzzy Hash: 23119071A093849FD712CB25DC84B52BFF8DF46224F0884EAED85CF652D275E908CB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 386 cca8a4-cca8ed 388 cca8ef 386->388 389 cca8f2-cca8fb 386->389 388->389 390 cca93c-cca941 389->390 391 cca8fd-cca91d SetFileAttributesW 389->391 390->391 394 cca91f-cca93b 391->394 395 cca943-cca948 391->395 395->394
                                                                                                  APIs
                                                                                                  • SetFileAttributesW.KERNELBASE(?,?), ref: 00CCA903
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1701484414.0000000000CCA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_cca000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AttributesFile
                                                                                                  • String ID:
                                                                                                  • API String ID: 3188754299-0
                                                                                                  • Opcode ID: 6ccda62a843bc0b4d61ab8da024914bd625c90ad78f13fae0b1fd1810f461bfe
                                                                                                  • Instruction ID: 94786f57783b2ce8fa34ed6735c9925b4d4cc001f3ac80fc94ce15acc5bc69dc
                                                                                                  • Opcode Fuzzy Hash: 6ccda62a843bc0b4d61ab8da024914bd625c90ad78f13fae0b1fd1810f461bfe
                                                                                                  • Instruction Fuzzy Hash: DF1190716053849FDB11CF25DC85B56BFE8EF46220F0984AEED85CB652D234E948CB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 397 ccaa3e-ccaa65 398 ccaa6a-ccaa70 397->398 399 ccaa67 397->399 400 ccaa75-ccaa7e 398->400 401 ccaa72 398->401 399->398 402 ccaa80-ccaa88 CopyFileW 400->402 403 ccaac1-ccaac6 400->403 401->400 405 ccaa8e-ccaaa0 402->405 403->402 406 ccaac8-ccaacd 405->406 407 ccaaa2-ccaabe 405->407 406->407
                                                                                                  APIs
                                                                                                  • CopyFileW.KERNELBASE(?,?,?), ref: 00CCAA86
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1701484414.0000000000CCA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_cca000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CopyFile
                                                                                                  • String ID:
                                                                                                  • API String ID: 1304948518-0
                                                                                                  • Opcode ID: 387c779904dbf28a6339d6eab918d19f0a34d907ee3d0c1cd6e1f98c98785517
                                                                                                  • Instruction ID: 4c50a464d17c5da0206d316eb0dcde3a81d1c95706ae11fefb384030260743d8
                                                                                                  • Opcode Fuzzy Hash: 387c779904dbf28a6339d6eab918d19f0a34d907ee3d0c1cd6e1f98c98785517
                                                                                                  • Instruction Fuzzy Hash: A611A171A002049FEB50CF26D989B66FBE8EF15724F08846EDD49CB752D235E904DF62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 409 cca8c6-cca8ed 410 cca8ef 409->410 411 cca8f2-cca8fb 409->411 410->411 412 cca93c-cca941 411->412 413 cca8fd-cca905 SetFileAttributesW 411->413 412->413 414 cca90b-cca91d 413->414 416 cca91f-cca93b 414->416 417 cca943-cca948 414->417 417->416
                                                                                                  APIs
                                                                                                  • SetFileAttributesW.KERNELBASE(?,?), ref: 00CCA903
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1701484414.0000000000CCA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_cca000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AttributesFile
                                                                                                  • String ID:
                                                                                                  • API String ID: 3188754299-0
                                                                                                  • Opcode ID: 93ff8a32a9527a1fc6989465c986852db3995413a5c48924167d69a663ad6954
                                                                                                  • Instruction ID: 95735b3580f3d3bbb67570d3c258b41175d5983667ea3f592c73a44276f7724d
                                                                                                  • Opcode Fuzzy Hash: 93ff8a32a9527a1fc6989465c986852db3995413a5c48924167d69a663ad6954
                                                                                                  • Instruction Fuzzy Hash: 03019271A002059FEB10CF25DC89B66FBE8EF15724F0884AEDD45CB742D275D944CA62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ShellExecuteExW.SHELL32(?), ref: 00CCAC80
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1701484414.0000000000CCA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_cca000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExecuteShell
                                                                                                  • String ID:
                                                                                                  • API String ID: 587946157-0
                                                                                                  • Opcode ID: 0ff2edfb1e4ef3e042f087f713d72be54f4561c67da1e22ca8a2e3ca25c63873
                                                                                                  • Instruction ID: 9378421e448e06a39c6b55b2a7c6394df5a4bcb07b0d0097909cddfa34afa45e
                                                                                                  • Opcode Fuzzy Hash: 0ff2edfb1e4ef3e042f087f713d72be54f4561c67da1e22ca8a2e3ca25c63873
                                                                                                  • Instruction Fuzzy Hash: F2018071A042049FDB10CF26D889B66FBE8DF05724F08C4AADD49CF652D376E908CA62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetErrorMode.KERNELBASE(?), ref: 00CCA330
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1701484414.0000000000CCA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_cca000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorMode
                                                                                                  • String ID:
                                                                                                  • API String ID: 2340568224-0
                                                                                                  • Opcode ID: 80b679c323b713ee023664aacdaf578be06b9adb1fa312774bb855c21400e296
                                                                                                  • Instruction ID: 2f24824029beee714238a5737f3afcdf97f6b1c4556f3c34b15a1f8a8c5ebb5c
                                                                                                  • Opcode Fuzzy Hash: 80b679c323b713ee023664aacdaf578be06b9adb1fa312774bb855c21400e296
                                                                                                  • Instruction Fuzzy Hash: 58F081359042489FDB108F05D889B65FBE4EF15724F0CC0AADD494F762D275E508CAA3
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1702101475.0000000004F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_4f80000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3b756ae72ea463062d07e2045fa23cfb847c1de3510b6a3c0c7097a26b9102a4
                                                                                                  • Instruction ID: e631dc7f4ed5a61b1b23cfc8f7d114e3642049369ff47751e26dd023059f9062
                                                                                                  • Opcode Fuzzy Hash: 3b756ae72ea463062d07e2045fa23cfb847c1de3510b6a3c0c7097a26b9102a4
                                                                                                  • Instruction Fuzzy Hash: 38514032235657CBDB04FB34E59598A77B2BFA1308350896AE0448B36FDF349D19DB82
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1702101475.0000000004F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_4f80000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 03945e7731a242fa78178ea85052f5c8600501ff27fd52254e73ed0173ecab75
                                                                                                  • Instruction ID: 3f7a1b02996f1aa983221c9b34403ea120e828a0d3cf089f394a0b38dac5cf95
                                                                                                  • Opcode Fuzzy Hash: 03945e7731a242fa78178ea85052f5c8600501ff27fd52254e73ed0173ecab75
                                                                                                  • Instruction Fuzzy Hash: 2A0104A681E7C09FD74347345CAA5913F71AE631157AB04C7C4C1CA1A3E91D690BD732
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1702101475.0000000004F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F80000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_4f80000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f5ef914b9554f30a11cd4957a3062391ac85d39fa6ee5e8b2c80f03218226a35
                                                                                                  • Instruction ID: d3998413c344d7a48ef319c95ea50a16745a5dd713ce213ca7999edfb7d8c22e
                                                                                                  • Opcode Fuzzy Hash: f5ef914b9554f30a11cd4957a3062391ac85d39fa6ee5e8b2c80f03218226a35
                                                                                                  • Instruction Fuzzy Hash: 171127746143438FCB00AB74D5998A9BBB1EF85308B04895EE486CB35AEB369819DB53
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1701938228.00000000012D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 012D0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_12d0000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 95fe72cf2f6a3ca0e7acced1bee9c3bd2521f022a361fcfbc5f545bf0574f521
                                                                                                  • Instruction ID: 4580dbe755a568629a3bc278f60da43215e05ab88f9cd91b130fea70bb5b880a
                                                                                                  • Opcode Fuzzy Hash: 95fe72cf2f6a3ca0e7acced1bee9c3bd2521f022a361fcfbc5f545bf0574f521
                                                                                                  • Instruction Fuzzy Hash: E701DBB65083906FD7018F05AC408A3FFF8EF86630709C0ABEC498B612D235A905C762
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1701938228.00000000012D0000.00000040.00000020.00020000.00000000.sdmp, Offset: 012D0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_12d0000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5018f4ba6004ea4407710244e10b9970720371a3aac1907a9f225507e3289e9a
                                                                                                  • Instruction ID: e856f788d310c8a67f2ff7a22043ab8e0cf96eee19e8f8966c3c894d8ac0a109
                                                                                                  • Opcode Fuzzy Hash: 5018f4ba6004ea4407710244e10b9970720371a3aac1907a9f225507e3289e9a
                                                                                                  • Instruction Fuzzy Hash: 77E092B6A006005B9750DF0AFC41452F7D8EB84630708C17FDC0D8BB01D235F508CAA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1701465684.0000000000CC2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CC2000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_cc2000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5a47c620f05885c26e7d7dc1adccb03da28ea13ad0ecac0841aa92a5dbb283c6
                                                                                                  • Instruction ID: c03a6ea7cb7f8631c706b2d5fe572f1e97708942bd37ee04f6ad1ce541e74963
                                                                                                  • Opcode Fuzzy Hash: 5a47c620f05885c26e7d7dc1adccb03da28ea13ad0ecac0841aa92a5dbb283c6
                                                                                                  • Instruction Fuzzy Hash: 09D05E7A2056C14FD31ADA1CC1A4F9537E8AB61714F4A44FDE800CB763C768DA81E600
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1701465684.0000000000CC2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CC2000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_cc2000_1.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 186fa849ae1721b4b4bd64c3d58ec93e310cf6d56329a4ef20994b7d4c86b0d6
                                                                                                  • Instruction ID: 76e4129d01d2a6d1be29bc03d754df1f85fcdd68969f59a378a689e3e604dfff
                                                                                                  • Opcode Fuzzy Hash: 186fa849ae1721b4b4bd64c3d58ec93e310cf6d56329a4ef20994b7d4c86b0d6
                                                                                                  • Instruction Fuzzy Hash: A3D05E343002C14BC715DA0CC6D4F5937D8AB50B14F1A44ECAC208B772C7A8D9C1CA00
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:24.7%
                                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                                  Signature Coverage:10.6%
                                                                                                  Total number of Nodes:188
                                                                                                  Total number of Limit Nodes:7
                                                                                                  execution_graph 4646 342a646 4649 342a67e CreateMutexW 4646->4649 4648 342a6c1 4649->4648 4956 61c1998 4958 61c19ba getaddrinfo 4956->4958 4959 61c1a67 4958->4959 4666 342b1ca 4667 342b1f6 FindClose 4666->4667 4668 342b228 4666->4668 4669 342b20b 4667->4669 4668->4667 4670 342a74e 4671 342a77a FindCloseChangeNotification 4670->4671 4672 342a7b9 4670->4672 4673 342a788 4671->4673 4672->4671 4880 61c1890 4881 61c18ae GetProcessTimes 4880->4881 4883 61c1935 4881->4883 4964 342a2d2 4965 342a2d6 SetErrorMode 4964->4965 4967 342a33f 4965->4967 4968 61c218e 4969 61c21c4 FormatMessageW 4968->4969 4971 61c224e 4969->4971 4686 342add6 4688 342adff CopyFileW 4686->4688 4689 342ae26 4688->4689 4729 342ac5a 4732 342ac83 SetFileAttributesW 4729->4732 4731 342ac9f 4732->4731 4884 61c1284 4885 61c12aa ConvertStringSecurityDescriptorToSecurityDescriptorW 4884->4885 4887 61c1323 4885->4887 4888 342bdd8 4890 342bde5 GetExitCodeProcess 4888->4890 4891 342be74 4890->4891 4972 61c0187 4973 61c0199 NtQuerySystemInformation 4972->4973 4975 61c020c 4973->4975 4840 61c023c 4841 61c026a DuplicateHandle 4840->4841 4843 61c02b6 4841->4843 4922 342a462 4924 342a486 RegSetValueExW 4922->4924 4925 342a507 4924->4925 4844 342a361 4846 342a392 RegQueryValueExW 4844->4846 4847 342a41b 4846->4847 4892 61c20bf 4894 61c20e2 SetProcessWorkingSetSize 4892->4894 4895 61c2143 4894->4895 4896 61c00b8 4898 61c00d8 K32EnumProcesses 4896->4898 4899 61c0146 4898->4899 4848 61c143a 4849 61c145a MapViewOfFile 4848->4849 4851 61c14e1 4849->4851 4900 342a9e4 4901 342aa06 WaitForInputIdle 4900->4901 4903 342aa43 4901->4903 4852 342bb6b 4854 342bb75 AdjustTokenPrivileges 4852->4854 4855 342bbf3 4854->4855 4926 5d214ff 4927 5d21510 4926->4927 4928 5d219b7 2 API calls 4927->4928 4929 5d219ca 2 API calls 4927->4929 4930 5d21999 2 API calls 4927->4930 4931 5d21929 2 API calls 4927->4931 4928->4927 4929->4927 4930->4927 4931->4927 4904 342b9f3 4906 342ba22 LookupPrivilegeValueW 4904->4906 4907 342ba72 4906->4907 4787 5d218e0 4788 5d2152a 4787->4788 4793 5d219b7 4788->4793 4799 5d21929 4788->4799 4805 5d21999 4788->4805 4811 5d219ca 4788->4811 4794 5d219be 4793->4794 4795 5d20310 2 API calls 4794->4795 4796 5d21a85 4795->4796 4797 5d20310 2 API calls 4796->4797 4798 5d21aee 4797->4798 4800 5d21963 4799->4800 4801 5d20310 2 API calls 4800->4801 4802 5d21a85 4801->4802 4803 5d20310 2 API calls 4802->4803 4804 5d21aee 4803->4804 4806 5d219a0 4805->4806 4807 5d20310 2 API calls 4806->4807 4808 5d21a85 4807->4808 4809 5d20310 2 API calls 4808->4809 4810 5d21aee 4809->4810 4810->4810 4812 5d219d1 4811->4812 4813 5d20310 2 API calls 4812->4813 4814 5d21a85 4813->4814 4815 5d20310 2 API calls 4814->4815 4816 5d21aee 4815->4816 4976 61c1fa8 4978 61c1fd7 GetProcessWorkingSetSize 4976->4978 4979 61c205f 4978->4979 4856 342af74 4857 342afb6 GetFileType 4856->4857 4859 342b018 4857->4859 4932 342ae79 4934 342ae9e CreateFileW 4932->4934 4935 342af25 4934->4935 4829 342a2fe 4830 342a353 4829->4830 4831 342a32a SetErrorMode 4829->4831 4830->4831 4832 342a33f 4831->4832 4860 61c0e5e 4862 61c0e7e WSASocketW 4860->4862 4863 61c0ef2 4862->4863 4650 342aa06 4651 342aa35 WaitForInputIdle 4650->4651 4652 342aa6b 4650->4652 4653 342aa43 4651->4653 4652->4651 4864 342b304 4865 342b30a ReadFile 4864->4865 4867 342b391 4865->4867 4936 342a612 4937 342a646 CreateMutexW 4936->4937 4939 342a6c1 4937->4939 4868 342a710 4869 342a74e FindCloseChangeNotification 4868->4869 4871 342a788 4869->4871 4694 5d20007 4697 5d20076 4694->4697 4700 5d20310 4694->4700 4704 5d203bd 4694->4704 4708 5d20509 4694->4708 4712 5d20301 4694->4712 4702 5d20322 4700->4702 4701 5d20348 4701->4697 4702->4701 4716 5d21ecf 4702->4716 4706 5d203c4 4704->4706 4705 5d205bf 4705->4697 4706->4705 4707 5d21ecf 2 API calls 4706->4707 4707->4705 4709 5d20510 4708->4709 4710 5d205bf 4709->4710 4711 5d21ecf 2 API calls 4709->4711 4710->4697 4711->4710 4713 5d20310 4712->4713 4714 5d20348 4713->4714 4715 5d21ecf 2 API calls 4713->4715 4714->4697 4715->4714 4718 5d21ed5 4716->4718 4717 5d223a9 4717->4701 4718->4717 4721 342bed0 4718->4721 4725 342bef2 4718->4725 4722 342bef2 NtSetInformationProcess 4721->4722 4724 342bf3c 4722->4724 4724->4717 4726 342bf27 NtSetInformationProcess 4725->4726 4727 342bf52 4725->4727 4728 342bf3c 4726->4728 4727->4726 4728->4717 4940 342ac19 4941 342ac5a SetFileAttributesW 4940->4941 4943 342ac9f 4941->4943 4733 342ae9e 4735 342aed6 CreateFileW 4733->4735 4736 342af25 4735->4736 4872 342ab1e 4874 342ab52 RegOpenKeyExW 4872->4874 4875 342abe0 4874->4875 4737 61c01c2 4738 61c01f7 NtQuerySystemInformation 4737->4738 4739 61c0222 4737->4739 4740 61c020c 4738->4740 4739->4738 4741 342bba2 4743 342bbd1 AdjustTokenPrivileges 4741->4743 4744 342bbf3 4743->4744 4876 342a120 4877 342a172 EnumWindows 4876->4877 4879 342a1ca 4877->4879 4769 342b32a 4771 342b35f ReadFile 4769->4771 4772 342b391 4771->4772 4914 342b1a8 4917 342b1ca FindClose 4914->4917 4916 342b20b 4917->4916 4821 61c026a 4822 61c02a8 DuplicateHandle 4821->4822 4823 61c02e0 4821->4823 4824 61c02b6 4822->4824 4823->4822 4918 342adb4 4921 342add6 CopyFileW 4918->4921 4920 342ae26 4921->4920 4944 61c1b6a 4946 61c1b9a WSAConnect 4944->4946 4947 61c1bee 4946->4947
                                                                                                  APIs
                                                                                                  • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 0342BBEB
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AdjustPrivilegesToken
                                                                                                  • String ID:
                                                                                                  • API String ID: 2874748243-0
                                                                                                  • Opcode ID: d40c89efe91de0db51ed0bf8ce3bedc68a6bed9d8bafdfc614ed2968e8223117
                                                                                                  • Instruction ID: 19ec3d0d124b42c1077855e6aa9a95a3ea68953fe8b2a8ea450114a3b4f130f0
                                                                                                  • Opcode Fuzzy Hash: d40c89efe91de0db51ed0bf8ce3bedc68a6bed9d8bafdfc614ed2968e8223117
                                                                                                  • Instruction Fuzzy Hash: 88219F755097809FDB22CF25DC44B62BFF8EF06210F0884DBE9858F663D2759918DB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • NtQuerySystemInformation.NTDLL ref: 061C01FD
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InformationQuerySystem
                                                                                                  • String ID:
                                                                                                  • API String ID: 3562636166-0
                                                                                                  • Opcode ID: 552de67f0b6860e77e8c746559fdf1a2cccb4222acf87a49b3de9e5a38cb4278
                                                                                                  • Instruction ID: cfbe65a02559d7ab19888b5b912af0db0d469426557eeb9f3397ce55513e8b2f
                                                                                                  • Opcode Fuzzy Hash: 552de67f0b6860e77e8c746559fdf1a2cccb4222acf87a49b3de9e5a38cb4278
                                                                                                  • Instruction Fuzzy Hash: 0F21AE754097C0AFDB238B21DC55A52FFB0EF17224F0984DBE9844B1A3D265A90DDB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 0342BBEB
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AdjustPrivilegesToken
                                                                                                  • String ID:
                                                                                                  • API String ID: 2874748243-0
                                                                                                  • Opcode ID: 062401eda9407defd3e0cd07fc94bed3964b2222e2b57ebd9dd0bad86389b551
                                                                                                  • Instruction ID: 05155c383761368de348fb0b6ea8aa40c0aded177b1d15431126b18b5d026248
                                                                                                  • Opcode Fuzzy Hash: 062401eda9407defd3e0cd07fc94bed3964b2222e2b57ebd9dd0bad86389b551
                                                                                                  • Instruction Fuzzy Hash: E0119E716006009FDB20CF16D884B62FFE8EF08220F0888AAED458F652D735E418DB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • NtSetInformationProcess.NTDLL ref: 0342BF2D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InformationProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 1801817001-0
                                                                                                  • Opcode ID: fcce1bb8a59a95bf63ffb7de4d238ad80757138637708961afbddb0bee88abfb
                                                                                                  • Instruction ID: 4cf3571422d91ab5d649d00e8c8a7764aa9aefa98c06438d3ea7aa20bae00f31
                                                                                                  • Opcode Fuzzy Hash: fcce1bb8a59a95bf63ffb7de4d238ad80757138637708961afbddb0bee88abfb
                                                                                                  • Instruction Fuzzy Hash: C611A3714097809FCB228F11DC45B52FFF4EF46210F09C49AED844B662C275A818DB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • NtQuerySystemInformation.NTDLL ref: 061C01FD
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InformationQuerySystem
                                                                                                  • String ID:
                                                                                                  • API String ID: 3562636166-0
                                                                                                  • Opcode ID: 21efb05e70cfab981531a712d5e0492231212da33c087391721d79a0cf3ee62c
                                                                                                  • Instruction ID: 4197db73d7cc0672cf9200e6a0c34ed3d167d3f37223466dca8528931d3deed5
                                                                                                  • Opcode Fuzzy Hash: 21efb05e70cfab981531a712d5e0492231212da33c087391721d79a0cf3ee62c
                                                                                                  • Instruction Fuzzy Hash: 43018B75900600DFEB608F55E885B66FBE0EF29625F08C49EDE490B752C376E418DFA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • NtSetInformationProcess.NTDLL ref: 0342BF2D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InformationProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 1801817001-0
                                                                                                  • Opcode ID: 725721ad1bf34509fee34a36343a5cc8e69850a7cb6281c509f96da8ea37d57d
                                                                                                  • Instruction ID: 714b8ae02ea768b86f53dca18039a8cadd878c6208492ae05b3d25a99ee9824b
                                                                                                  • Opcode Fuzzy Hash: 725721ad1bf34509fee34a36343a5cc8e69850a7cb6281c509f96da8ea37d57d
                                                                                                  • Instruction Fuzzy Hash: 370178359006409FDB20CF45D885B62FFE4EF19620F08C49ADE898A752C375E418DF66
