Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
fBpY1pYq34.exe

Overview

General Information

Sample name:fBpY1pYq34.exe
renamed because original name is a hash value
Original sample name:06282cdd7fa54ea991fba55a50f8d8bd.exe
Analysis ID:1570343
MD5:06282cdd7fa54ea991fba55a50f8d8bd
SHA1:ba2cc621ce142888e001221b881f18dfdf971d16
SHA256:5adacfc1a38f978177f6aa03d8e95e584d75e2cd614aa88a686678f50ec4e0d4
Tags:exenjratRATuser-abuse_ch
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops fake system file at system root drive
Suricata IDS alerts for network traffic
Yara detected Njrat
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to log keystrokes (.Net Source)
Creates an autostart registry key pointing to binary in C:\Windows
Creates autorun.inf (USB autostart)
Creates autostart registry keys with suspicious names
Drops PE files to the startup folder
Drops PE files with benign system names
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Protects its processes via BreakOnTermination flag
Sigma detected: Files With System Process Name In Unsuspected Locations
Uses netsh to modify the Windows network and firewall settings
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Startup Folder File Write
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • fBpY1pYq34.exe (PID: 7440 cmdline: "C:\Users\user\Desktop\fBpY1pYq34.exe" MD5: 06282CDD7FA54EA991FBA55A50F8D8BD)
    • MsMpEng.exe (PID: 7540 cmdline: "C:\Windows\MsMpEng.exe" MD5: 06282CDD7FA54EA991FBA55A50F8D8BD)
      • netsh.exe (PID: 7644 cmdline: netsh firewall add allowedprogram "C:\Windows\MsMpEng.exe" "MsMpEng.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • conhost.exe (PID: 7652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • MsMpEng.exe (PID: 7900 cmdline: "C:\Windows\MsMpEng.exe" .. MD5: 06282CDD7FA54EA991FBA55A50F8D8BD)
  • MsMpEng.exe (PID: 8080 cmdline: "C:\Windows\MsMpEng.exe" .. MD5: 06282CDD7FA54EA991FBA55A50F8D8BD)
  • MsMpEng.exe (PID: 8156 cmdline: "C:\Windows\MsMpEng.exe" .. MD5: 06282CDD7FA54EA991FBA55A50F8D8BD)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Host": "2.tcp.eu.ngrok.io", "Port": "19294", "Version": "im523", "Campaign ID": "hacked", "Install Name": "MsMpEng.exe", "Install Dir": "WinDir"}
SourceRuleDescriptionAuthorStrings
fBpY1pYq34.exeJoeSecurity_NjratYara detected NjratJoe Security
    fBpY1pYq34.exeWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0x64c1:$a1: get_Registry
    • 0x7ee8:$a3: Download ERROR
    • 0x81da:$a5: netsh firewall delete allowedprogram "
    fBpY1pYq34.exenjrat1Identify njRatBrian Wallace @botnet_hunter
    • 0x80d0:$a1: netsh firewall add allowedprogram
    • 0x82ca:$b1: [TAP]
    • 0x8270:$b2: & exit
    • 0x823c:$c1: md.exe /k ping 0 & del
    fBpY1pYq34.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
    • 0x81da:$s1: netsh firewall delete allowedprogram
    • 0x80d0:$s2: netsh firewall add allowedprogram
    • 0x823a:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
    • 0x7ec4:$s4: Execute ERROR
    • 0x7f24:$s4: Execute ERROR
    • 0x7ee8:$s5: Download ERROR
    • 0x8280:$s6: [kl]
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exeJoeSecurity_NjratYara detected NjratJoe Security
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exeWindows_Trojan_Njrat_30f3c220unknownunknown
      • 0x64c1:$a1: get_Registry
      • 0x7ee8:$a3: Download ERROR
      • 0x81da:$a5: netsh firewall delete allowedprogram "
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exenjrat1Identify njRatBrian Wallace @botnet_hunter
      • 0x80d0:$a1: netsh firewall add allowedprogram
      • 0x82ca:$b1: [TAP]
      • 0x8270:$b2: & exit
      • 0x823c:$c1: md.exe /k ping 0 & del
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
      • 0x81da:$s1: netsh firewall delete allowedprogram
      • 0x80d0:$s2: netsh firewall add allowedprogram
      • 0x823a:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
      • 0x7ec4:$s4: Execute ERROR
      • 0x7f24:$s4: Execute ERROR
      • 0x7