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 0 5d20310-5d20334 2 5d20336-5d20338 0->2 3 5d2033e-5d20346 0->3 2->3 4 5d20348-5d2034d 3->4 5 5d2034e-5d20391 3->5 8 5d20393-5d203ce 5->8 9 5d203d8-5d20418 5->9 8->9 16 5d2041a 9->16 17 5d2041f 9->17 16->17 53 5d2041f call 5d20c22 17->53 54 5d2041f call 5d20b03 17->54 55 5d2041f call 5d20d40 17->55 56 5d2041f call 5d20f05 17->56 57 5d2041f call 5d20e55 17->57 58 5d2041f call 3601048 17->58 59 5d2041f call 5d20d98 17->59 60 5d2041f call 5d20ba8 17->60 61 5d2041f call 5d20958 17->61 62 5d2041f call 360106e 17->62 63 5d2041f call 5d20c8d 17->63 18 5d20425-5d20434 19 5d20436-5d20460 18->19 20 5d2046b-5d204b5 18->20 19->20 66 5d204b7 call 3601048 20->66 67 5d204b7 call 360106e 20->67 31 5d204bd-5d20523 39 5d20570-5d20587 31->39 40 5d20525-5d20531 31->40 41 5d20880 39->41 42 5d2058d-5d205b4 39->42 64 5d20533 call 3601048 40->64 65 5d20533 call 360106e 40->65 68 5d205b9 call 3601048 42->68 69 5d205b9 call 5d21ecf 42->69 70 5d205b9 call 360106e 42->70 45 5d20539-5d20569 45->39 50 5d205bf 50->41 53->18 54->18 55->18 56->18 57->18 58->18 59->18 60->18 61->18 62->18 63->18 64->45 65->45 66->31 67->31 68->50 69->50 70->50
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: [Xi^$-[Xi^$2l$2l$2l$=[Xi^
                                                                                                  • API String ID: 0-1715069125
                                                                                                  • Opcode ID: b25dc769c62bb4803285a1648e0b4513513331fd8cd745a3b9ca12562e3fdd1a
                                                                                                  • Instruction ID: 36d407bb02419c30768668b0e01f19225e81a19521ea4971ad3e22c0b670ac33
                                                                                                  • Opcode Fuzzy Hash: b25dc769c62bb4803285a1648e0b4513513331fd8cd745a3b9ca12562e3fdd1a
                                                                                                  • Instruction Fuzzy Hash: 09510F34B042258FC708EB3994586BE76E3ABD9208B44456BE406EF394DF39CC4687B6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 71 5d203bd-5d20418 79 5d2041a 71->79 80 5d2041f 71->80 79->80 123 5d2041f call 5d20c22 80->123 124 5d2041f call 5d20b03 80->124 125 5d2041f call 5d20d40 80->125 126 5d2041f call 5d20f05 80->126 127 5d2041f call 5d20e55 80->127 128 5d2041f call 3601048 80->128 129 5d2041f call 5d20d98 80->129 130 5d2041f call 5d20ba8 80->130 131 5d2041f call 5d20958 80->131 132 5d2041f call 360106e 80->132 133 5d2041f call 5d20c8d 80->133 81 5d20425-5d20434 82 5d20436-5d20460 81->82 83 5d2046b-5d204b5 81->83 82->83 118 5d204b7 call 3601048 83->118 119 5d204b7 call 360106e 83->119 94 5d204bd-5d20523 102 5d20570-5d20587 94->102 103 5d20525-5d20531 94->103 104 5d20880 102->104 105 5d2058d-5d205b4 102->105 116 5d20533 call 3601048 103->116 117 5d20533 call 360106e 103->117 120 5d205b9 call 3601048 105->120 121 5d205b9 call 5d21ecf 105->121 122 5d205b9 call 360106e 105->122 108 5d20539-5d20569 108->102 113 5d205bf 113->104 116->108 117->108 118->94 119->94 120->113 121->113 122->113 123->81 124->81 125->81 126->81 127->81 128->81 129->81 130->81 131->81 132->81 133->81
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: [Xi^$-[Xi^$2l$2l$2l$=[Xi^
                                                                                                  • API String ID: 0-1715069125
                                                                                                  • Opcode ID: a7426e457ceed596ca87bbc36f964600f2969019c58661e25e88cb2da8264f49
                                                                                                  • Instruction ID: 034fec02137f81f5151088c0fd4a8a4506807735525f0cf10481548f19c96557
                                                                                                  • Opcode Fuzzy Hash: a7426e457ceed596ca87bbc36f964600f2969019c58661e25e88cb2da8264f49
                                                                                                  • Instruction Fuzzy Hash: 2741DF34B001258BC748EB7980586BE36D3AFD9208744456AD406EF7A4DF68CC0697BB
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 134 5d21929-5d21980 137 5d21982-5d21997 134->137 138 5d219aa-5d21adc call 5d20310 134->138 137->138 162 5d21ae3-5d21b45 call 5d20310 call 5d213b8 138->162 174 5d21b47-5d21b68 162->174 175 5d21b6a-5d21ba7 call 5d213b8 162->175 181 5d21baa-5d21c82 174->181 175->181 198 5d21c84-5d21c89 181->198 199 5d21c8b 181->199 200 5d21c90-5d21cb8 198->200 199->200 203 5d21cc1 200->203 204 5d21cba-5d21cbf 200->204 205 5d21cc6-5d21cee 203->205 204->205 208 5d21cf0-5d21cf5 205->208 209 5d21cf7 205->209 210 5d21cfc-5d21d24 208->210 209->210 213 5d21d26-5d21d2b 210->213 214 5d21d2d 210->214 215 5d21d32-5d21d5a 213->215 214->215 218 5d21d63 215->218 219 5d21d5c-5d21d61 215->219 220 5d21d68-5d21d90 218->220 219->220 223 5d21d92-5d21d97 220->223 224 5d21d99 220->224 225 5d21d9e-5d21dc6 223->225 224->225 228 5d21dc8-5d21dcd 225->228 229 5d21dcf 225->229 230 5d21dd4-5d21dfc 228->230 229->230 233 5d21e05 230->233 234 5d21dfe-5d21e03 230->234 235 5d21e0a-5d21e92 233->235 234->235 244 5d21e93 235->244 244->244
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: :@k$:@k$\Ol
                                                                                                  • API String ID: 0-3451677246
                                                                                                  • Opcode ID: ecfb15d00ac9121068842a6bd72fafed200bc42bcd22f202272fdac1b088cdf5
                                                                                                  • Instruction ID: 5a3baaca69094eb2e9bf4b7d5069e8d3b1c07a9bea8ee79831e9331a4ef1f565
                                                                                                  • Opcode Fuzzy Hash: ecfb15d00ac9121068842a6bd72fafed200bc42bcd22f202272fdac1b088cdf5
                                                                                                  • Instruction Fuzzy Hash: 9CC15B38B041508BDB089B79E9557BA37E7FBE8248F10802BD4469B794CB39CC46DB72
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 245 5d21999-5d21adc call 5d20310 271 5d21ae3-5d21b45 call 5d20310 call 5d213b8 245->271 283 5d21b47-5d21b68 271->283 284 5d21b6a-5d21ba7 call 5d213b8 271->284 290 5d21baa-5d21c82 283->290 284->290 307 5d21c84-5d21c89 290->307 308 5d21c8b 290->308 309 5d21c90-5d21cb8 307->309 308->309 312 5d21cc1 309->312 313 5d21cba-5d21cbf 309->313 314 5d21cc6-5d21cee 312->314 313->314 317 5d21cf0-5d21cf5 314->317 318 5d21cf7 314->318 319 5d21cfc-5d21d24 317->319 318->319 322 5d21d26-5d21d2b 319->322 323 5d21d2d 319->323 324 5d21d32-5d21d5a 322->324 323->324 327 5d21d63 324->327 328 5d21d5c-5d21d61 324->328 329 5d21d68-5d21d90 327->329 328->329 332 5d21d92-5d21d97 329->332 333 5d21d99 329->333 334 5d21d9e-5d21dc6 332->334 333->334 337 5d21dc8-5d21dcd 334->337 338 5d21dcf 334->338 339 5d21dd4-5d21dfc 337->339 338->339 342 5d21e05 339->342 343 5d21dfe-5d21e03 339->343 344 5d21e0a-5d21e92 342->344 343->344 353 5d21e93 344->353 353->353
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: :@k$:@k$\Ol
                                                                                                  • API String ID: 0-3451677246
                                                                                                  • Opcode ID: ba2fe54209289c37a69a0f229b818782bf8be41a8dad422c5aa039782393509d
                                                                                                  • Instruction ID: f3ef4e039cb2643f0abd26b87ad0f0e5a82693c33d0ee32a55606217e48cd3d3
                                                                                                  • Opcode Fuzzy Hash: ba2fe54209289c37a69a0f229b818782bf8be41a8dad422c5aa039782393509d
                                                                                                  • Instruction Fuzzy Hash: D5A15D387041608BDB18AB79D8157BA36E7FBE824CF20802B94469B794CF78CC46D772
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 354 5d219b7-5d21adc call 5d20310 379 5d21ae3-5d21b45 call 5d20310 call 5d213b8 354->379 391 5d21b47-5d21b68 379->391 392 5d21b6a-5d21ba7 call 5d213b8 379->392 398 5d21baa-5d21c82 391->398 392->398 415 5d21c84-5d21c89 398->415 416 5d21c8b 398->416 417 5d21c90-5d21cb8 415->417 416->417 420 5d21cc1 417->420 421 5d21cba-5d21cbf 417->421 422 5d21cc6-5d21cee 420->422 421->422 425 5d21cf0-5d21cf5 422->425 426 5d21cf7 422->426 427 5d21cfc-5d21d24 425->427 426->427 430 5d21d26-5d21d2b 427->430 431 5d21d2d 427->431 432 5d21d32-5d21d5a 430->432 431->432 435 5d21d63 432->435 436 5d21d5c-5d21d61 432->436 437 5d21d68-5d21d90 435->437 436->437 440 5d21d92-5d21d97 437->440 441 5d21d99 437->441 442 5d21d9e-5d21dc6 440->442 441->442 445 5d21dc8-5d21dcd 442->445 446 5d21dcf 442->446 447 5d21dd4-5d21dfc 445->447 446->447 450 5d21e05 447->450 451 5d21dfe-5d21e03 447->451 452 5d21e0a-5d21e92 450->452 451->452 461 5d21e93 452->461 461->461
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: :@k$:@k$\Ol
                                                                                                  • API String ID: 0-3451677246
                                                                                                  • Opcode ID: d2b4c4b16e5938fdf4400398366ac81c9fa91533e3334a26898a60847c6eb3f5
                                                                                                  • Instruction ID: f769b3a3bf789e2f5dad378382c707374987caeebc026db68750a5f0c7137446
                                                                                                  • Opcode Fuzzy Hash: d2b4c4b16e5938fdf4400398366ac81c9fa91533e3334a26898a60847c6eb3f5
                                                                                                  • Instruction Fuzzy Hash: 39A15E787041608BDB19AB79D8157BA36E7FBE824CF20802B94469B794CF78CC46D772
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 462 5d219ca-5d21adc call 5d20310 486 5d21ae3-5d21b45 call 5d20310 call 5d213b8 462->486 498 5d21b47-5d21b68 486->498 499 5d21b6a-5d21ba7 call 5d213b8 486->499 505 5d21baa-5d21c82 498->505 499->505 522 5d21c84-5d21c89 505->522 523 5d21c8b 505->523 524 5d21c90-5d21cb8 522->524 523->524 527 5d21cc1 524->527 528 5d21cba-5d21cbf 524->528 529 5d21cc6-5d21cee 527->529 528->529 532 5d21cf0-5d21cf5 529->532 533 5d21cf7 529->533 534 5d21cfc-5d21d24 532->534 533->534 537 5d21d26-5d21d2b 534->537 538 5d21d2d 534->538 539 5d21d32-5d21d5a 537->539 538->539 542 5d21d63 539->542 543 5d21d5c-5d21d61 539->543 544 5d21d68-5d21d90 542->544 543->544 547 5d21d92-5d21d97 544->547 548 5d21d99 544->548 549 5d21d9e-5d21dc6 547->549 548->549 552 5d21dc8-5d21dcd 549->552 553 5d21dcf 549->553 554 5d21dd4-5d21dfc 552->554 553->554 557 5d21e05 554->557 558 5d21dfe-5d21e03 554->558 559 5d21e0a-5d21e92 557->559 558->559 568 5d21e93 559->568 568->568
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: :@k$:@k$\Ol
                                                                                                  • API String ID: 0-3451677246
                                                                                                  • Opcode ID: 00c8ebcea21ad3602a2c3da521453ade1cc9350032644de0b5c288fe5673f4a0
                                                                                                  • Instruction ID: 0b0d4c506752b695184e3ddd3fe74d846a4d34ea69b4db7f007c79c8efcfd5f4
                                                                                                  • Opcode Fuzzy Hash: 00c8ebcea21ad3602a2c3da521453ade1cc9350032644de0b5c288fe5673f4a0
                                                                                                  • Instruction Fuzzy Hash: 37A15F787041508BDB19AB79D8157BA36E7FBE824CF20802B94469B794CF78CC46D772
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 569 5d20958-5d20993 571 5d20999-5d20a22 569->571 572 5d20a2e-5d20a30 569->572 724 5d20a24 call 3601048 571->724 725 5d20a24 call 360106e 571->725 573 5d20a37-5d20a3c 572->573 574 5d20a42-5d20a7a 573->574 575 5d20b1e-5d20bc2 573->575 592 5d20aa1-5d20b01 574->592 593 5d20a7c-5d20a9a 574->593 612 5d20bc8-5d20c50 575->612 613 5d20c9e-5d20ca7 575->613 592->575 593->592 650 5d20c57-5d20c8b 612->650 617 5d20d51-5d20d5a 613->617 618 5d20cad-5d20d2c 613->618 614 5d20a2a-5d20a2c 614->572 616 5d20a32 614->616 616->573 620 5d20d7a-5d20d83 617->620 621 5d20d5c-5d20d73 617->621 663 5d20d33-5d20d3e 618->663 623 5d20d85-5d20d8c 620->623 624 5d20da9-5d20db2 620->624 621->620 635 5d20d96 623->635 628 5d20f33-5d20f3a 624->628 629 5d20db8-5d20dd6 624->629 722 5d20dd8 call 3601048 629->722 723 5d20dd8 call 360106e 629->723 634 5d20dde-5d20e06 648 5d20f1c-5d20f2d 634->648 635->624 648->628 651 5d20e0b-5d20e14 648->651 650->613 653 5d20f40-5d20fd1 651->653 654 5d20e1a-5d20efb 651->654 685 5d20fd7-5d20fe8 653->685 686 5d210ca 653->686 699 5d20f03-5d20f1a 654->699 663->617 693 5d20fea-5d2100b 685->693 688 5d210cc-5d210d3 686->688 700 5d21012-5d21048 693->700 701 5d2100d 693->701 699->648 703 5d20f3b 699->703 709 5d2104a 700->709 710 5d2104f-5d21077 700->710 701->700 703->653 709->710 714 5d21079-5d2107b 710->714 715 5d2107d-5d210a1 710->715 714->688 718 5d210a3-5d210a8 715->718 719 5d210aa-5d210b4 715->719 718->688 720 5d210b6-5d210b8 719->720 721 5d210ba-5d210c4 719->721 720->688 721->686 721->693 722->634 723->634 724->614 725->614
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: :@k$\Ol
                                                                                                  • API String ID: 0-2913639173
                                                                                                  • Opcode ID: 83a55e445c26fa08f88562b0e00fa7facac12e4917cea2655025161ccfd8148e
                                                                                                  • Instruction ID: 289df15f3bea1fdbd82289eac15f0ee576fb794f61cfbeac88583e89234a7aa7
                                                                                                  • Opcode Fuzzy Hash: 83a55e445c26fa08f88562b0e00fa7facac12e4917cea2655025161ccfd8148e
                                                                                                  • Instruction Fuzzy Hash: 3E025D34B002159FDB18EB78D455AAE77E2FFC8208B14846AD406DB7A4DF399C86CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 726 5d20509-5d20523 730 5d20570-5d20587 726->730 731 5d20525-5d20531 726->731 732 5d20880 730->732 733 5d2058d-5d205b4 730->733 744 5d20533 call 3601048 731->744 745 5d20533 call 360106e 731->745 746 5d205b9 call 3601048 733->746 747 5d205b9 call 5d21ecf 733->747 748 5d205b9 call 360106e 733->748 736 5d20539-5d20569 736->730 741 5d205bf 741->732 744->736 745->736 746->741 747->741 748->741
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: [Xi^$2l
                                                                                                  • API String ID: 0-3711275875
                                                                                                  • Opcode ID: 29b36829241237b9efc9e8a8b3e4d791e850638e3369e325845498b1ed50f924
                                                                                                  • Instruction ID: 5b05a272e79c1b8e9003ef796a5bc2cc302b38797a1da2504f58e365925fbe9f
                                                                                                  • Opcode Fuzzy Hash: 29b36829241237b9efc9e8a8b3e4d791e850638e3369e325845498b1ed50f924
                                                                                                  • Instruction Fuzzy Hash: 8101FC24B041218B8B89FB7A046837E29D35FDA108308442FD00AFF795DF28CC0197EB
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 749 5d21ecf-5d21eda 751 5d21edc-5d21ee6 749->751 861 5d21ee6 call 342b236 751->861 862 5d21ee6 call 342b28e 751->862 753 5d21eeb-5d21ef7 754 5d22346 753->754 755 5d21efd-5d21f05 753->755 754->751 859 5d21f07 call 3601048 755->859 860 5d21f07 call 360106e 755->860 756 5d21f0c-5d21f18 756->754 757 5d21f1e-5d21f31 756->757 759 5d21f33-5d21f39 757->759 760 5d21f3b-5d21f4a 757->760 761 5d21f9c-5d21fca 759->761 764 5d21f50-5d21f5a 760->764 765 5d2234b 760->765 779 5d21fd1-5d2201f 761->779 780 5d21fcc 761->780 766 5d21f60 764->766 767 5d21f5c-5d21f5e 764->767 768 5d22350-5d2239f 765->768 770 5d21f63-5d21f89 766->770 767->770 863 5d223a4 call 342bef2 768->863 864 5d223a4 call 342bed0 768->864 865 5d223a4 call 3601048 768->865 866 5d223a4 call 360106e 768->866 777 5d21f93-5d21f9a 770->777 778 5d21f8b-5d21f91 770->778 777->761 778->761 791 5d22021 779->791 792 5d22026-5d22077 779->792 780->779 784 5d223a9-5d223c3 791->792 799 5d22079 792->799 800 5d2207e-5d220c4 792->800 799->800 806 5d220c6 800->806 807 5d220cb-5d220d6 800->807 806->807 809 5d220dd-5d220fb 807->809 809->754 811 5d22101-5d22131 809->811 815 5d222c0-5d222ce 811->815 816 5d22136-5d2213c 815->816 817 5d222d4-5d222f6 815->817 816->768 819 5d22142-5d22171 816->819 817->754 818 5d222f8-5d222fc 817->818 820 5d22303-5d2230a 818->820 821 5d222fe 818->821 819->765 828 5d22177-5d221a0 819->828 820->768 822 5d2230c-5d2231a 820->822 821->820 826 5d22321-5d22328 822->826 827 5d2231c 822->827 826->768 829 5d2232a-5d2233c 826->829 827->826 833 5d221a2 828->833 834 5d221a7-5d221d2 828->834 829->754 833->834 838 5d221d4-5d221dd 834->838 839 5d2220a-5d22225 834->839 840 5d221eb-5d221fa 838->840 841 5d221df-5d221e3 838->841 845 5d22227 839->845 846 5d2222c-5d22273 839->846 840->768 842 5d22200-5d22207 840->842 841->840 842->839 845->846 852 5d22275 846->852 853 5d2227a-5d222ab 846->853 852->853 857 5d222b7-5d222ba 853->857 858 5d222ad-5d222b1 853->858 857->765 857->815 858->765 858->857 859->756 860->756 861->753 862->753 863->784 864->784 865->784 866->784
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: L.l
                                                                                                  • API String ID: 0-1469302089
                                                                                                  • Opcode ID: 83543457c3ad8a6055dacb6b4c5040415db8d86f946d793a56fa1fe1ed54be69
                                                                                                  • Instruction ID: cd4cdfb3d0d21f70a3c6760b869f914153ba9908d7c67b7854d90a62dcedfacf
                                                                                                  • Opcode Fuzzy Hash: 83543457c3ad8a6055dacb6b4c5040415db8d86f946d793a56fa1fe1ed54be69
                                                                                                  • Instruction Fuzzy Hash: 14D19D34B012118FDB18EB75C580BAE77E2AF98308F14847AE556DB790EB38DC46CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 867 61c0d6b-61c0d8b 868 61c0dad-61c0ddf 867->868 869 61c0d8d-61c0dac 867->869 873 61c0de2-61c0e3a RegQueryValueExW 868->873 869->868 875 61c0e40-61c0e56 873->875
                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 061C0E32
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: 53815cc674150af30dfa5ff3a8f047de5194b60f3844bb5dabbe4576eb68c7f2
                                                                                                  • Instruction ID: 0ea5ab9e08fb9df64d5bfa6db797262e2b1fe19bdffb29f2d62f13a4ed12b11b
                                                                                                  • Opcode Fuzzy Hash: 53815cc674150af30dfa5ff3a8f047de5194b60f3844bb5dabbe4576eb68c7f2
                                                                                                  • Instruction Fuzzy Hash: 09316D6550E3C0AFD3138B358C61A61BFB4EF47610B0E45CBE8C48F6A3D2296909D7B2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 876 61c1fa8-61c204f 881 61c209c-61c20a1 876->881 882 61c2051-61c2059 GetProcessWorkingSetSize 876->882 881->882 884 61c205f-61c2071 882->884 885 61c20a3-61c20a8 884->885 886 61c2073-61c2099 884->886 885->886
                                                                                                  APIs
                                                                                                  • GetProcessWorkingSetSize.KERNEL32(?,00000E24,A3B420CB,00000000,00000000,00000000,00000000), ref: 061C2057
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ProcessSizeWorking
                                                                                                  • String ID:
                                                                                                  • API String ID: 3584180929-0
                                                                                                  • Opcode ID: 3196d52242bd0edc9e001870a9edd88d6fd159f0b629773f157149eec2dbc05f
                                                                                                  • Instruction ID: 360517cea6f9778c780efb1436bc14c7363d2ef486b4889f6506c2c7036112d4
                                                                                                  • Opcode Fuzzy Hash: 3196d52242bd0edc9e001870a9edd88d6fd159f0b629773f157149eec2dbc05f
                                                                                                  • Instruction Fuzzy Hash: FE317A715093C05FE7138B658C65B96BFB8DF47210F0984DBE984CF1A3D6249909C772
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 889 61c1998-61c1a57 895 61c1aa9-61c1aae 889->895 896 61c1a59-61c1a61 getaddrinfo 889->896 895->896 898 61c1a67-61c1a79 896->898 899 61c1a7b-61c1aa6 898->899 900 61c1ab0-61c1ab5 898->900 900->899
                                                                                                  APIs
                                                                                                  • getaddrinfo.WS2_32(?,00000E24), ref: 061C1A5F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: getaddrinfo
                                                                                                  • String ID:
                                                                                                  • API String ID: 300660673-0
                                                                                                  • Opcode ID: 3646e943edf989581ab39a92bc737804db2cc70f9ab0775b9aa75468b1b7b6f5
                                                                                                  • Instruction ID: 895178e003117cc8f2f7ae104b43e10564584506c90ef67e121977ea48f190ce
                                                                                                  • Opcode Fuzzy Hash: 3646e943edf989581ab39a92bc737804db2cc70f9ab0775b9aa75468b1b7b6f5
                                                                                                  • Instruction Fuzzy Hash: ED31D1B1500340AFE721CB51CD85FA6FBACEB44310F04489AFA489B292D374A94CCB75
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 919 61c1890-61c1925 924 61c1927-61c192f GetProcessTimes 919->924 925 61c1972-61c1977 919->925 927 61c1935-61c1947 924->927 925->924 928 61c1979-61c197e 927->928 929 61c1949-61c196f 927->929 928->929
                                                                                                  APIs
                                                                                                  • GetProcessTimes.KERNELBASE(?,00000E24,A3B420CB,00000000,00000000,00000000,00000000), ref: 061C192D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ProcessTimes
                                                                                                  • String ID:
                                                                                                  • API String ID: 1995159646-0
                                                                                                  • Opcode ID: 92787114d23267ad8f04aade0e7ecb7b812058565f0ea512340a5bd8ec750575
                                                                                                  • Instruction ID: 3c0c3d60d0d3d40eddaba2cdc840d0b069f83880582048e9c579814d23ae7921
                                                                                                  • Opcode Fuzzy Hash: 92787114d23267ad8f04aade0e7ecb7b812058565f0ea512340a5bd8ec750575
                                                                                                  • Instruction Fuzzy Hash: 4631F7725093806FE7128F21DC55B96BFB8EF06320F08849BE984CB153D3259949C7B1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 932 61c218e-61c21f3 934 61c21f6-61c2248 FormatMessageW 932->934 936 61c224e-61c2277 934->936
                                                                                                  APIs
                                                                                                  • FormatMessageW.KERNELBASE(?,00000E24,?,?), ref: 061C2246
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FormatMessage
                                                                                                  • String ID:
                                                                                                  • API String ID: 1306739567-0
                                                                                                  • Opcode ID: a9bb882fda1b88fdf45604a7429eab953842d93dda71704eb31c18b2307c9002
                                                                                                  • Instruction ID: 4f65fe52ca1b50789bd8eb143e0ee1bbe3b7f906ec017b935c588ee5316cc704
                                                                                                  • Opcode Fuzzy Hash: a9bb882fda1b88fdf45604a7429eab953842d93dda71704eb31c18b2307c9002
                                                                                                  • Instruction Fuzzy Hash: 1C318FB150D3C45FD7038B218C61A62BFB4EF47610F0A84CBD884DF6A3D6246909D7A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 904 342ab1e-342ab84 906 342ab8a-342ab9b 904->906 907 342aba1-342abad 906->907 908 342abb2-342abc9 907->908 909 342abaf 907->909 911 342ac0b-342ac10 908->911 912 342abcb-342abde RegOpenKeyExW 908->912 909->908 911->912 913 342ac12-342ac17 912->913 914 342abe0-342ac08 912->914 913->914
                                                                                                  APIs
                                                                                                  • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 0342ABD1
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Open
                                                                                                  • String ID:
                                                                                                  • API String ID: 71445658-0
                                                                                                  • Opcode ID: ea0c14f73a9bcd953f5d38a001999003c02c82ea6da5a0c5ecae146aaed4c5f0
                                                                                                  • Instruction ID: b014e1623f3047a850e4fa331666fa0fc27afc196780316a94e94136c83a082c
                                                                                                  • Opcode Fuzzy Hash: ea0c14f73a9bcd953f5d38a001999003c02c82ea6da5a0c5ecae146aaed4c5f0
                                                                                                  • Instruction Fuzzy Hash: 6831B3715093846FE7228B65CC84FA7BFBCEF06210F08849BE984CB252D324A94CC775
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 061C131B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DescriptorSecurity$ConvertString
                                                                                                  • String ID:
                                                                                                  • API String ID: 3907675253-0
                                                                                                  • Opcode ID: 0e2f3ba4d3364bb1e21322d87f0ea8d3f754cfd36b312d7e350de314d8138ec0
                                                                                                  • Instruction ID: 53c62e8b88229fb0fde9694c371bc1955c16ca3c7d9755022ca35322779774d8
                                                                                                  • Opcode Fuzzy Hash: 0e2f3ba4d3364bb1e21322d87f0ea8d3f754cfd36b312d7e350de314d8138ec0
                                                                                                  • Instruction Fuzzy Hash: 0631C3715043446FE721CB65DC45FABBBF8EF05224F08849AF944CB652D324E948CB71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetExitCodeProcess.KERNELBASE(?,00000E24,A3B420CB,00000000,00000000,00000000,00000000), ref: 0342BE6C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CodeExitProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 3861947596-0
                                                                                                  • Opcode ID: eb46d2d1b2806a8a1ada99408d75e0f1cbe801ef1e6cf44533a47b413c6b9ce4
                                                                                                  • Instruction ID: 87cbbe0191e0cec554293d19ef270a33dc6b72288e5247128131e24c5e503d34
                                                                                                  • Opcode Fuzzy Hash: eb46d2d1b2806a8a1ada99408d75e0f1cbe801ef1e6cf44533a47b413c6b9ce4
                                                                                                  • Instruction Fuzzy Hash: EC21E4B15093805FE7128B25DC55BA6BFB8EF47320F0884DBE984DF293D264A909C765
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CreateMutexW.KERNELBASE(?,?), ref: 0342A6B9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateMutex
                                                                                                  • String ID:
                                                                                                  • API String ID: 1964310414-0
                                                                                                  • Opcode ID: 6d31e90742348f2fb134637e927399da6a2c73e82bc039248ce93dcd195f3c02
                                                                                                  • Instruction ID: 59d889686b41489aef45a2e0666516a8faca6cb21c73827807ba999d7bbeb376
                                                                                                  • Opcode Fuzzy Hash: 6d31e90742348f2fb134637e927399da6a2c73e82bc039248ce93dcd195f3c02
                                                                                                  • Instruction Fuzzy Hash: 6E3190B15097805FE711CB65CC85B96FFF8EF06210F08849AE984CF292D365E909C765
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0342AF1D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateFile
                                                                                                  • String ID:
                                                                                                  • API String ID: 823142352-0
                                                                                                  • Opcode ID: 0262431be6beed0997b952414485d90a2d82e36e8f77e4ae6cc7a128f74d9904
                                                                                                  • Instruction ID: 66de16e0536fe3f34eb32535415ba8001e852604f9924e667bdee06795633a04
                                                                                                  • Opcode Fuzzy Hash: 0262431be6beed0997b952414485d90a2d82e36e8f77e4ae6cc7a128f74d9904
                                                                                                  • Instruction Fuzzy Hash: A431AFB1504340AFE721CF65CC85FA2FBF8EF09210F08849EE9899B652D375E508CB65
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E24,A3B420CB,00000000,00000000,00000000,00000000), ref: 0342A40C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: 6b977bc35b5b34f7f9108cdc5f0967943772d774e8a82fe43eb8d3e02f301f6f
                                                                                                  • Instruction ID: 8c4bb188c3a6c9c7e20f31ddab9efaa7d5938ea2d2ce163a9029425733dbe1b5
                                                                                                  • Opcode Fuzzy Hash: 6b977bc35b5b34f7f9108cdc5f0967943772d774e8a82fe43eb8d3e02f301f6f
                                                                                                  • Instruction Fuzzy Hash: A0317C75505780AFE722CB15CC84F93FFF8EF06210F08849AE985DB292D324E949CB65
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • getaddrinfo.WS2_32(?,00000E24), ref: 061C1A5F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: getaddrinfo
                                                                                                  • String ID:
                                                                                                  • API String ID: 300660673-0
                                                                                                  • Opcode ID: af93504a4c695b9f30471d100500942c8f55332d4d261c281335d695f735e883
                                                                                                  • Instruction ID: 83274adfb7c8d34dd5bafa5a0eca2b2cda53a749bd6c94af726a7398c130edd6
                                                                                                  • Opcode Fuzzy Hash: af93504a4c695b9f30471d100500942c8f55332d4d261c281335d695f735e883
                                                                                                  • Instruction Fuzzy Hash: 3D21BF71500204AEEB20DB51CD85FAAF7ACEB44724F04885AFA499A681D774E54C8BB5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • EnumWindows.USER32(?,00000E24,?,?), ref: 0342A1C2
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EnumWindows
                                                                                                  • String ID:
                                                                                                  • API String ID: 1129996299-0
                                                                                                  • Opcode ID: c930fc8e8cfb79310e6579cfd474b138b58010dd2d266c17cc90565f5536f616
                                                                                                  • Instruction ID: 24bc14366a9530c1832a141f30d8ab27619e43ac54f41e81f72730a8e5052047
                                                                                                  • Opcode Fuzzy Hash: c930fc8e8cfb79310e6579cfd474b138b58010dd2d266c17cc90565f5536f616
                                                                                                  • Instruction Fuzzy Hash: 7121A37150D3C05FD3028B258C61BA6BFB4EF87610F1985DBD8C4DF6A3D225A919C7A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetFileType.KERNELBASE(?,00000E24,A3B420CB,00000000,00000000,00000000,00000000), ref: 0342B009
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileType
                                                                                                  • String ID:
                                                                                                  • API String ID: 3081899298-0
                                                                                                  • Opcode ID: 965602d9c5b7ae85eb69c1290761812a79c83f07eae17601b5a68ee25c309598
                                                                                                  • Instruction ID: c19040bbb15c9d27f84c1fcddd9a9c9653ca08fcd5cbedff55736ac10b7cab71
                                                                                                  • Opcode Fuzzy Hash: 965602d9c5b7ae85eb69c1290761812a79c83f07eae17601b5a68ee25c309598
                                                                                                  • Instruction Fuzzy Hash: D52128B55097806FD7128B25DC45BA2BFBCEF47324F0880DAE9848F293D264A909C771
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileView
                                                                                                  • String ID:
                                                                                                  • API String ID: 3314676101-0
                                                                                                  • Opcode ID: 535bcb973fccb69165159c4e98b9db2950fb5f9de4e424fe653ce58e4337bdae
                                                                                                  • Instruction ID: dda5888a065aa2f3a7c683c0b91f3e7530478c1d16ae6c2346e88a84148e0f61
                                                                                                  • Opcode Fuzzy Hash: 535bcb973fccb69165159c4e98b9db2950fb5f9de4e424fe653ce58e4337bdae
                                                                                                  • Instruction Fuzzy Hash: 0A21B171405384AFE722CF55CD45F96FBF8EF0A224F04849EE9898B252D375E548CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • WSASocketW.WS2_32(?,?,?,?,?), ref: 061C0EEA
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Socket
                                                                                                  • String ID:
                                                                                                  • API String ID: 38366605-0
                                                                                                  • Opcode ID: 0db6091e446c370032a73898cce9d88b514770982c69bfa1dc21bea261fc095f
                                                                                                  • Instruction ID: 31e6167e568506c81c0749b5f78f4350b2d171c17c5fb20bce7c30a6ce5751f0
                                                                                                  • Opcode Fuzzy Hash: 0db6091e446c370032a73898cce9d88b514770982c69bfa1dc21bea261fc095f
                                                                                                  • Instruction Fuzzy Hash: 7821D071409380AFE721CF55CC45F96FFF8EF09220F08889EE9858B652C375A408CB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegSetValueExW.KERNELBASE(?,00000E24,A3B420CB,00000000,00000000,00000000,00000000), ref: 0342A4F8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value
                                                                                                  • String ID:
                                                                                                  • API String ID: 3702945584-0
                                                                                                  • Opcode ID: 1a87adb46edd03865ee185f93c0b8d150f24381b143d92587b4dde365b9fbf85
                                                                                                  • Instruction ID: 326839eb7526ed169aebea8c8714989b50e36d994eed3d56a9fbeb363a92d658
                                                                                                  • Opcode Fuzzy Hash: 1a87adb46edd03865ee185f93c0b8d150f24381b143d92587b4dde365b9fbf85
                                                                                                  • Instruction Fuzzy Hash: 3021AEB25043806FD722CB11DC44FA3BFB8EF46210F08849AE985DB652C364E848CB75
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E24,A3B420CB,00000000,00000000,00000000,00000000), ref: 061C1230
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: 769382d884a67f34ce412050a79b8ef4e838929a5ec0ff7436e2a4099381fdf5
                                                                                                  • Instruction ID: 81583769dda0e8f85db63ee756ae348716da6072b4ab44719e3295d3644087cb
                                                                                                  • Opcode Fuzzy Hash: 769382d884a67f34ce412050a79b8ef4e838929a5ec0ff7436e2a4099381fdf5
                                                                                                  • Instruction Fuzzy Hash: 0921A175904380AFD721CB65CC55F97BBF8AF46220F08849AE945DB292D324E908CB71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • K32EnumProcesses.KERNEL32(?,?,?,A3B420CB,00000000,?,?,?,?,?,?,?,?,6C9C3C58), ref: 061C013E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EnumProcesses
                                                                                                  • String ID:
                                                                                                  • API String ID: 84517404-0
                                                                                                  • Opcode ID: eb91ea29bb4aa7a822e61b24990124274281a982d56e7a62b6991eb533f325ba
                                                                                                  • Instruction ID: afb010a2c08061d027165f905fad69c4465090bb5f1ab0c5cb884c2a58edd538
                                                                                                  • Opcode Fuzzy Hash: eb91ea29bb4aa7a822e61b24990124274281a982d56e7a62b6991eb533f325ba
                                                                                                  • Instruction Fuzzy Hash: 74219C715093C09FDB138B65DC55A96BFB4AF47220F0D84EBD984CF1A3D2249918CB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 061C131B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DescriptorSecurity$ConvertString
                                                                                                  • String ID:
                                                                                                  • API String ID: 3907675253-0
                                                                                                  • Opcode ID: 0401d66bc9829db00602b85cd1d099bcddc471cd070c31d3e949a2e27329bf37
                                                                                                  • Instruction ID: 083ae18942d6f685324364d2399b1a8450be9600e4f93e382d4f63bd3fd340d9
                                                                                                  • Opcode Fuzzy Hash: 0401d66bc9829db00602b85cd1d099bcddc471cd070c31d3e949a2e27329bf37
                                                                                                  • Instruction Fuzzy Hash: 0121D471600204AFEB20DF65DD45FABBBECEF04624F04886EE945CB742D774E5488AB5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ReadFile.KERNELBASE(?,00000E24,A3B420CB,00000000,00000000,00000000,00000000), ref: 0342B389
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileRead
                                                                                                  • String ID:
                                                                                                  • API String ID: 2738559852-0
                                                                                                  • Opcode ID: edb69c969caccdb61ab9850114be1f37a3c6ae35bee2a28a3a5d5891758418df
                                                                                                  • Instruction ID: 5439d8e31eabba47ee0c967e147bdcede035d5ded73b92e77693d67caabd04ee
                                                                                                  • Opcode Fuzzy Hash: edb69c969caccdb61ab9850114be1f37a3c6ae35bee2a28a3a5d5891758418df
                                                                                                  • Instruction Fuzzy Hash: 7D21F5715043406FE722CF55DD40FA7BFBCEF46310F08889AF9849B252C265A508CBB5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0342AF1D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateFile
                                                                                                  • String ID:
                                                                                                  • API String ID: 823142352-0
                                                                                                  • Opcode ID: b5214bc4fb50b29806a1e2b947f02d6f866cb7ff75c08e580660a677000c6963
                                                                                                  • Instruction ID: df42faaf2db724e735d019101fa4f20d782bd4f3aa0c405570f54cd40a941cbe
                                                                                                  • Opcode Fuzzy Hash: b5214bc4fb50b29806a1e2b947f02d6f866cb7ff75c08e580660a677000c6963
                                                                                                  • Instruction Fuzzy Hash: 1021AEB1600240AFEB20CF65CD45B66FBE8EF08610F08886AED49DB751D775E508CB76
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 0342ABD1
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Open
                                                                                                  • String ID:
                                                                                                  • API String ID: 71445658-0
                                                                                                  • Opcode ID: 1ce59a50f81a2a22a0e37d18a633c5277894efb066af56d594ea14cf3536a092
                                                                                                  • Instruction ID: 4dc7437e2923251415afb2542eeb1c8068afca0ab612f3cc462c6fbbb59194e7
                                                                                                  • Opcode Fuzzy Hash: 1ce59a50f81a2a22a0e37d18a633c5277894efb066af56d594ea14cf3536a092
                                                                                                  • Instruction Fuzzy Hash: 5921BB72500204AEE720DB55CD84FABFBECEF08214F08845BEE459B642D724E54CCABA
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetProcessWorkingSetSize.KERNEL32(?,00000E24,A3B420CB,00000000,00000000,00000000,00000000), ref: 061C213B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ProcessSizeWorking
                                                                                                  • String ID:
                                                                                                  • API String ID: 3584180929-0
                                                                                                  • Opcode ID: f1165f3d520f20a971796bd4257a85a682e0b481457d7bb080834b8d68699f4f
                                                                                                  • Instruction ID: 3eb84db9af3326a68a3536ad62f6f5277070115db989cc6fdca0964cee78b709
                                                                                                  • Opcode Fuzzy Hash: f1165f3d520f20a971796bd4257a85a682e0b481457d7bb080834b8d68699f4f
                                                                                                  • Instruction Fuzzy Hash: 4D21D4715053846FD721CB25DC95FA7BFB8EF46220F0884ABE944CB252D374A508CBB1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CreateMutexW.KERNELBASE(?,?), ref: 0342A6B9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateMutex
                                                                                                  • String ID:
                                                                                                  • API String ID: 1964310414-0
                                                                                                  • Opcode ID: bf76ee6a805ff2c063a2cee4416cda6f06d9d9aad0b010a8579a3a831f67893f
                                                                                                  • Instruction ID: b39c8988d769a56ffc31b374463c2d4ee18d0a04480633e91dd11e274cc6df42
                                                                                                  • Opcode Fuzzy Hash: bf76ee6a805ff2c063a2cee4416cda6f06d9d9aad0b010a8579a3a831f67893f
                                                                                                  • Instruction Fuzzy Hash: C221D4716002509FE720CF65CD45BA6FBE8EF04210F08846AED88DF751D771E909CA7A
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 0342BA6A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LookupPrivilegeValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3899507212-0
                                                                                                  • Opcode ID: 22133d6c19b56d02d2d6baf5b9d850811ef2ee37c34fbb74e72dbb4e0f1ce0de
                                                                                                  • Instruction ID: 4475ed7c31f27968861ade07f62a191268e4af4ec3098350860d43ab26ade47a
                                                                                                  • Opcode Fuzzy Hash: 22133d6c19b56d02d2d6baf5b9d850811ef2ee37c34fbb74e72dbb4e0f1ce0de
                                                                                                  • Instruction Fuzzy Hash: 66215E716093805FEB21CF25DC55B63BFF8EF46210F0884DAE985DF652D265E408DB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E24,A3B420CB,00000000,00000000,00000000,00000000), ref: 0342A40C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: e7965b9d624f940e117190176c9d5bce9d6dea7b41809fd1c8cf307b901ec70f
                                                                                                  • Instruction ID: cf5553e5dd593a96f97dab9fedc0bf9ca254ce13425c5753f1b1ea61a1b4f55b
                                                                                                  • Opcode Fuzzy Hash: e7965b9d624f940e117190176c9d5bce9d6dea7b41809fd1c8cf307b901ec70f
                                                                                                  • Instruction Fuzzy Hash: 17216A75600614AEE720CE15CD84FA7FBECEF04620F08846AED45DB751D760E949CAB6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 0342A780
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ChangeCloseFindNotification
                                                                                                  • String ID:
                                                                                                  • API String ID: 2591292051-0
                                                                                                  • Opcode ID: ace3f821dc2d07f7ad5f70fd256601b380c2e02ad4b7879346f5471cc1b31331
                                                                                                  • Instruction ID: c2fcf5f73274ce3c1e7b4d340f2fa8294968ff5cf309cfc3aa7228c9a4994756
                                                                                                  • Opcode Fuzzy Hash: ace3f821dc2d07f7ad5f70fd256601b380c2e02ad4b7879346f5471cc1b31331
                                                                                                  • Instruction Fuzzy Hash: D821C3B55047809FD7118B25D985792BFB8EF46220F0884EBDD848B653D2359909DBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetFileAttributesW.KERNELBASE(?,?), ref: 0342AC97
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AttributesFile
                                                                                                  • String ID:
                                                                                                  • API String ID: 3188754299-0
                                                                                                  • Opcode ID: 2529407bb11b916bda114e68ffc9e19c4c9e2685a1045435c355bb2e69a60cf4
                                                                                                  • Instruction ID: 72e0eaf4e408fd2c3a550def6367990d394e2df379db3a106e5b005579881dea
                                                                                                  • Opcode Fuzzy Hash: 2529407bb11b916bda114e68ffc9e19c4c9e2685a1045435c355bb2e69a60cf4
                                                                                                  • Instruction Fuzzy Hash: D221C2715093C45FDB12CB25D885B92BFE8EF46224F0884EBD885CF253D2749449DB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 0342BCA4
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ChangeCloseFindNotification
                                                                                                  • String ID:
                                                                                                  • API String ID: 2591292051-0
                                                                                                  • Opcode ID: 138d3cf7b8d6f44ac06cf8c7025fe6954033d1a0a6a02342db199cb699f55e57
                                                                                                  • Instruction ID: fd92a08b43d18e6a3e57ce09d3e6e3cd0442bbcc517a452781baae05c0af59c9
                                                                                                  • Opcode Fuzzy Hash: 138d3cf7b8d6f44ac06cf8c7025fe6954033d1a0a6a02342db199cb699f55e57
                                                                                                  • Instruction Fuzzy Hash: C221AEB25093C05FDB128B25DC95792BFB4AF47224F0D84DBE8858F663D264A908DB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileView
                                                                                                  • String ID:
                                                                                                  • API String ID: 3314676101-0
                                                                                                  • Opcode ID: ae7c0e4cdd42d0daa450a8ee8f6aaeb27107f3719133ed9a67ee56891f1cd019
                                                                                                  • Instruction ID: 379e87b980a2dae07fda021e3021ecbfa2b21e903649011b75237ae037ad5712
                                                                                                  • Opcode Fuzzy Hash: ae7c0e4cdd42d0daa450a8ee8f6aaeb27107f3719133ed9a67ee56891f1cd019
                                                                                                  • Instruction Fuzzy Hash: 6C212071500200AFE721CF55CD85FAAFBE8EF19224F04885EE9498B742D371E508CBB6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • WSASocketW.WS2_32(?,?,?,?,?), ref: 061C0EEA
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Socket
                                                                                                  • String ID:
                                                                                                  • API String ID: 38366605-0
                                                                                                  • Opcode ID: d597c35a2125a97b69b08eec406f1829e1cd0656231184c03a32aeecec225167
                                                                                                  • Instruction ID: c81c1d52b347ac4a2ac6e5ec2a45eb9d8681c18f679b9fa683cbfdfe2577364e
                                                                                                  • Opcode Fuzzy Hash: d597c35a2125a97b69b08eec406f1829e1cd0656231184c03a32aeecec225167
                                                                                                  • Instruction Fuzzy Hash: D5210171500200AFEB20CF55CD41BAAFBE8EF18324F04885EE9458B641C376E448CBB6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 061C1BE6
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Connect
                                                                                                  • String ID:
                                                                                                  • API String ID: 3144859779-0
                                                                                                  • Opcode ID: ba1efaa40cd73bfe2e01a1e44090244b39be598efe1f1b6611a8df36db9b1746
                                                                                                  • Instruction ID: 71db9443aeb6fddc8d4ef8bb0cd9c7371f5d011d3350a0b6848ca44bbbf08162
                                                                                                  • Opcode Fuzzy Hash: ba1efaa40cd73bfe2e01a1e44090244b39be598efe1f1b6611a8df36db9b1746
                                                                                                  • Instruction Fuzzy Hash: 6E219271548780AFDB228F51DC44B62BFF4EF46210F0884DAE9858B663D335A418DB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E24,A3B420CB,00000000,00000000,00000000,00000000), ref: 061C1230
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: 19cf95848463746c56774297b42ba9bc86a63d84fe4a05855955a0cd38303845
                                                                                                  • Instruction ID: ac7726079beea8f28d0d1e3a66483845bf34111582928c26a374d5e4e590d1a2
                                                                                                  • Opcode Fuzzy Hash: 19cf95848463746c56774297b42ba9bc86a63d84fe4a05855955a0cd38303845
                                                                                                  • Instruction Fuzzy Hash: DF11B176A00200AFE760CF25DC41FAAF7ECEF15620F18845AE945CB752D370E548CAB2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegSetValueExW.KERNELBASE(?,00000E24,A3B420CB,00000000,00000000,00000000,00000000), ref: 0342A4F8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value
                                                                                                  • String ID:
                                                                                                  • API String ID: 3702945584-0
                                                                                                  • Opcode ID: 85ed1fdaf3a594d38d8d614992f91d6cd18f7ee57cc5237f54b4b8182eff119d
                                                                                                  • Instruction ID: 43c245985fc6df187b691bd1241b466498a638e1b88799fe95f52b1b2a340a0b
                                                                                                  • Opcode Fuzzy Hash: 85ed1fdaf3a594d38d8d614992f91d6cd18f7ee57cc5237f54b4b8182eff119d
                                                                                                  • Instruction Fuzzy Hash: 5811BEB6600610AFEB20CE15DC45FA7FBECEF04614F08845AED49DA741DB60E548CAB6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetProcessTimes.KERNELBASE(?,00000E24,A3B420CB,00000000,00000000,00000000,00000000), ref: 061C192D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ProcessTimes
                                                                                                  • String ID:
                                                                                                  • API String ID: 1995159646-0
                                                                                                  • Opcode ID: 0ad7277be01ce4db463db56079448991de1eb2e2c6a7980878ebb090e6aa207a
                                                                                                  • Instruction ID: cd2347fde9f630b1539bf467c55a34148ce60bf2d501128a324ee8e62ee7dc76
                                                                                                  • Opcode Fuzzy Hash: 0ad7277be01ce4db463db56079448991de1eb2e2c6a7980878ebb090e6aa207a
                                                                                                  • Instruction Fuzzy Hash: 2311E672600200AFEB218F55DC45BAAF7ECEF15320F04846AE945CB652D374E548CBB6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CopyFileW.KERNELBASE(?,?,?), ref: 0342AE1E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CopyFile
                                                                                                  • String ID:
                                                                                                  • API String ID: 1304948518-0
                                                                                                  • Opcode ID: d4b76f3bd81186e6a91853e262c5b63bf57bc46c18c83f3cb34559ee552d3c44
                                                                                                  • Instruction ID: fc4fcca39ebd309a2c4480eaabfd1da93f96fc3c76d00e5208f79e4d84611877
                                                                                                  • Opcode Fuzzy Hash: d4b76f3bd81186e6a91853e262c5b63bf57bc46c18c83f3cb34559ee552d3c44
                                                                                                  • Instruction Fuzzy Hash: DB115CB1A453809FD721CB25DC85BA7BFE8EF46610F0884ABED45DB652D224E808CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetProcessWorkingSetSize.KERNEL32(?,00000E24,A3B420CB,00000000,00000000,00000000,00000000), ref: 061C2057
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ProcessSizeWorking
                                                                                                  • String ID:
                                                                                                  • API String ID: 3584180929-0
                                                                                                  • Opcode ID: fabe7ced719115960cf2bda7577c4387934e35acd210ca3fc06e45a3bf13b8df
                                                                                                  • Instruction ID: 992aedbed5bc98ed74385399f572094d142da536a8c4a0f3bea472e4fa353800
                                                                                                  • Opcode Fuzzy Hash: fabe7ced719115960cf2bda7577c4387934e35acd210ca3fc06e45a3bf13b8df
                                                                                                  • Instruction Fuzzy Hash: 99110471600200AFEB20CF15DC55BAAF7E8DF54220F08846BED05CB641D374E548CAB6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetProcessWorkingSetSize.KERNEL32(?,00000E24,A3B420CB,00000000,00000000,00000000,00000000), ref: 061C213B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ProcessSizeWorking
                                                                                                  • String ID:
                                                                                                  • API String ID: 3584180929-0
                                                                                                  • Opcode ID: fabe7ced719115960cf2bda7577c4387934e35acd210ca3fc06e45a3bf13b8df
                                                                                                  • Instruction ID: a08837def5e984882ff33f8b85018dca15dac4f4e5e66f2dc1e0c9968969bcae
                                                                                                  • Opcode Fuzzy Hash: fabe7ced719115960cf2bda7577c4387934e35acd210ca3fc06e45a3bf13b8df
                                                                                                  • Instruction Fuzzy Hash: 88110475600200AFE720CF19DC85BAAB7E8EF14620F08846AEA44CB641D375E5088AB6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 061C02AE
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DuplicateHandle
                                                                                                  • String ID:
                                                                                                  • API String ID: 3793708945-0
                                                                                                  • Opcode ID: b187dbb1435746e8e9b25e97b1574db207f0fea179ca64f5772cbe5b53988dc2
                                                                                                  • Instruction ID: d01fff91c95b6d219648a7e5530c36b67a41983b6881a64fae1c9177025f6ef6
                                                                                                  • Opcode Fuzzy Hash: b187dbb1435746e8e9b25e97b1574db207f0fea179ca64f5772cbe5b53988dc2
                                                                                                  • Instruction Fuzzy Hash: B821D5714493809FCB228F61DC54A56FFF4EF4A320F0888DEE9858F562C375A818DB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetExitCodeProcess.KERNELBASE(?,00000E24,A3B420CB,00000000,00000000,00000000,00000000), ref: 0342BE6C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CodeExitProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 3861947596-0
                                                                                                  • Opcode ID: 4bd2f24510c4a9814dbae6975ebe91a706dc3d780774284928bd704c3528fc35
                                                                                                  • Instruction ID: 1c4cc3149d98ba40c12ec51b13642c097f9ccaf3b9e43826016aadc281f36f33
                                                                                                  • Opcode Fuzzy Hash: 4bd2f24510c4a9814dbae6975ebe91a706dc3d780774284928bd704c3528fc35
                                                                                                  • Instruction Fuzzy Hash: 3511C171600200AFEB10CB15DC85BA6BBECDF45224F0884AAEE44DF741D774A5488AB6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ReadFile.KERNELBASE(?,00000E24,A3B420CB,00000000,00000000,00000000,00000000), ref: 0342B389
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileRead
                                                                                                  • String ID:
                                                                                                  • API String ID: 2738559852-0
                                                                                                  • Opcode ID: aa948fc5dc75bef4111ffa68f509935e36085f1d740fffdf9fdda36bfa16ef1c
                                                                                                  • Instruction ID: 2c98cd4678cbfec15c014ef3e7a60eef0f296bb05f87f40d9a7ee85946832385
                                                                                                  • Opcode Fuzzy Hash: aa948fc5dc75bef4111ffa68f509935e36085f1d740fffdf9fdda36bfa16ef1c
                                                                                                  • Instruction Fuzzy Hash: 4C11EF72500200AFEB21CF55DC40FA6FBE8EF04324F08885AE9489F652C374A5088BB6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 0342AAE0
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ChangeCloseFindNotification
                                                                                                  • String ID:
                                                                                                  • API String ID: 2591292051-0
                                                                                                  • Opcode ID: efe6e808cd89c364e50d85da7d386220924a6277cb16cf426e59d4053fa94bca
                                                                                                  • Instruction ID: b3f5332e34f1800a2fc8947f87f0622548788c774bba7d2dfb65c177cf4eeb20
                                                                                                  • Opcode Fuzzy Hash: efe6e808cd89c364e50d85da7d386220924a6277cb16cf426e59d4053fa94bca
                                                                                                  • Instruction Fuzzy Hash: 36119D715093C09FDB128B21DC45B92BFB4EF47220F0888DBED848F253C275A948DBA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetErrorMode.KERNELBASE(?), ref: 0342A330
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorMode
                                                                                                  • String ID:
                                                                                                  • API String ID: 2340568224-0
                                                                                                  • Opcode ID: 128515e37a314b2dc4092b0559413ab3a4c697feb662e8c6d959e5b84be26fee
                                                                                                  • Instruction ID: cb9f041aa7b04d273d1e846445c7f7e2627fdb66220818a66f368072c2fc0794
                                                                                                  • Opcode Fuzzy Hash: 128515e37a314b2dc4092b0559413ab3a4c697feb662e8c6d959e5b84be26fee
                                                                                                  • Instruction Fuzzy Hash: 05118F754093806FD7128B15DC44B62BFA8EF46220F0C80DBED849F253C265A808DB72
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CopyFileW.KERNELBASE(?,?,?), ref: 0342AE1E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CopyFile
                                                                                                  • String ID:
                                                                                                  • API String ID: 1304948518-0
                                                                                                  • Opcode ID: 222bbf417dcebeaa4c4c6d90760c55a1be51a6270f308750f677b2ed0b062138
                                                                                                  • Instruction ID: a6311917fc1dc76bfc2626fcbd0b720ab5df9e35671228124b5492381120a7c7
                                                                                                  • Opcode Fuzzy Hash: 222bbf417dcebeaa4c4c6d90760c55a1be51a6270f308750f677b2ed0b062138
                                                                                                  • Instruction Fuzzy Hash: 601182B1A002108FDB10CF15D885766FBE8EF14610F0884ABDD49DF741D635D405CA66
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 0342BA6A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LookupPrivilegeValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3899507212-0
                                                                                                  • Opcode ID: 222bbf417dcebeaa4c4c6d90760c55a1be51a6270f308750f677b2ed0b062138
                                                                                                  • Instruction ID: 109e9594cc9fe96a5be2acddbcf62e35925eac51acce7137f075b5abb473c9d0
                                                                                                  • Opcode Fuzzy Hash: 222bbf417dcebeaa4c4c6d90760c55a1be51a6270f308750f677b2ed0b062138
                                                                                                  • Instruction Fuzzy Hash: F3117CB1A002008FEB60CF29D885B66FFE8EB54220F0884AADD49DF742D674E504CA76
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseFind
                                                                                                  • String ID:
                                                                                                  • API String ID: 1863332320-0
                                                                                                  • Opcode ID: c7211c0b0c0cd57d56aae0dd165a4857bd226247741da50af5509d5381f1b7b0
                                                                                                  • Instruction ID: cfb1ec3adf1b90f92d485df972e66cd649e8ec95ad7923c8858f7118ec5ba604
                                                                                                  • Opcode Fuzzy Hash: c7211c0b0c0cd57d56aae0dd165a4857bd226247741da50af5509d5381f1b7b0
                                                                                                  • Instruction Fuzzy Hash: A411C2755093809FC7128F15DC85B66FFB4DF46220F0884DBED858F652D264A908CB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetFileType.KERNELBASE(?,00000E24,A3B420CB,00000000,00000000,00000000,00000000), ref: 0342B009
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileType
                                                                                                  • String ID:
                                                                                                  • API String ID: 3081899298-0
                                                                                                  • Opcode ID: 1d6647f5d69ee37a647ee3f7d99e59eb5aa716c7244e2fb00973cf0cabeec779
                                                                                                  • Instruction ID: 5d8d981cc05baef2760cb831ba76abb4e6a2935f1e75bc37319ceddf9c95c34b
                                                                                                  • Opcode Fuzzy Hash: 1d6647f5d69ee37a647ee3f7d99e59eb5aa716c7244e2fb00973cf0cabeec779
                                                                                                  • Instruction Fuzzy Hash: EA01C071604214AEE721CB05DD85BA6FBECDF55624F08809BED089F741D374E5488ABA
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • WaitForInputIdle.USER32(?,?), ref: 0342AA3B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: IdleInputWait
                                                                                                  • String ID:
                                                                                                  • API String ID: 2200289081-0
                                                                                                  • Opcode ID: 45ecea33721fe5309548978ae6970ebc610f94c899c4bb28a737f69fcfd7678c
                                                                                                  • Instruction ID: 6f7c74a819ec0adc25042c683c0d4dcf3f625d47941ea319ef4b9639053945bb
                                                                                                  • Opcode Fuzzy Hash: 45ecea33721fe5309548978ae6970ebc610f94c899c4bb28a737f69fcfd7678c
                                                                                                  • Instruction Fuzzy Hash: 69119E715093809FDB11CF15DD85B56FFE8EF46220F0984EAED858F262D279A908CB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 061C1BE6
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Connect
                                                                                                  • String ID:
                                                                                                  • API String ID: 3144859779-0
                                                                                                  • Opcode ID: 703c914e74a49b473d1d8a76eb9d8e2c349cf90b74ef08a034440841d0a8508c
                                                                                                  • Instruction ID: b423c3bd78543419621211af9e31afe41a84d65e73fff7e5fae4ee6689329395
                                                                                                  • Opcode Fuzzy Hash: 703c914e74a49b473d1d8a76eb9d8e2c349cf90b74ef08a034440841d0a8508c
                                                                                                  • Instruction Fuzzy Hash: BD117071504604AFEB60CF55D845B66FBF4EF19220F08C8AAED458B612D335E458DF62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • K32EnumProcesses.KERNEL32(?,?,?,A3B420CB,00000000,?,?,?,?,?,?,?,?,6C9C3C58), ref: 061C013E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EnumProcesses
                                                                                                  • String ID:
                                                                                                  • API String ID: 84517404-0
                                                                                                  • Opcode ID: a34d7494a81cb810a816411cecd3d15dd83412616ed35908c067659451b13ca0
                                                                                                  • Instruction ID: 7f11c7b5a8e80bc8c8438adc778b721bd91384ba65238666999ec5d902438ac9
                                                                                                  • Opcode Fuzzy Hash: a34d7494a81cb810a816411cecd3d15dd83412616ed35908c067659451b13ca0
                                                                                                  • Instruction Fuzzy Hash: 60118E71A00204DFEB50CF19D885B66FBE4EF18225F0884AADD498B651D336E508CB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetFileAttributesW.KERNELBASE(?,?), ref: 0342AC97
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AttributesFile
                                                                                                  • String ID:
                                                                                                  • API String ID: 3188754299-0
                                                                                                  • Opcode ID: 569839c2d2e9702a0f4c3e56ca248fa35c7f53721c85eeaa1d191c93d61464ea
                                                                                                  • Instruction ID: d907653466d3455af9a4748e063b98ca999808d972c015f0cf43d45b71216f58
                                                                                                  • Opcode Fuzzy Hash: 569839c2d2e9702a0f4c3e56ca248fa35c7f53721c85eeaa1d191c93d61464ea
                                                                                                  • Instruction Fuzzy Hash: C901D2716002408FEB10CF1AD885766FBE8EF04220F08C4ABDD45DF742D675D408DA66
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FormatMessageW.KERNELBASE(?,00000E24,?,?), ref: 061C2246
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FormatMessage
                                                                                                  • String ID:
                                                                                                  • API String ID: 1306739567-0
                                                                                                  • Opcode ID: e6e95677f4e5bd8385694d29ada0b443209837020206ec09fb04a6267908feaa
                                                                                                  • Instruction ID: e2a3f3ed47ee5fdbcdb4adfaf38fa227baa73b7770f9e7e14e0bcf9a44d6370c
                                                                                                  • Opcode Fuzzy Hash: e6e95677f4e5bd8385694d29ada0b443209837020206ec09fb04a6267908feaa
                                                                                                  • Instruction Fuzzy Hash: 91017171A00200AFD310DF16DD46B66FBE8FB88A20F14856AED089BB41D735B955CBE5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • EnumWindows.USER32(?,00000E24,?,?), ref: 0342A1C2
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EnumWindows
                                                                                                  • String ID:
                                                                                                  • API String ID: 1129996299-0
                                                                                                  • Opcode ID: 423ba41d188554db0112ac5ec925b682375941a4ac771c9a0ac8296d08f1df93
                                                                                                  • Instruction ID: 356a929162456399eb5b46f64c9be65c27b7d3e6162e746430558894dd0a58f6
                                                                                                  • Opcode Fuzzy Hash: 423ba41d188554db0112ac5ec925b682375941a4ac771c9a0ac8296d08f1df93
                                                                                                  • Instruction Fuzzy Hash: DE017171A00200AFD310DF16DD46B66FBE8FB88A20F14856AED089BB41D735B955CBE5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 061C02AE
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DuplicateHandle
                                                                                                  • String ID:
                                                                                                  • API String ID: 3793708945-0
                                                                                                  • Opcode ID: de878fa3eb5011e302992dcb78931530caadb9c279f96fb87c98262c7c0dacb1
                                                                                                  • Instruction ID: 8dfd06aba620a297527fa2471e2a31b56d4d654c9f3b6ac46f08f1aa82c2255c
                                                                                                  • Opcode Fuzzy Hash: de878fa3eb5011e302992dcb78931530caadb9c279f96fb87c98262c7c0dacb1
                                                                                                  • Instruction Fuzzy Hash: C401AD32900600DFEB608F55D844B66FBE0EF58321F08889EDE894A612C336E418DFA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 061C0E32
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104664583.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_61c0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: 80b492755d4fbbcc073f87d14c585ef571670f106b2ad2b4ba4dd5bbe632cf0a
                                                                                                  • Instruction ID: 0ae612468b37342cba41ce9b45b36fee3e36ab81e9cd7449acd5b3a257c97044
                                                                                                  • Opcode Fuzzy Hash: 80b492755d4fbbcc073f87d14c585ef571670f106b2ad2b4ba4dd5bbe632cf0a
                                                                                                  • Instruction Fuzzy Hash: C101A271500200ABD210DF16DD46B66FBE8FB88A20F14811AEC089BB41D771F955CBE5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 0342A780
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ChangeCloseFindNotification
                                                                                                  • String ID:
                                                                                                  • API String ID: 2591292051-0
                                                                                                  • Opcode ID: 4807e185154f48d24c88d98985feb6e26471be81ae6d6101ba84e2d8c01b98db
                                                                                                  • Instruction ID: b17d9078f24826cb9e835b8c626c2902ad30c2c8c3081c10bf268e4a5addae70
                                                                                                  • Opcode Fuzzy Hash: 4807e185154f48d24c88d98985feb6e26471be81ae6d6101ba84e2d8c01b98db
                                                                                                  • Instruction Fuzzy Hash: BE01F275A006008FEB10CF15D985766FFE8DF45220F08C4ABDD499F742D675E408CEAA
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 0342BCA4
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ChangeCloseFindNotification
                                                                                                  • String ID:
                                                                                                  • API String ID: 2591292051-0
                                                                                                  • Opcode ID: 28dd1ab13c302de0b5bdabc1f1cfc97408fc364aaba8d7b5852e2b5946f6daf2
                                                                                                  • Instruction ID: 22115b9fe39df5467950b728e3c06bc5b49dbadf1529c032a39835a22d099d74
                                                                                                  • Opcode Fuzzy Hash: 28dd1ab13c302de0b5bdabc1f1cfc97408fc364aaba8d7b5852e2b5946f6daf2
                                                                                                  • Instruction Fuzzy Hash: 8101DF756042048FDB10CF16E985766FBE8EF55220F08C4ABDD499F742C675E408CA76
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • WaitForInputIdle.USER32(?,?), ref: 0342AA3B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: IdleInputWait
                                                                                                  • String ID:
                                                                                                  • API String ID: 2200289081-0
                                                                                                  • Opcode ID: 829a19e7a2cf4c523ee4502d993312e9d70f4e75891e909bc3ff4518ff955363
                                                                                                  • Instruction ID: e25e9cfc5b6f933fdfc6d05ca3e68a382c94010b6c19b4305a32c667deeac18a
                                                                                                  • Opcode Fuzzy Hash: 829a19e7a2cf4c523ee4502d993312e9d70f4e75891e909bc3ff4518ff955363
                                                                                                  • Instruction Fuzzy Hash: E901DF719002809FDB20CF05D984766FFE4EF04620F08C8ABDD499F302D275E508CEA6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseFind
                                                                                                  • String ID:
                                                                                                  • API String ID: 1863332320-0
                                                                                                  • Opcode ID: 9cb10587d4210af30bc790016d004b28e186d7e88776065ad65b7b46edc3e708
                                                                                                  • Instruction ID: 7fd4c70a4725b22845da818bf4cfdebb4b8bb7b58d0531de8695f551eb6ccae8
                                                                                                  • Opcode Fuzzy Hash: 9cb10587d4210af30bc790016d004b28e186d7e88776065ad65b7b46edc3e708
                                                                                                  • Instruction Fuzzy Hash: 2101AD756007008FDB20CF16E889766FBE4EF15220F08C4ABDD059F752D275E848CAA6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 0342AAE0
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ChangeCloseFindNotification
                                                                                                  • String ID:
                                                                                                  • API String ID: 2591292051-0
                                                                                                  • Opcode ID: be90fa741ec216dee0a39b5b49085fa808e003d33a164cc37dc9794d12a2cfd3
                                                                                                  • Instruction ID: 509cac1d959b68da858ae8a2a47da23bc7ed7b337fb971e601448dcb04c7ed1c
                                                                                                  • Opcode Fuzzy Hash: be90fa741ec216dee0a39b5b49085fa808e003d33a164cc37dc9794d12a2cfd3
                                                                                                  • Instruction Fuzzy Hash: F401AD71A002409FDB10CF15D989762FFE4EF45220F08C4ABDD499F746D6B9E548CEA6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetErrorMode.KERNELBASE(?), ref: 0342A330
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100505157.000000000342A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0342A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_342a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorMode
                                                                                                  • String ID:
                                                                                                  • API String ID: 2340568224-0
                                                                                                  • Opcode ID: 3726ef3c763c6d06f9cde93b73092b05b6caf40f4f28b5d8f80c9eb0b9b2ccc7
                                                                                                  • Instruction ID: b1c1755c083c5f53a8781132f2320bc0c5ab24e89cf7ad31506ec6f450cd258c
                                                                                                  • Opcode Fuzzy Hash: 3726ef3c763c6d06f9cde93b73092b05b6caf40f4f28b5d8f80c9eb0b9b2ccc7
                                                                                                  • Instruction Fuzzy Hash: 26F08C759042449FDB20CF09D885B62FFE4EF09624F48C09BDD495F752D675E408CAA6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 2l
                                                                                                  • API String ID: 0-2574689970
                                                                                                  • Opcode ID: 039c2ba0993c2ad728ba9ad844913b1753c5eaf2c5a56ce6fe5990181f9acf59
                                                                                                  • Instruction ID: 5d9efed7cca6b53a6e372582acd1cbdc90e5047fa8c85cebff1169514326e7da
                                                                                                  • Opcode Fuzzy Hash: 039c2ba0993c2ad728ba9ad844913b1753c5eaf2c5a56ce6fe5990181f9acf59
                                                                                                  • Instruction Fuzzy Hash: 21A1F135B042209BD714DBB8C984BAD72E3BBD5348F14866AD4129B3D0DF38DC46C762
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: :@k
                                                                                                  • API String ID: 0-2277858631
                                                                                                  • Opcode ID: f058212f1defad11ae2df2c206243d318fa0a575a7d2b93b3e1a0930fc5634db
                                                                                                  • Instruction ID: 408a875d0576892929341da4a29f816b01145f386b10e714e3073f3dadb8a785
                                                                                                  • Opcode Fuzzy Hash: f058212f1defad11ae2df2c206243d318fa0a575a7d2b93b3e1a0930fc5634db
                                                                                                  • Instruction Fuzzy Hash: AE714C39700210CFDB19EB78D455B6D37E2FBD8248B14416AE4069B7A8DF3ADC82DB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: :@k
                                                                                                  • API String ID: 0-2277858631
                                                                                                  • Opcode ID: af308baad1a5c1832f0542602a4694a77ef54becd52766a4e2979cc3e891483d
                                                                                                  • Instruction ID: 267c3ed31621434b346c698c30512a6388085c2ce73b08cef62e4b29969659da
                                                                                                  • Opcode Fuzzy Hash: af308baad1a5c1832f0542602a4694a77ef54becd52766a4e2979cc3e891483d
                                                                                                  • Instruction Fuzzy Hash: A241BF35B002049FCB08DBB5D9516EDBBE7AF94218F14446BE105EB7A0DF389D098B62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: L.l
                                                                                                  • API String ID: 0-1469302089
                                                                                                  • Opcode ID: 630a0d3a347ae02b6592a9fca70b0c4814018cb1aaa9a53acd75547405b83107
                                                                                                  • Instruction ID: b762fcaaf2fa7412b8b26ca293daea7f84ed4c1879b426ca2f6669bdd805b048
                                                                                                  • Opcode Fuzzy Hash: 630a0d3a347ae02b6592a9fca70b0c4814018cb1aaa9a53acd75547405b83107
                                                                                                  • Instruction Fuzzy Hash: 49119339F042189BDB04EA76D841BFE76E6BF9D200F14842AE506BF280DA719C008BA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: \Ol
                                                                                                  • API String ID: 0-1319056321
                                                                                                  • Opcode ID: ea48b9235217d3fecb574b7e138d1ab201224469d9628dac04d551a63520ffe7
                                                                                                  • Instruction ID: 7ab0c5d1273892ce425c1692337fa62a81ba62a4d9130334497e11abf2e99163
                                                                                                  • Opcode Fuzzy Hash: ea48b9235217d3fecb574b7e138d1ab201224469d9628dac04d551a63520ffe7
                                                                                                  • Instruction Fuzzy Hash: FC216A35B100149FCB08DBB8E494AADB3F3BFC8208B1481AAE406AB361CF359C05CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b122a93894d4d3190c2af2c70035e30746b785aa813674cb8c02bf73da2d8bc7
                                                                                                  • Instruction ID: b61b2c802dac028278933e9c9d3248f4c7ceaa5769f20174309d474f41a130cf
                                                                                                  • Opcode Fuzzy Hash: b122a93894d4d3190c2af2c70035e30746b785aa813674cb8c02bf73da2d8bc7
                                                                                                  • Instruction Fuzzy Hash: CE61CD7AD041308BDB28567CC4653ED7262BBA534AF15847FE853B7290DB29CC81DBE2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e1d1371a70d8206cbd90f91aef15447ee2812e628df0c9dade564fdba928e5e8
                                                                                                  • Instruction ID: 9def75f56e4451e2f9fc97ffa77542482395e7cfeee011ab245b351ecb7fd185
                                                                                                  • Opcode Fuzzy Hash: e1d1371a70d8206cbd90f91aef15447ee2812e628df0c9dade564fdba928e5e8
                                                                                                  • Instruction Fuzzy Hash: A8611939B00211CFDB199F39D45866D77E2FBC8249B1441AAE8029B3A5DF3DDC82DB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ef0594253aea6d6a23b37ab575405e29f8564fddc3a6bd8ee4ba76a45459b0c1
                                                                                                  • Instruction ID: 99c39f641fbb1ffc941d0f97750bf32e52ec6a2436c71b06c596166e31b0e7ed
                                                                                                  • Opcode Fuzzy Hash: ef0594253aea6d6a23b37ab575405e29f8564fddc3a6bd8ee4ba76a45459b0c1
                                                                                                  • Instruction Fuzzy Hash: 04514C39B00210CFD719DB78E45566D77E2FBC9208B14416AE4059B7A8DB3EDC82DB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 30bf7f79d4df6d7594ed9475ab2dee647c631b8712a2acc95d2cbfc96d20dd6b
                                                                                                  • Instruction ID: 414d40667f3e130a85db75923ac33477b51b97362e47f8739d50ca21fee2c5d9
                                                                                                  • Opcode Fuzzy Hash: 30bf7f79d4df6d7594ed9475ab2dee647c631b8712a2acc95d2cbfc96d20dd6b
                                                                                                  • Instruction Fuzzy Hash: 0651DF34A042219BD714CF7AD9447A977E3BB95359F5881AAE402EB2D0EF38CD46CB31
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1620e72a2e735af627fd73224efc2eb009ff495522081a2c49d540488bc7dcaa
                                                                                                  • Instruction ID: 7a521fdc0f3349a4897e8029d0424b5febf2433b4374f74e6cf279a9bdd553de
                                                                                                  • Opcode Fuzzy Hash: 1620e72a2e735af627fd73224efc2eb009ff495522081a2c49d540488bc7dcaa
                                                                                                  • Instruction Fuzzy Hash: 02510B39B00211CFCB099F38D45966977E2FBC824971441AAE8029B3A5DF3EDC82DB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 991480395fc96bf6c60b2d4c9646619e551d9b27b85c0ad9918a540fe35bbe2f
                                                                                                  • Instruction ID: 0f05f4d0f3119c79bbd510cdfdbe6b04394e3410806de2e41087dcdce676ff37
                                                                                                  • Opcode Fuzzy Hash: 991480395fc96bf6c60b2d4c9646619e551d9b27b85c0ad9918a540fe35bbe2f
                                                                                                  • Instruction Fuzzy Hash: A741C134A042219BD714DF7AD9447B836E3BB95359F5881AAE402EB2D0DF38CD46CB31
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a24beaaefd9a0bbcb74d83b27eb8ff24a2950a71b9bf527b885014912eb83534
                                                                                                  • Instruction ID: d0379287a870aff2c1d7bc1df652ffca9d02cc18ca03c2b78354ad1501ae836f
                                                                                                  • Opcode Fuzzy Hash: a24beaaefd9a0bbcb74d83b27eb8ff24a2950a71b9bf527b885014912eb83534
                                                                                                  • Instruction Fuzzy Hash: F9513538601646CBD708EF38E58859977F2FBE1248740856AE0444B76DDF389C8ADBB2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e86dc343cf3f1c2153781395e9106a21bdbda697f15ea2196a6fcd618a92d163
                                                                                                  • Instruction ID: 177e079c0b0ed1f63ee6958654e0adcda7a31070bee2efe4a57a6794fe674e9f
                                                                                                  • Opcode Fuzzy Hash: e86dc343cf3f1c2153781395e9106a21bdbda697f15ea2196a6fcd618a92d163
                                                                                                  • Instruction Fuzzy Hash: BB415E38B00210CFDB19EB78E4557AD77E2FBC8208B14416AE4159B7A8DF39DC82DB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 43400ade54418e07c82925515f61e217d6a2f56e46a9f1eb2b2cb16a795f95ce
                                                                                                  • Instruction ID: c32f3af893245088da65ee442d3fad80e0b184b6ea42c31238fc96e8a260b6f0
                                                                                                  • Opcode Fuzzy Hash: 43400ade54418e07c82925515f61e217d6a2f56e46a9f1eb2b2cb16a795f95ce
                                                                                                  • Instruction Fuzzy Hash: C3418036B002118FCB04EF74D9845ADB7E6AF94208B08807AD809DB399EF38DD45CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ea1fe46581991fd038b39322c6dd0b819fbbf7233693d2230202fff1db93be04
                                                                                                  • Instruction ID: 1b4d2f6c506e2c43a001495fc96f2244d38f650c0a94fb5c5cf00c69e1d6446e
                                                                                                  • Opcode Fuzzy Hash: ea1fe46581991fd038b39322c6dd0b819fbbf7233693d2230202fff1db93be04
                                                                                                  • Instruction Fuzzy Hash: 70314035A002118FCB04DF74D9855AE77E6EF98204B58817A9805DF399DB38DD46CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: bff3c0134b5d8ef2ea4888e4c983f75b33c49752923cd11520eb1e4663850d84
                                                                                                  • Instruction ID: e0f8df766ae704bd0ef5150c743c509b97a80ab45e557af9737da28e18a0e689
                                                                                                  • Opcode Fuzzy Hash: bff3c0134b5d8ef2ea4888e4c983f75b33c49752923cd11520eb1e4663850d84
                                                                                                  • Instruction Fuzzy Hash: 9A318F38B042208BDB18EB78E8557AC77E2FBC4208B14416AE459DB794DF39DC45DB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4101003933.0000000003601000.00000040.00000020.00020000.00000000.sdmp, Offset: 03601000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_3601000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ab379fd07647769d9b4af3d33e9c018a281dd8eec4448bbfd05e76bf17014ae9
                                                                                                  • Instruction ID: 562fe2b79f08204dcacf8072bde5e80ecf40522094ea8910fd0f70b02bb6276d
                                                                                                  • Opcode Fuzzy Hash: ab379fd07647769d9b4af3d33e9c018a281dd8eec4448bbfd05e76bf17014ae9
                                                                                                  • Instruction Fuzzy Hash: 6721393510D3C08FC717CB60D961A52BFB1AF47214F2D85DED4858B6A3D23AA816D752
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8af59f3ea2db60783390003056aa0d50966e51c06bceb3b70ea72361d208dd64
                                                                                                  • Instruction ID: 25dd63af41a4f5103360065dc444ec301f0bbb2b23f8f7492a3e9469a71cf435
                                                                                                  • Opcode Fuzzy Hash: 8af59f3ea2db60783390003056aa0d50966e51c06bceb3b70ea72361d208dd64
                                                                                                  • Instruction Fuzzy Hash: F111AF38B01260CFDB14EF79E4556AC77F2FBC4218B54846AE055DB398DB39C881CB60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c8c1b3940a3d4d2e639670373226f424c21ee2cab03b47eee1df428ef8de467e
                                                                                                  • Instruction ID: b5e3294c037025079a231a409062e9fa5c9e474620ac43bc91f293b3c18ed77a
                                                                                                  • Opcode Fuzzy Hash: c8c1b3940a3d4d2e639670373226f424c21ee2cab03b47eee1df428ef8de467e
                                                                                                  • Instruction Fuzzy Hash: 9F211A39B00211CFCB099F38D45966D73A3FBC924871541AAE902973A5DF3EEC82DB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4101003933.0000000003601000.00000040.00000020.00020000.00000000.sdmp, Offset: 03601000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_3601000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 762b72e8381c88d54846dd8bee30e5cd68ccc7b815e7fa514e6040c8ce8275f9
                                                                                                  • Instruction ID: d7ff3717325d1f4909ca176db53ee728b68a3f0c0c9f615a743705638d97f79a
                                                                                                  • Opcode Fuzzy Hash: 762b72e8381c88d54846dd8bee30e5cd68ccc7b815e7fa514e6040c8ce8275f9
                                                                                                  • Instruction Fuzzy Hash: 1311D639204280DFC719CB50D581B27FBE5EB9A708F28C99CE5494BB92C777D813CA52
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4101003933.0000000003601000.00000040.00000020.00020000.00000000.sdmp, Offset: 03601000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_3601000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 47de42a85da4aa0d9ba7cfa7e1b83b618c145e4885af44718506569b8d6fa157
                                                                                                  • Instruction ID: a13a1d0aeba4247ed8df179b37ea4a2dd5b662091a322af391a2c1a6fe82c959
                                                                                                  • Opcode Fuzzy Hash: 47de42a85da4aa0d9ba7cfa7e1b83b618c145e4885af44718506569b8d6fa157
                                                                                                  • Instruction Fuzzy Hash: 66215B351093C49FC716CB50D951B11BFB5AF8B204F1D86DAD4848BAA3C33AA816CB52
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2794ef14cf627fbaf3ad48281533a1622ae5a99b98bc3ea64c7a17cc68a72eb4
                                                                                                  • Instruction ID: a5b83034c3e874cc73a26bcbb93e03a1982219a02b589e78a550d20139911a56
                                                                                                  • Opcode Fuzzy Hash: 2794ef14cf627fbaf3ad48281533a1622ae5a99b98bc3ea64c7a17cc68a72eb4
                                                                                                  • Instruction Fuzzy Hash: 0101D23AE002249B9F00EB75DC045EE73F4EF99254B0004A6E402FB304EB29DE0487B1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a7d26597e1c4edd58beb6a8322399a89fde159c5fc5766f1dd6a77f84337712f
                                                                                                  • Instruction ID: c6483e159817165b34759759ff5a81d515f1190882d686db1030539ce7c8fb84
                                                                                                  • Opcode Fuzzy Hash: a7d26597e1c4edd58beb6a8322399a89fde159c5fc5766f1dd6a77f84337712f
                                                                                                  • Instruction Fuzzy Hash: FB016D6A04E3C04FDB439774A8A26903F709A1726070F05C7D481CF5A7D559594EDB72
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4101003933.0000000003601000.00000040.00000020.00020000.00000000.sdmp, Offset: 03601000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_3601000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 149fb64218ebf5c719301cc827afe5396ef11ad822c3b0415e426f537a496e81
                                                                                                  • Instruction ID: 4c2d05323935c452be4f8cf4580f3e34641d64711e043f54e52becd39af770ae
                                                                                                  • Opcode Fuzzy Hash: 149fb64218ebf5c719301cc827afe5396ef11ad822c3b0415e426f537a496e81
                                                                                                  • Instruction Fuzzy Hash: 110186B65497806FC7128B56AC51893BFF8DF8623070A84EBEC49CB712D165BD09CB72
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c87b319ee0f7c85f54d3f14d1d46e8b102d8f2600d96b2cdee31bbab268cc577
                                                                                                  • Instruction ID: cc2f3a5348252bbe880769d6304a16a8a565c724dbaf653ea9cdc118f6f40edd
                                                                                                  • Opcode Fuzzy Hash: c87b319ee0f7c85f54d3f14d1d46e8b102d8f2600d96b2cdee31bbab268cc577
                                                                                                  • Instruction Fuzzy Hash: 69011A34A01254CFDB18EF79E0945ACB7F2FF88219B50846AE415AB355DB39C985CBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0506d2ab8e9367584fd338ed2eb20088e18616309612582baa1d3fe18e346e52
                                                                                                  • Instruction ID: 2850c0b935f0dfe16b6127b44bbadddf49557bba484a2bd58b508e6b76b0f02f
                                                                                                  • Opcode Fuzzy Hash: 0506d2ab8e9367584fd338ed2eb20088e18616309612582baa1d3fe18e346e52
                                                                                                  • Instruction Fuzzy Hash: 74012938A05307AFC704FB78D09855DBBE1EB9A208B418C2EE5459F358DF7988489B57
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c49a8e9414f301a1df93525b597c63bef1b4b4d7ca4b8dc0a083a1808a593c87
                                                                                                  • Instruction ID: 2b9085355d91b6537f161c7740b09d6d4076315f6bc7002e1c15d825c8c7a4d7
                                                                                                  • Opcode Fuzzy Hash: c49a8e9414f301a1df93525b597c63bef1b4b4d7ca4b8dc0a083a1808a593c87
                                                                                                  • Instruction Fuzzy Hash: EAE0E539904225ABDB10D97AAC855967BE4E748390F800462E901E7240DB24DD198AF1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4101003933.0000000003601000.00000040.00000020.00020000.00000000.sdmp, Offset: 03601000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_3601000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e6850d79e688ef7387407e307c00caab001beb49244c143f541758b1d055de9a
                                                                                                  • Instruction ID: 2ec423461dad0e32966a5289b0b5e9b94c779c611e76ab4a48a576e36fe1dfd8
                                                                                                  • Opcode Fuzzy Hash: e6850d79e688ef7387407e307c00caab001beb49244c143f541758b1d055de9a
                                                                                                  • Instruction Fuzzy Hash: 69F01D39104644DFC305CF50D581B16FBA6EB89718F28CAADE94907B62C337E813DA81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4101003933.0000000003601000.00000040.00000020.00020000.00000000.sdmp, Offset: 03601000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_3601000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d62ec134804ade001421513ad7c130627049bb8576f6e6514a339492730fcffe
                                                                                                  • Instruction ID: 86d0e28e54c2d83df66cb38b23964f55443006d2af7bee773dcf2ea7f8784f26
                                                                                                  • Opcode Fuzzy Hash: d62ec134804ade001421513ad7c130627049bb8576f6e6514a339492730fcffe
                                                                                                  • Instruction Fuzzy Hash: CDE06DB66006044B9750CF0AEC41452F7D8EB88630708C47BDC0D8B701D235B508CAA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4104311908.0000000005D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_5d20000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a9d24c071d2dc039b3d0e596ed969dce9774869df1addcaa4f69559bb28be035
                                                                                                  • Instruction ID: 9ab15198f7e21bba6c0eacb13407bb69d1064bdfdeb72dbc26801fdf66898246
                                                                                                  • Opcode Fuzzy Hash: a9d24c071d2dc039b3d0e596ed969dce9774869df1addcaa4f69559bb28be035
                                                                                                  • Instruction Fuzzy Hash: BBD097313041655FCF04A23CF4483883BA8CBC5210B09092BE000EF344CFE08C0583EE
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100486935.0000000003422000.00000040.00000800.00020000.00000000.sdmp, Offset: 03422000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_3422000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 04017134f9e691b0dda1d1b767b2a7c3e447814ec4645091d7555205becf6404
                                                                                                  • Instruction ID: 3d4e3b79901d7fed337b059df9f30cf610e2beb9297f608f1a9d3cb51a7c455b
                                                                                                  • Opcode Fuzzy Hash: 04017134f9e691b0dda1d1b767b2a7c3e447814ec4645091d7555205becf6404
                                                                                                  • Instruction Fuzzy Hash: 29D05E792056E14FD316DA1CC1A4B967BD8AB61714F8A48FAAC009F763C7A8D581D610
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000001.00000002.4100486935.0000000003422000.00000040.00000800.00020000.00000000.sdmp, Offset: 03422000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_1_2_3422000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c2009e3819e8ad92c3975e3baf8a818ba343002302a5d0519abc1b1ba335f41a
                                                                                                  • Instruction ID: f271b2397c6f96dd0f70225db9bac0d0ddac37f1545c44bb95a936a317a422f8
                                                                                                  • Opcode Fuzzy Hash: c2009e3819e8ad92c3975e3baf8a818ba343002302a5d0519abc1b1ba335f41a
                                                                                                  • Instruction Fuzzy Hash: 7AD05E342002814BC759DA1CC6D4F5A7BD8AF50B14F1A48E9AC10CF762C7A4D8C1CA00
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:14.3%
                                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                                  Signature Coverage:0%
                                                                                                  Total number of Nodes:12
                                                                                                  Total number of Limit Nodes:0
                                                                                                  execution_graph 583 2c1a361 584 2c1a392 RegQueryValueExW 583->584 586 2c1a41b 584->586 579 2c1a612 581 2c1a646 CreateMutexW 579->581 582 2c1a6c1 581->582 587 2c1a462 589 2c1a486 RegSetValueExW 587->589 590 2c1a507 589->590 571 2c1a646 573 2c1a67e CreateMutexW 571->573 574 2c1a6c1 573->574

                                                                                                  Callgraph

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 0 5510319-551031e 1 5510320-5510334 0->1 2 5510388-5510418 0->2 4 5510336-5510338 1->4 5 551033e-5510346 1->5 15 551041a 2->15 16 551041f-5510434 2->16 4->5 6 5510348-551034d 5->6 7 551034e-5510360 5->7 7->2 15->16 18 5510436-5510460 16->18 19 551046b-5510523 16->19 18->19 38 5510570-5510587 19->38 39 5510525-5510569 19->39 40 5510880 38->40 41 551058d-55105bf 38->41 39->38 41->40
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000006.00000002.1936443779.0000000005510000.00000040.00000800.00020000.00000000.sdmp, Offset: 05510000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_6_2_5510000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 2l$2l$2l
                                                                                                  • API String ID: 0-1498361692
                                                                                                  • Opcode ID: a8fecdf6d6960d9b935fc5b44620f47181d65ad9d2f6a2a947042a2225388310
                                                                                                  • Instruction ID: 2b5787423c15cf2b0965f819cfbf59b1ace12f5ab2f17c6eb58e94ad37620b0c
                                                                                                  • Opcode Fuzzy Hash: a8fecdf6d6960d9b935fc5b44620f47181d65ad9d2f6a2a947042a2225388310
                                                                                                  • Instruction Fuzzy Hash: 45513734B041518BDB18DB3880586BD77D7AFCA304B1556AAD406CB3E1DF39DC4A97E2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 52 5510368-5510391 54 5510393-55103ce 52->54 55 55103d8-5510418 52->55 54->55 62 551041a 55->62 63 551041f-5510434 55->63 62->63 65 5510436-5510460 63->65 66 551046b-5510523 63->66 65->66 85 5510570-5510587 66->85 86 5510525-5510569 66->86 87 5510880 85->87 88 551058d-55105bf 85->88 86->85 88->87
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000006.00000002.1936443779.0000000005510000.00000040.00000800.00020000.00000000.sdmp, Offset: 05510000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_6_2_5510000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 2l$2l$2l
                                                                                                  • API String ID: 0-1498361692
                                                                                                  • Opcode ID: 1199466c6b1fba94917a7614ff6beb3a3effc4e8d614b74f041b02d43e9a4d2e
                                                                                                  • Instruction ID: 720def39d0610f0f1536f58dfc723fe102b21338342938ee70c92ff930aa5185
                                                                                                  • Opcode Fuzzy Hash: 1199466c6b1fba94917a7614ff6beb3a3effc4e8d614b74f041b02d43e9a4d2e
                                                                                                  • Instruction Fuzzy Hash: 27510334B001118BDB18AB7580196BE36DBAFC9304B455669E806DB3E0DF39DD4A9BF2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 99 55103bd-5510418 107 551041a 99->107 108 551041f-5510434 99->108 107->108 110 5510436-5510460 108->110 111 551046b-5510523 108->111 110->111 130 5510570-5510587 111->130 131 5510525-5510569 111->131 132 5510880 130->132 133 551058d-55105bf 130->133 131->130 133->132
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000006.00000002.1936443779.0000000005510000.00000040.00000800.00020000.00000000.sdmp, Offset: 05510000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_6_2_5510000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 2l$2l$2l
                                                                                                  • API String ID: 0-1498361692
                                                                                                  • Opcode ID: d299d6a236d26605cfd6293d11550f81adc864e86d55f2cfab8383b5879233fa
                                                                                                  • Instruction ID: da52e753eb33b9ff26d0ea993e8484368c0d06544a2b343b9f21a7b0aca91736
                                                                                                  • Opcode Fuzzy Hash: d299d6a236d26605cfd6293d11550f81adc864e86d55f2cfab8383b5879233fa
                                                                                                  • Instruction Fuzzy Hash: 53412434B001118BDB08AB7580193BE36D7AFD9208B055669D406DB7D0DF28DD4AA7F3
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 144 2c1a612-2c1a695 148 2c1a697 144->148 149 2c1a69a-2c1a6a3 144->149 148->149 150 2c1a6a5 149->150 151 2c1a6a8-2c1a6b1 149->151 150->151 152 2c1a6b3-2c1a6d7 CreateMutexW 151->152 153 2c1a702-2c1a707 151->153 156 2c1a709-2c1a70e 152->156 157 2c1a6d9-2c1a6ff 152->157 153->152 156->157
                                                                                                  APIs
                                                                                                  • CreateMutexW.KERNELBASE(?,?), ref: 02C1A6B9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000006.00000002.1936119158.0000000002C1A000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C1A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_6_2_2c1a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateMutex
                                                                                                  • String ID:
                                                                                                  • API String ID: 1964310414-0
                                                                                                  • Opcode ID: 84571ea4f111e1a35668d50733a108747d8d84ab1cbf76270e7c988678906ff7
                                                                                                  • Instruction ID: 12ff3aacef350f3a84461e3b362291fa380dfc92b2ac3a79401ae59a3ef4dae0
                                                                                                  • Opcode Fuzzy Hash: 84571ea4f111e1a35668d50733a108747d8d84ab1cbf76270e7c988678906ff7
                                                                                                  • Instruction Fuzzy Hash: 6431B3715093805FE712CB65CD95B96BFF8EF06214F08849AE984CF292D375E909C771
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 160 2c1a361-2c1a3cf 163 2c1a3d1 160->163 164 2c1a3d4-2c1a3dd 160->164 163->164 165 2c1a3e2-2c1a3e8 164->165 166 2c1a3df 164->166 167 2c1a3ea 165->167 168 2c1a3ed-2c1a404 165->168 166->165 167->168 170 2c1a406-2c1a419 RegQueryValueExW 168->170 171 2c1a43b-2c1a440 168->171 172 2c1a442-2c1a447 170->172 173 2c1a41b-2c1a438 170->173 171->170 172->173
                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E24,86EA90AE,00000000,00000000,00000000,00000000), ref: 02C1A40C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000006.00000002.1936119158.0000000002C1A000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C1A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_6_2_2c1a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: 96d63eccd118359266c8fc58d9aecf224bda7ff06dbeb23931e28e5768e90481
                                                                                                  • Instruction ID: d0d5a1296908e13835d63569f3335a016c3f9cabede22003bb40e2cc8c8c9519
                                                                                                  • Opcode Fuzzy Hash: 96d63eccd118359266c8fc58d9aecf224bda7ff06dbeb23931e28e5768e90481
                                                                                                  • Instruction Fuzzy Hash: 5231A575505740AFD721CF15CC85F92BBF8EF46214F08849AE945CB292D324E949CB71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 177 2c1a462-2c1a4c3 180 2c1a4c5 177->180 181 2c1a4c8-2c1a4d4 177->181 180->181 182 2c1a4d6 181->182 183 2c1a4d9-2c1a4f0 181->183 182->183 185 2c1a4f2-2c1a505 RegSetValueExW 183->185 186 2c1a527-2c1a52c 183->186 187 2c1a507-2c1a524 185->187 188 2c1a52e-2c1a533 185->188 186->185 188->187
                                                                                                  APIs
                                                                                                  • RegSetValueExW.KERNELBASE(?,00000E24,86EA90AE,00000000,00000000,00000000,00000000), ref: 02C1A4F8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000006.00000002.1936119158.0000000002C1A000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C1A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_6_2_2c1a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value
                                                                                                  • String ID:
                                                                                                  • API String ID: 3702945584-0
                                                                                                  • Opcode ID: ae50844fabb15e55bb3ce24c2724e3accb2b1192fee2d25d9dd1215a0f7ee0cf
                                                                                                  • Instruction ID: 8af41f4282515f3c8dfb89e5528fc040db9031183c3df83ffa5cbf2c37104f10
                                                                                                  • Opcode Fuzzy Hash: ae50844fabb15e55bb3ce24c2724e3accb2b1192fee2d25d9dd1215a0f7ee0cf
                                                                                                  • Instruction Fuzzy Hash: C621C472509780AFD7228F11CC45FA3BFB8EF46210F08849AE985CB652D364E548C771
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 192 2c1a646-2c1a695 195 2c1a697 192->195 196 2c1a69a-2c1a6a3 192->196 195->196 197 2c1a6a5 196->197 198 2c1a6a8-2c1a6b1 196->198 197->198 199 2c1a6b3-2c1a6bb CreateMutexW 198->199 200 2c1a702-2c1a707 198->200 202 2c1a6c1-2c1a6d7 199->202 200->199 203 2c1a709-2c1a70e 202->203 204 2c1a6d9-2c1a6ff 202->204 203->204
                                                                                                  APIs
                                                                                                  • CreateMutexW.KERNELBASE(?,?), ref: 02C1A6B9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000006.00000002.1936119158.0000000002C1A000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C1A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_6_2_2c1a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateMutex
                                                                                                  • String ID:
                                                                                                  • API String ID: 1964310414-0
                                                                                                  • Opcode ID: 14cdeb67fb183957df57046a2d862071f070c55bda44272c1e7ee46d33e4588a
                                                                                                  • Instruction ID: f07a6596511e264686f569cd88e4ce2b1d04a6f39bdfa0e6031f52127f4cafdb
                                                                                                  • Opcode Fuzzy Hash: 14cdeb67fb183957df57046a2d862071f070c55bda44272c1e7ee46d33e4588a
                                                                                                  • Instruction Fuzzy Hash: 3821A4716012409FE720CF66CD86BA6FBE8EF05214F048469ED49CF741D775E909CAB6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 207 2c1a392-2c1a3cf 209 2c1a3d1 207->209 210 2c1a3d4-2c1a3dd 207->210 209->210 211 2c1a3e2-2c1a3e8 210->211 212 2c1a3df 210->212 213 2c1a3ea 211->213 214 2c1a3ed-2c1a404 211->214 212->211 213->214 216 2c1a406-2c1a419 RegQueryValueExW 214->216 217 2c1a43b-2c1a440 214->217 218 2c1a442-2c1a447 216->218 219 2c1a41b-2c1a438 216->219 217->216 218->219
                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E24,86EA90AE,00000000,00000000,00000000,00000000), ref: 02C1A40C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000006.00000002.1936119158.0000000002C1A000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C1A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_6_2_2c1a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: b0b99626ffb7e57119300db6033faaf67711b400045987b8ba324aeba298b25d
                                                                                                  • Instruction ID: 37279f8d984aaccea95c1a0b3ae1dc0cc96d9785a2b32df21067d58354062153
                                                                                                  • Opcode Fuzzy Hash: b0b99626ffb7e57119300db6033faaf67711b400045987b8ba324aeba298b25d
                                                                                                  • Instruction Fuzzy Hash: 8C21D275601204AFE720CF15CC86FA2F7ECEF45614F08845AED49CB651D370E948DAB2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 223 2c1a486-2c1a4c3 225 2c1a4c5 223->225 226 2c1a4c8-2c1a4d4 223->226 225->226 227 2c1a4d6 226->227 228 2c1a4d9-2c1a4f0 226->228 227->228 230 2c1a4f2-2c1a505 RegSetValueExW 228->230 231 2c1a527-2c1a52c 228->231 232 2c1a507-2c1a524 230->232 233 2c1a52e-2c1a533 230->233 231->230 233->232
                                                                                                  APIs
                                                                                                  • RegSetValueExW.KERNELBASE(?,00000E24,86EA90AE,00000000,00000000,00000000,00000000), ref: 02C1A4F8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000006.00000002.1936119158.0000000002C1A000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C1A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_6_2_2c1a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value
                                                                                                  • String ID:
                                                                                                  • API String ID: 3702945584-0
                                                                                                  • Opcode ID: 551053f3ece3feccb07471e00730ffff5bb068d1116d26ea60fe2bf222186ff8
                                                                                                  • Instruction ID: 7c7d0a6f1200fbfe0d3ba2970437a736681a0f39643f69719471aee045e7c8bb
                                                                                                  • Opcode Fuzzy Hash: 551053f3ece3feccb07471e00730ffff5bb068d1116d26ea60fe2bf222186ff8
                                                                                                  • Instruction Fuzzy Hash: 7311D376600600AFE7218E15CD46FA7FBECEF55614F08845AED45CA641D370E548DAB2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 237 5510080-55100ad 240 55100b8-55102f9 237->240
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000006.00000002.1936443779.0000000005510000.00000040.00000800.00020000.00000000.sdmp, Offset: 05510000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_6_2_5510000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: cd560da50873d27fafa85c290fa6071498df85ef216a550d9ab70c3a5406a1b2
                                                                                                  • Instruction ID: 932d169f52b570bb60f6aee07cd6b9445d2500619ba628b35e510030f0e5a8ad
                                                                                                  • Opcode Fuzzy Hash: cd560da50873d27fafa85c290fa6071498df85ef216a550d9ab70c3a5406a1b2
                                                                                                  • Instruction Fuzzy Hash: A75178346115458FC704DB34E5489EA77F6FBE9348B40A6A9E0044B269DF3C7C5ECB92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 278 2e01047-2e01088 280 2e0108e-2e010ab 278->280
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000006.00000002.1936289073.0000000002E01000.00000040.00000020.00020000.00000000.sdmp, Offset: 02E01000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_6_2_2e01000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2a9bab9eacdedb0c35a974a18a4c199126993bef9b1f29f3d2b656b2574bce0c
                                                                                                  • Instruction ID: 3f328b74ac749564e547c459bbfae6d6a9ba906a5aebd0b184f1b778c1a522c1
                                                                                                  • Opcode Fuzzy Hash: 2a9bab9eacdedb0c35a974a18a4c199126993bef9b1f29f3d2b656b2574bce0c
                                                                                                  • Instruction Fuzzy Hash: CF01A2755497805FC3118B16AC50893BFF8EF8723070985ABEC498B662D229B919CB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 281 2e0106e-2e01088 282 2e0108e-2e010ab 281->282
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000006.00000002.1936289073.0000000002E01000.00000040.00000020.00020000.00000000.sdmp, Offset: 02E01000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_6_2_2e01000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d9d1da815f1ca084c676ca1b0666de16a5da2c1a1aea5eefb89fdcfafd9ad67e
                                                                                                  • Instruction ID: dd4ac05f95676a9e10725691d13c11b53182e41ac9e54b58a1a509cd6b73f87d
                                                                                                  • Opcode Fuzzy Hash: d9d1da815f1ca084c676ca1b0666de16a5da2c1a1aea5eefb89fdcfafd9ad67e
                                                                                                  • Instruction Fuzzy Hash: B7E092B66046048B9750CF0AEC81452F7D8EB84630708C07FDC0D8BB01E276F508CAA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 283 2c123f4-2c123ff 284 2c12401-2c1240e 283->284 285 2c12412-2c12417 283->285 284->285 286 2c12419 285->286 287 2c1241a 285->287 288 2c12420-2c12421 287->288
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000006.00000002.1936106626.0000000002C12000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C12000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_6_2_2c12000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7c082b876c8bd593cd31225d9b5bb2d220112643700134b0f4fc60c29df4f5db
                                                                                                  • Instruction ID: 34424e53ae37fe5a086b8c403bac2389f49e8705cef8b1aaad6de1526604f0d0
                                                                                                  • Opcode Fuzzy Hash: 7c082b876c8bd593cd31225d9b5bb2d220112643700134b0f4fc60c29df4f5db
                                                                                                  • Instruction Fuzzy Hash: 19D05EB92056D14FD3169A1CC1A6B9537D8ABA2718F4A44F9AC008B763C768E681E601
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 289 2c123bc-2c123c3 290 2c123c5-2c123d2 289->290 291 2c123d6-2c123db 289->291 290->291 292 2c123e1 291->292 293 2c123dd-2c123e0 291->293 294 2c123e7-2c123e8 292->294
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000006.00000002.1936106626.0000000002C12000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C12000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_6_2_2c12000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2c596792ef55bd80078ea1c8a48c00ebc4db1cd0cb411c62f6cac056b7997666
                                                                                                  • Instruction ID: 9fdbb4125c0e7176e3f1c46d28d9374d408971478ace2366ddb60cbf892c18f4
                                                                                                  • Opcode Fuzzy Hash: 2c596792ef55bd80078ea1c8a48c00ebc4db1cd0cb411c62f6cac056b7997666
                                                                                                  • Instruction Fuzzy Hash: EFD05E382002814FC715DA0CC6D5F9937D8AB91B18F5A44E8AC108B762C7A4D9C1EA01
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 295 551006a-551006b 297 5510070 call 2e01047 295->297 298 5510070 call 5510319 295->298 299 5510070 call 5510368 295->299 300 5510070 call 55103bd 295->300 301 5510070 call 2e0106e 295->301 296 5510076 297->296 298->296 299->296 300->296 301->296
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000006.00000002.1936443779.0000000005510000.00000040.00000800.00020000.00000000.sdmp, Offset: 05510000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_6_2_5510000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a39e48f18ad849e3ce88d3df09c8252815fc3a6b826e19e5620f6555318e2dac
                                                                                                  • Instruction ID: 148f7cf6094a581eba774c861599d87624cb484585e4745132068379af038669
                                                                                                  • Opcode Fuzzy Hash: a39e48f18ad849e3ce88d3df09c8252815fc3a6b826e19e5620f6555318e2dac
                                                                                                  • Instruction Fuzzy Hash: D59002A1C90094C78D109694A90974E3728AA8061132746D59105C3900DE2CA0198571
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:11.5%
                                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                                  Signature Coverage:0%
                                                                                                  Total number of Nodes:19
                                                                                                  Total number of Limit Nodes:1
                                                                                                  execution_graph 568 2a4a646 570 2a4a67e CreateMutexW 568->570 571 2a4a6c1 570->571 588 2a4a710 589 2a4a74e FindCloseChangeNotification 588->589 591 2a4a788 589->591 580 2a4a361 582 2a4a392 RegQueryValueExW 580->582 583 2a4a41b 582->583 584 2a4a462 585 2a4a486 RegSetValueExW 584->585 587 2a4a507 585->587 592 2a4a612 593 2a4a646 CreateMutexW 592->593 595 2a4a6c1 593->595 576 2a4a74e 577 2a4a7b9 576->577 578 2a4a77a FindCloseChangeNotification 576->578 577->578 579 2a4a788 578->579

                                                                                                  Callgraph

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 0 5480310-5480334 2 548033e-5480346 0->2 3 5480336-5480338 0->3 4 5480348-548034d 2->4 5 548034e-5480391 2->5 3->2 8 54803d8-54803ff 5->8 9 5480393-54803bb 5->9 15 548040a-5480418 8->15 14 54803ce 9->14 14->8 16 548041a 15->16 17 548041f-5480434 15->17 16->17 19 548046b-5480523 17->19 20 5480436-5480460 17->20 39 5480570-5480587 19->39 40 5480525-5480569 19->40 20->19 41 548058d-54805bf 39->41 42 5480880 39->42 40->39 41->42
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.2021884021.0000000005480000.00000040.00000800.00020000.00000000.sdmp, Offset: 05480000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_5480000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 2l$2l$2l
                                                                                                  • API String ID: 0-1498361692
                                                                                                  • Opcode ID: 018e278f648425db81a874b1571e0c07508141a7bd56a4446f620c94cf11a0c4
                                                                                                  • Instruction ID: 48d6c952df1c63efd094442a2e82bb12f317218ca39e4b20f738204a8f9eeb27
                                                                                                  • Opcode Fuzzy Hash: 018e278f648425db81a874b1571e0c07508141a7bd56a4446f620c94cf11a0c4
                                                                                                  • Instruction Fuzzy Hash: 505102307002118FDB18EB7994196BF76E7AFD5304B0444AAE406DB7D5DF79DC0A8BA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 53 54803bd-5480418 61 548041a 53->61 62 548041f-5480434 53->62 61->62 64 548046b-5480523 62->64 65 5480436-5480460 62->65 84 5480570-5480587 64->84 85 5480525-5480569 64->85 65->64 86 548058d-54805bf 84->86 87 5480880 84->87 85->84 86->87
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.2021884021.0000000005480000.00000040.00000800.00020000.00000000.sdmp, Offset: 05480000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_5480000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 2l$2l$2l
                                                                                                  • API String ID: 0-1498361692
                                                                                                  • Opcode ID: a0366772c2daa13746eecce9a4dbf0c368ae2b5052fe3dff6d497c33417c28f4
                                                                                                  • Instruction ID: d5d9eb1cba9d1f4024601c87b37c3179f3f1b18bfd66f82e7411b20679717778
                                                                                                  • Opcode Fuzzy Hash: a0366772c2daa13746eecce9a4dbf0c368ae2b5052fe3dff6d497c33417c28f4
                                                                                                  • Instruction Fuzzy Hash: E341F230B402218B8B18BB7990187BE72D79FD564870844AEE406DB7D5DF79CD0A9BE3
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 98 2a4a612-2a4a695 102 2a4a697 98->102 103 2a4a69a-2a4a6a3 98->103 102->103 104 2a4a6a5 103->104 105 2a4a6a8-2a4a6b1 103->105 104->105 106 2a4a702-2a4a707 105->106 107 2a4a6b3-2a4a6d7 CreateMutexW 105->107 106->107 110 2a4a709-2a4a70e 107->110 111 2a4a6d9-2a4a6ff 107->111 110->111
                                                                                                  APIs
                                                                                                  • CreateMutexW.KERNELBASE(?,?), ref: 02A4A6B9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.2021378519.0000000002A4A000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A4A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_2a4a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateMutex
                                                                                                  • String ID:
                                                                                                  • API String ID: 1964310414-0
                                                                                                  • Opcode ID: ee9cd00830e39109986de3c6c6a3ef98003aded2daa8f7733ef1143cb83d2bb4
                                                                                                  • Instruction ID: 9ca66e661ee9ec2b800da3d5501dd4188796d6975072b5006a6f69a51ab6477e
                                                                                                  • Opcode Fuzzy Hash: ee9cd00830e39109986de3c6c6a3ef98003aded2daa8f7733ef1143cb83d2bb4
                                                                                                  • Instruction Fuzzy Hash: 8231B0715093806FE711CB25CC95B96BFF8EF06210F08849AE988CF293D764E909C761
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 114 2a4a361-2a4a3cf 117 2a4a3d4-2a4a3dd 114->117 118 2a4a3d1 114->118 119 2a4a3e2-2a4a3e8 117->119 120 2a4a3df 117->120 118->117 121 2a4a3ed-2a4a404 119->121 122 2a4a3ea 119->122 120->119 124 2a4a406-2a4a419 RegQueryValueExW 121->124 125 2a4a43b-2a4a440 121->125 122->121 126 2a4a442-2a4a447 124->126 127 2a4a41b-2a4a438 124->127 125->124 126->127
                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E24,B6D09D9A,00000000,00000000,00000000,00000000), ref: 02A4A40C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.2021378519.0000000002A4A000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A4A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_2a4a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: 5ab722dfafe1cf08dc170f467312c13b26d170f5cee8c1fad4faabc532aa5fff
                                                                                                  • Instruction ID: 027d7f77700f00bf2d2d7fbdf90dc29658d267e14096707745e804601c03149d
                                                                                                  • Opcode Fuzzy Hash: 5ab722dfafe1cf08dc170f467312c13b26d170f5cee8c1fad4faabc532aa5fff
                                                                                                  • Instruction Fuzzy Hash: 4A31BF75505780AFE722CF15CC94F92BBF8EF46214F08849AE985CB293D724E948CB71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 131 2a4a462-2a4a4c3 134 2a4a4c5 131->134 135 2a4a4c8-2a4a4d4 131->135 134->135 136 2a4a4d6 135->136 137 2a4a4d9-2a4a4f0 135->137 136->137 139 2a4a527-2a4a52c 137->139 140 2a4a4f2-2a4a505 RegSetValueExW 137->140 139->140 141 2a4a507-2a4a524 140->141 142 2a4a52e-2a4a533 140->142 142->141
                                                                                                  APIs
                                                                                                  • RegSetValueExW.KERNELBASE(?,00000E24,B6D09D9A,00000000,00000000,00000000,00000000), ref: 02A4A4F8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.2021378519.0000000002A4A000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A4A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_2a4a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value
                                                                                                  • String ID:
                                                                                                  • API String ID: 3702945584-0
                                                                                                  • Opcode ID: a908f78c882ce3d614b1fea893b0cf24108b668e4b7ef0ebb85c951f0247ec44
                                                                                                  • Instruction ID: abc3a0d11ba7970e8400f852ff3ebac3c2a096a3d059576c6786f612c3530b44
                                                                                                  • Opcode Fuzzy Hash: a908f78c882ce3d614b1fea893b0cf24108b668e4b7ef0ebb85c951f0247ec44
                                                                                                  • Instruction Fuzzy Hash: 4221C4725443806FD7228F11CC94FA7BFB8EF46210F08849AE985CB652C764E448CB71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 146 2a4a646-2a4a695 149 2a4a697 146->149 150 2a4a69a-2a4a6a3 146->150 149->150 151 2a4a6a5 150->151 152 2a4a6a8-2a4a6b1 150->152 151->152 153 2a4a702-2a4a707 152->153 154 2a4a6b3-2a4a6bb CreateMutexW 152->154 153->154 156 2a4a6c1-2a4a6d7 154->156 157 2a4a709-2a4a70e 156->157 158 2a4a6d9-2a4a6ff 156->158 157->158
                                                                                                  APIs
                                                                                                  • CreateMutexW.KERNELBASE(?,?), ref: 02A4A6B9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.2021378519.0000000002A4A000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A4A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_2a4a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateMutex
                                                                                                  • String ID:
                                                                                                  • API String ID: 1964310414-0
                                                                                                  • Opcode ID: 4da6cd0197a6008b89661cf4c73c3d0d943ac31be1b674ab7fd5acfb2e04c614
                                                                                                  • Instruction ID: 8e4c282787b439fd5cb4912d8446cf35fe04196d406c8e5c5da4d20226169938
                                                                                                  • Opcode Fuzzy Hash: 4da6cd0197a6008b89661cf4c73c3d0d943ac31be1b674ab7fd5acfb2e04c614
                                                                                                  • Instruction Fuzzy Hash: B721CF71600200AFE720CF65CD95BA6FBE8EF45224F04846AED48CF742DB75E908CA72
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 161 2a4a710-2a4a778 163 2a4a7b9-2a4a7be 161->163 164 2a4a77a-2a4a782 FindCloseChangeNotification 161->164 163->164 166 2a4a788-2a4a79a 164->166 167 2a4a7c0-2a4a7c5 166->167 168 2a4a79c-2a4a7b8 166->168 167->168
                                                                                                  APIs
                                                                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 02A4A780
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.2021378519.0000000002A4A000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A4A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_2a4a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ChangeCloseFindNotification
                                                                                                  • String ID:
                                                                                                  • API String ID: 2591292051-0
                                                                                                  • Opcode ID: c685cf7a3be85b15c03c69153cece23d09064389d293f557ef4b510d494cb83d
                                                                                                  • Instruction ID: e069d93d24eba4a48356da5b1a745ffd0afbb6280cbbb6967d945224ba4a7417
                                                                                                  • Opcode Fuzzy Hash: c685cf7a3be85b15c03c69153cece23d09064389d293f557ef4b510d494cb83d
                                                                                                  • Instruction Fuzzy Hash: A42105B55093809FDB128F25DC95792BFB4EF43220F0880EBDD858F653D2359909CBA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 170 2a4a392-2a4a3cf 172 2a4a3d4-2a4a3dd 170->172 173 2a4a3d1 170->173 174 2a4a3e2-2a4a3e8 172->174 175 2a4a3df 172->175 173->172 176 2a4a3ed-2a4a404 174->176 177 2a4a3ea 174->177 175->174 179 2a4a406-2a4a419 RegQueryValueExW 176->179 180 2a4a43b-2a4a440 176->180 177->176 181 2a4a442-2a4a447 179->181 182 2a4a41b-2a4a438 179->182 180->179 181->182
                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E24,B6D09D9A,00000000,00000000,00000000,00000000), ref: 02A4A40C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.2021378519.0000000002A4A000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A4A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_2a4a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: f20a5d6868df35eeda972a4d26e4eb723bc8158f2f455472ef6e438a091069da
                                                                                                  • Instruction ID: 6e6296ac7fb13b1d95c1512b413c300ff43ef5728a5974427693d9815d022911
                                                                                                  • Opcode Fuzzy Hash: f20a5d6868df35eeda972a4d26e4eb723bc8158f2f455472ef6e438a091069da
                                                                                                  • Instruction Fuzzy Hash: 4C218E75640604AFE720CF15CC84FA6B7ECEF54614F08845AED46CB652DB60E949CA72
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 186 2a4a486-2a4a4c3 188 2a4a4c5 186->188 189 2a4a4c8-2a4a4d4 186->189 188->189 190 2a4a4d6 189->190 191 2a4a4d9-2a4a4f0 189->191 190->191 193 2a4a527-2a4a52c 191->193 194 2a4a4f2-2a4a505 RegSetValueExW 191->194 193->194 195 2a4a507-2a4a524 194->195 196 2a4a52e-2a4a533 194->196 196->195
                                                                                                  APIs
                                                                                                  • RegSetValueExW.KERNELBASE(?,00000E24,B6D09D9A,00000000,00000000,00000000,00000000), ref: 02A4A4F8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.2021378519.0000000002A4A000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A4A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_2a4a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value
                                                                                                  • String ID:
                                                                                                  • API String ID: 3702945584-0
                                                                                                  • Opcode ID: 46dcb0196e6d8d4bd8ab94dc8c4a4dae21c6564c0c2bc3d5666c2ef82777d585
                                                                                                  • Instruction ID: c32bacd72385c6f4582b824a93198a35acb76a93413c92195f84021ddf12a574
                                                                                                  • Opcode Fuzzy Hash: 46dcb0196e6d8d4bd8ab94dc8c4a4dae21c6564c0c2bc3d5666c2ef82777d585
                                                                                                  • Instruction Fuzzy Hash: 2A11D3B2640600AFE7208F15CD85FA7FBECEF44614F08845AED49CB642DB70E548CAB2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 200 2a4a74e-2a4a778 201 2a4a7b9-2a4a7be 200->201 202 2a4a77a-2a4a782 FindCloseChangeNotification 200->202 201->202 204 2a4a788-2a4a79a 202->204 205 2a4a7c0-2a4a7c5 204->205 206 2a4a79c-2a4a7b8 204->206 205->206
                                                                                                  APIs
                                                                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 02A4A780
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.2021378519.0000000002A4A000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A4A000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_2a4a000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ChangeCloseFindNotification
                                                                                                  • String ID:
                                                                                                  • API String ID: 2591292051-0
                                                                                                  • Opcode ID: ed9eda30427010f377f43baa00ff87d0b91a3469d3ffe6bae26d3405ccfedc6b
                                                                                                  • Instruction ID: 1223c836ef536ae776541490d2c22e424c51a31fa27cb31ca3592e64a8766dbe
                                                                                                  • Opcode Fuzzy Hash: ed9eda30427010f377f43baa00ff87d0b91a3469d3ffe6bae26d3405ccfedc6b
                                                                                                  • Instruction Fuzzy Hash: 0E01BC75A40200DFEB208F25D895B66FBA4EF45220F08C4AADD49CB642DA75E408CAA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 208 5480006-54800ad 211 54800b8-54802f9 208->211
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.2021884021.0000000005480000.00000040.00000800.00020000.00000000.sdmp, Offset: 05480000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_5480000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6697b831ed6785b049b50229e12230c069916e2107ce70834e1a7145c686de70
                                                                                                  • Instruction ID: d7d14c666908e4b73f208a094815e5dc7d2737b99890baaf2b34dc5f9882b38d
                                                                                                  • Opcode Fuzzy Hash: 6697b831ed6785b049b50229e12230c069916e2107ce70834e1a7145c686de70
                                                                                                  • Instruction Fuzzy Hash: 3771803070A3858FC705DB78F55959E7BB1EFB220870584AED0448B2A7DF789C1ACB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 249 2c01048-2c0106b 250 2c0106e-2c01088 249->250 251 2c0108e-2c010ab 250->251
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.2021589264.0000000002C01000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C01000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_2c01000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f726f89b8c24fcfd6ecbb8db320755164cd60a476e9a053b7281b05b18deca85
                                                                                                  • Instruction ID: 09269d6a87f8e92a2a0a3535505d66caaf148a7ef01951bd26819776e78ab501
                                                                                                  • Opcode Fuzzy Hash: f726f89b8c24fcfd6ecbb8db320755164cd60a476e9a053b7281b05b18deca85
                                                                                                  • Instruction Fuzzy Hash: 030167765497805FD7118B159C40862FFB8EF86520709C49BE8498B652D165A809C772
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 252 2c0106e-2c01088 253 2c0108e-2c010ab 252->253
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.2021589264.0000000002C01000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C01000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_2c01000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 87257cb15d96427ead63e896a93ee603033d414785aa31e7aabcb4cd5cb22ac6
                                                                                                  • Instruction ID: da68a024787472502abf7e076712aa069895a69045d347aefc74d983eed0e5ff
                                                                                                  • Opcode Fuzzy Hash: 87257cb15d96427ead63e896a93ee603033d414785aa31e7aabcb4cd5cb22ac6
                                                                                                  • Instruction Fuzzy Hash: 05E092B66406005B9750DF0AEC41452F7D8EB84630708C07FDC0D8BB01D275F508CAA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 254 2a423f4-2a423ff 255 2a42401-2a4240e 254->255 256 2a42412-2a42417 254->256 255->256 257 2a42419 256->257 258 2a4241a 256->258 259 2a42420-2a42421 258->259
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.2021365357.0000000002A42000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A42000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_2a42000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 635d181c98b11135bb5610f7794a4cc39b16f1d98bbe0a7a5fc2b4b065d1a4dc
                                                                                                  • Instruction ID: 7797deff7d3d80eb27abf23fef0f514d8f95b653400a64b29fb5a82f61b9745d
                                                                                                  • Opcode Fuzzy Hash: 635d181c98b11135bb5610f7794a4cc39b16f1d98bbe0a7a5fc2b4b065d1a4dc
                                                                                                  • Instruction Fuzzy Hash: 88D05E792456C14FD3169B1CC1A8BA537D8ABA1718F8A44F9AC008BBA3CF68D581D600
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 260 2a423bc-2a423c3 261 2a423c5-2a423d2 260->261 262 2a423d6-2a423db 260->262 261->262 263 2a423e1 262->263 264 2a423dd-2a423e0 262->264 265 2a423e7-2a423e8 263->265
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.2021365357.0000000002A42000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A42000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_2a42000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c7c043e4691f9f87293fe537929372c35c3b9b1d9df39096814b85bacbfa2df3
                                                                                                  • Instruction ID: 4f94e2c7ef991ff6afba110ff31f9923534d69a43fc33a62ae90dce62990e8a5
                                                                                                  • Opcode Fuzzy Hash: c7c043e4691f9f87293fe537929372c35c3b9b1d9df39096814b85bacbfa2df3
                                                                                                  • Instruction Fuzzy Hash: F6D05E342002814BD715DB0CC6D4F5937E8AB90B18F1A44E8BC108B762CBA4E8C1CA00
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:18.4%
                                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                                  Signature Coverage:0%
                                                                                                  Total number of Nodes:19
                                                                                                  Total number of Limit Nodes:1
                                                                                                  execution_graph 577 29aa74e 578 29aa77a FindCloseChangeNotification 577->578 579 29aa7b9 577->579 580 29aa788 578->580 579->578 593 29aa612 595 29aa646 CreateMutexW 593->595 596 29aa6c1 595->596 601 29aa462 602 29aa486 RegSetValueExW 601->602 604 29aa507 602->604 597 29aa710 599 29aa74e FindCloseChangeNotification 597->599 600 29aa788 599->600 605 29aa361 606 29aa392 RegQueryValueExW 605->606 608 29aa41b 606->608 589 29aa646 591 29aa67e CreateMutexW 589->591 592 29aa6c1 591->592

                                                                                                  Callgraph

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 0 53e0310-53e0334 2 53e033e-53e0346 0->2 3 53e0336-53e0338 0->3 4 53e034e-53e0391 2->4 5 53e0348-53e034d 2->5 3->2 8 53e03d8-53e0418 4->8 9 53e0393-53e03ce 4->9 16 53e041f-53e0434 8->16 17 53e041a 8->17 9->8 19 53e046b-53e0523 16->19 20 53e0436-53e0460 16->20 17->16 39 53e0525-53e0569 19->39 40 53e0570-53e0587 19->40 20->19 39->40 41 53e058d-53e05bf 40->41 42 53e0880 40->42 41->42
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000A.00000002.2103657243.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_10_2_53e0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: [$-[$2l$2l$2l$=[
                                                                                                  • API String ID: 0-1850338162
                                                                                                  • Opcode ID: 712b31b4a60f1708e8361397ccbc9cfab871f75a99a3d869fde80eaa0ba0321a
                                                                                                  • Instruction ID: 2ad3e2cd3050359867266b1226ccc8572cdaa00183d178aaa358ef0ea0de9ae7
                                                                                                  • Opcode Fuzzy Hash: 712b31b4a60f1708e8361397ccbc9cfab871f75a99a3d869fde80eaa0ba0321a
                                                                                                  • Instruction Fuzzy Hash: A2513230B042119FC709DB7AC8556BE3BE7AFC5204B0445AAD406DB3D1CF79DC4A8BA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 53 53e03bd-53e0418 61 53e041f-53e0434 53->61 62 53e041a 53->62 64 53e046b-53e0523 61->64 65 53e0436-53e0460 61->65 62->61 84 53e0525-53e0569 64->84 85 53e0570-53e0587 64->85 65->64 84->85 86 53e058d-53e05bf 85->86 87 53e0880 85->87 86->87
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000A.00000002.2103657243.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_10_2_53e0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: [$-[$2l$2l$2l$=[
                                                                                                  • API String ID: 0-1850338162
                                                                                                  • Opcode ID: fe523472d49d64e636ede0fadfc34a61ea38b93b34a6f85bb360347babb4f0ce
                                                                                                  • Instruction ID: ac98f51f035688cf41f35862aae79dc5139c4f022df96fd15ef294381ea6545a
                                                                                                  • Opcode Fuzzy Hash: fe523472d49d64e636ede0fadfc34a61ea38b93b34a6f85bb360347babb4f0ce
                                                                                                  • Instruction Fuzzy Hash: 77410030B042258BCB09EB7A84297BE36D79FD5608748446AD406DB7D1DF78CC4A8BE3
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 98 29aa612-29aa695 102 29aa69a-29aa6a3 98->102 103 29aa697 98->103 104 29aa6a8-29aa6b1 102->104 105 29aa6a5 102->105 103->102 106 29aa702-29aa707 104->106 107 29aa6b3-29aa6d7 CreateMutexW 104->107 105->104 106->107 110 29aa709-29aa70e 107->110 111 29aa6d9-29aa6ff 107->111 110->111
                                                                                                  APIs
                                                                                                  • CreateMutexW.KERNELBASE(?,?), ref: 029AA6B9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000A.00000002.2103265703.00000000029AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029AA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_10_2_29aa000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateMutex
                                                                                                  • String ID:
                                                                                                  • API String ID: 1964310414-0
                                                                                                  • Opcode ID: 6f1f73bf516bb164b3a0456d8058ed685ca7aebad0490d4e904f8dd311e174eb
                                                                                                  • Instruction ID: 7b69edac15005a9a80f04af9197a0f12325bca426b3030d0bdce993345de61b6
                                                                                                  • Opcode Fuzzy Hash: 6f1f73bf516bb164b3a0456d8058ed685ca7aebad0490d4e904f8dd311e174eb
                                                                                                  • Instruction Fuzzy Hash: 643193755093805FE711CB65CC95B96BFF8EF06214F08849AE984CF292D375E909CB71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 114 29aa361-29aa3cf 117 29aa3d1 114->117 118 29aa3d4-29aa3dd 114->118 117->118 119 29aa3df 118->119 120 29aa3e2-29aa3e8 118->120 119->120 121 29aa3ea 120->121 122 29aa3ed-29aa404 120->122 121->122 124 29aa43b-29aa440 122->124 125 29aa406-29aa419 RegQueryValueExW 122->125 124->125 126 29aa41b-29aa438 125->126 127 29aa442-29aa447 125->127 127->126
                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E24,8308BC47,00000000,00000000,00000000,00000000), ref: 029AA40C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000A.00000002.2103265703.00000000029AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029AA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_10_2_29aa000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: 12275f409252d1546dc1d9696645842ccfc638bf27235126afe3b64eb771cd1c
                                                                                                  • Instruction ID: 6b27242b23ba567ffb3f685b3efce0971e6f73a9c1d80336cb4831bed059faea
                                                                                                  • Opcode Fuzzy Hash: 12275f409252d1546dc1d9696645842ccfc638bf27235126afe3b64eb771cd1c
                                                                                                  • Instruction Fuzzy Hash: 47317375505744AFD722CF15CC94F92BBFCEF06614F08849AE985CB292D324E949CBB1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 131 29aa462-29aa4c3 134 29aa4c8-29aa4d4 131->134 135 29aa4c5 131->135 136 29aa4d9-29aa4f0 134->136 137 29aa4d6 134->137 135->134 139 29aa4f2-29aa505 RegSetValueExW 136->139 140 29aa527-29aa52c 136->140 137->136 141 29aa52e-29aa533 139->141 142 29aa507-29aa524 139->142 140->139 141->142
                                                                                                  APIs
                                                                                                  • RegSetValueExW.KERNELBASE(?,00000E24,8308BC47,00000000,00000000,00000000,00000000), ref: 029AA4F8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000A.00000002.2103265703.00000000029AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029AA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_10_2_29aa000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value
                                                                                                  • String ID:
                                                                                                  • API String ID: 3702945584-0
                                                                                                  • Opcode ID: 92856508add691d054002ded6a6000d4bbe8b804a487c86aefc71baa23e67c99
                                                                                                  • Instruction ID: 96a2a95b61991756e0741a9900ead8519a9c918296260bb4af96e6b751a2ee7b
                                                                                                  • Opcode Fuzzy Hash: 92856508add691d054002ded6a6000d4bbe8b804a487c86aefc71baa23e67c99
                                                                                                  • Instruction Fuzzy Hash: CD2190B25053806FD7228F15DC54FA7BFBCEF46214F08849AE989CB652D364E948C7B1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 146 29aa646-29aa695 149 29aa69a-29aa6a3 146->149 150 29aa697 146->150 151 29aa6a8-29aa6b1 149->151 152 29aa6a5 149->152 150->149 153 29aa702-29aa707 151->153 154 29aa6b3-29aa6bb CreateMutexW 151->154 152->151 153->154 156 29aa6c1-29aa6d7 154->156 157 29aa709-29aa70e 156->157 158 29aa6d9-29aa6ff 156->158 157->158
                                                                                                  APIs
                                                                                                  • CreateMutexW.KERNELBASE(?,?), ref: 029AA6B9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000A.00000002.2103265703.00000000029AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029AA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_10_2_29aa000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateMutex
                                                                                                  • String ID:
                                                                                                  • API String ID: 1964310414-0
                                                                                                  • Opcode ID: 5d29961fd12b7175ce6a8b961f2194bdbd473b5b8ff120b6375215bd97b10fbc
                                                                                                  • Instruction ID: e6dfdb74f57134d98e2a6c9be2ee35100202b8a7f7269f14ddf81590a544c4eb
                                                                                                  • Opcode Fuzzy Hash: 5d29961fd12b7175ce6a8b961f2194bdbd473b5b8ff120b6375215bd97b10fbc
                                                                                                  • Instruction Fuzzy Hash: C02180716002409FE720CB69CD55BA6FBF8EF05214F04886AE948CB741D775E909CAB6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 161 29aa710-29aa778 163 29aa77a-29aa782 FindCloseChangeNotification 161->163 164 29aa7b9-29aa7be 161->164 165 29aa788-29aa79a 163->165 164->163 167 29aa79c-29aa7b8 165->167 168 29aa7c0-29aa7c5 165->168 168->167
                                                                                                  APIs
                                                                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 029AA780
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000A.00000002.2103265703.00000000029AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029AA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_10_2_29aa000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ChangeCloseFindNotification
                                                                                                  • String ID:
                                                                                                  • API String ID: 2591292051-0
                                                                                                  • Opcode ID: 06442b10b68f4ea3568461c94fe379be12c0fdad3bd25c4eeecd2f5357b85979
                                                                                                  • Instruction ID: 55332aa9def288e7310d05837530420f59e9b2423b062b87b00ae2ff7975702c
                                                                                                  • Opcode Fuzzy Hash: 06442b10b68f4ea3568461c94fe379be12c0fdad3bd25c4eeecd2f5357b85979
                                                                                                  • Instruction Fuzzy Hash: C72105B55093809FDB028F25DC95792BFB8EF03220F0880EBDD858F653D2359909CBA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 170 29aa392-29aa3cf 172 29aa3d1 170->172 173 29aa3d4-29aa3dd 170->173 172->173 174 29aa3df 173->174 175 29aa3e2-29aa3e8 173->175 174->175 176 29aa3ea 175->176 177 29aa3ed-29aa404 175->177 176->177 179 29aa43b-29aa440 177->179 180 29aa406-29aa419 RegQueryValueExW 177->180 179->180 181 29aa41b-29aa438 180->181 182 29aa442-29aa447 180->182 182->181
                                                                                                  APIs
                                                                                                  • RegQueryValueExW.KERNELBASE(?,00000E24,8308BC47,00000000,00000000,00000000,00000000), ref: 029AA40C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000A.00000002.2103265703.00000000029AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029AA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_10_2_29aa000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: e4cad28173c2737acb6a6f94ea2bcaf1461895e97bddc6b4aa14a06bee5c2c90
                                                                                                  • Instruction ID: 612658d1d8886f93a41bbc8c5552ea369872c5922436d78159f8decc1682dd23
                                                                                                  • Opcode Fuzzy Hash: e4cad28173c2737acb6a6f94ea2bcaf1461895e97bddc6b4aa14a06bee5c2c90
                                                                                                  • Instruction Fuzzy Hash: 7C218C75600704AFE720CE15CC84FA6F7FCEF04614F08846AED49CB651D764E949CAB6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 186 29aa486-29aa4c3 188 29aa4c8-29aa4d4 186->188 189 29aa4c5 186->189 190 29aa4d9-29aa4f0 188->190 191 29aa4d6 188->191 189->188 193 29aa4f2-29aa505 RegSetValueExW 190->193 194 29aa527-29aa52c 190->194 191->190 195 29aa52e-29aa533 193->195 196 29aa507-29aa524 193->196 194->193 195->196
                                                                                                  APIs
                                                                                                  • RegSetValueExW.KERNELBASE(?,00000E24,8308BC47,00000000,00000000,00000000,00000000), ref: 029AA4F8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000A.00000002.2103265703.00000000029AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029AA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_10_2_29aa000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value
                                                                                                  • String ID:
                                                                                                  • API String ID: 3702945584-0
                                                                                                  • Opcode ID: fa17d68eec0deb31f377aef37f247cb8e85d164a84278cda042475b3b09a6f8d
                                                                                                  • Instruction ID: eb471c33a34ca4c6f0dcb11c0f43d94af0ab1ba385ecc4cbc007ae03f7e65106
                                                                                                  • Opcode Fuzzy Hash: fa17d68eec0deb31f377aef37f247cb8e85d164a84278cda042475b3b09a6f8d
                                                                                                  • Instruction Fuzzy Hash: 7811BEB2600700AFEB218E15CC45FAABBFCEF04614F08845AED49CA641D360E548CAB6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 200 29aa74e-29aa778 201 29aa77a-29aa782 FindCloseChangeNotification 200->201 202 29aa7b9-29aa7be 200->202 203 29aa788-29aa79a 201->203 202->201 205 29aa79c-29aa7b8 203->205 206 29aa7c0-29aa7c5 203->206 206->205
                                                                                                  APIs
                                                                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 029AA780
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000A.00000002.2103265703.00000000029AA000.00000040.00000800.00020000.00000000.sdmp, Offset: 029AA000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_10_2_29aa000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ChangeCloseFindNotification
                                                                                                  • String ID:
                                                                                                  • API String ID: 2591292051-0
                                                                                                  • Opcode ID: 0be449652f117ede6ca0e7fbc01c720825fa79228bc9fd2543363d9a7cd49c2f
                                                                                                  • Instruction ID: f1d9e7c6b53836367b742a73d6fee38a75c303567fb50c85466bb03f8ee50975
                                                                                                  • Opcode Fuzzy Hash: 0be449652f117ede6ca0e7fbc01c720825fa79228bc9fd2543363d9a7cd49c2f
                                                                                                  • Instruction Fuzzy Hash: 0601DF71A003008FEB508F15D995766FBF8DF05220F08C4ABDD498B742D379E508CEA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 208 53e0080-53e00ad 211 53e00b8-53e02f9 208->211
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000A.00000002.2103657243.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_10_2_53e0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2517774af5128f202394316d88b1a66ce5f7351dc168ff5ef60b35d0ff42f543
                                                                                                  • Instruction ID: 23eedca4637282c2fa7d9dd6ad7cf9f498004baddee224fc3b45ded283d00df2
                                                                                                  • Opcode Fuzzy Hash: 2517774af5128f202394316d88b1a66ce5f7351dc168ff5ef60b35d0ff42f543
                                                                                                  • Instruction Fuzzy Hash: 1C517530A45646DBD704DF36ED9459A7FB2EFA13087008569D0048B76ADF389CADCF82
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 249 2a01048-2a01088 251 2a0108e-2a010ab 249->251
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000A.00000002.2103373808.0000000002A01000.00000040.00000020.00020000.00000000.sdmp, Offset: 02A01000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_10_2_2a01000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 918f9e9d108ee19651d495dd6d56dadca34e1e2a45da3be3ebcb1906a9f20be8
                                                                                                  • Instruction ID: 5603edece2633e78cafc5e9ee1a1b5ed600c144318427b76ec8e0d8712495a74
                                                                                                  • Opcode Fuzzy Hash: 918f9e9d108ee19651d495dd6d56dadca34e1e2a45da3be3ebcb1906a9f20be8
                                                                                                  • Instruction Fuzzy Hash: 4901A2B55097806FC7028F25AC40862FFB8EF86630709C4DFEC49CB612D229A809CB72
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 252 53e0018-53e006b 254 53e0070 call 53e03bd 252->254 255 53e0070 call 2a01048 252->255 256 53e0070 call 53e0310 252->256 257 53e0070 call 2a0106e 252->257 258 53e0070 call 53e0301 252->258 253 53e0076 254->253 255->253 256->253 257->253 258->253
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000A.00000002.2103657243.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_10_2_53e0000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d7da85daf56797c9f4addaef49d694256d3dfa63820d5e491a80691c30503267
                                                                                                  • Instruction ID: fb5c3163c4c525b1065f7418badab4347c7c2807d86b5e56bf907dd217980b05
                                                                                                  • Opcode Fuzzy Hash: d7da85daf56797c9f4addaef49d694256d3dfa63820d5e491a80691c30503267
                                                                                                  • Instruction Fuzzy Hash: A2F066AA80E3C18FD71343649CBA2A13FB09E2320671E04CBC4C1CA6A3E048585AE333
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 259 2a0106e-2a01088 260 2a0108e-2a010ab 259->260
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000A.00000002.2103373808.0000000002A01000.00000040.00000020.00020000.00000000.sdmp, Offset: 02A01000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_10_2_2a01000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1a36bdee5b9621501ace3c2ba49090c3aab2b722f73dcb93023c66c0ea68344d
                                                                                                  • Instruction ID: 7ea4bad27f8cffd0eaf9c79611d2b108465723b37357b29385e26f6b03b94332
                                                                                                  • Opcode Fuzzy Hash: 1a36bdee5b9621501ace3c2ba49090c3aab2b722f73dcb93023c66c0ea68344d
                                                                                                  • Instruction Fuzzy Hash: 36E092B66006048B9750CF0AEC41462F7D8EB84630B08C07FDC0D8B701D635F508CAA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 261 29a23f4-29a23ff 262 29a2412-29a2417 261->262 263 29a2401-29a240e 261->263 264 29a241a 262->264 265 29a2419 262->265 263->262 266 29a2420-29a2421 264->266
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000A.00000002.2103254499.00000000029A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A2000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_10_2_29a2000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 29d40a1679e9143dbdceb1e954c450eec2b0a7e60aa1cdc21811135b1362fec0
                                                                                                  • Instruction ID: d069a24878edf5dcb394f2d92cfa770b0e00ff12d42c47703408f88cbf95b67a
                                                                                                  • Opcode Fuzzy Hash: 29d40a1679e9143dbdceb1e954c450eec2b0a7e60aa1cdc21811135b1362fec0
                                                                                                  • Instruction Fuzzy Hash: 93D05E796097C14FD3169B1CC1A4B9537D8AB61718F4A44F9AC048B763C768D581D640
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000A.00000002.2103254499.00000000029A2000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A2000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_10_2_29a2000_svchost.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e0d2cd48707715bf2c008a783464b494b2ee8243f77be2ede2e32f525faf594d
                                                                                                  • Instruction ID: 5c5183c2175b922f67246c8dd8ea913493c4b17cdb68e07e65477558f1e4d18d
                                                                                                  • Opcode Fuzzy Hash: e0d2cd48707715bf2c008a783464b494b2ee8243f77be2ede2e32f525faf594d
                                                                                                  • Instruction Fuzzy Hash: 30D05E346003814BCB15DB0CC6E4F5937D8AB51B18F1A44E8AC108B762CBA8D8C1CA40
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%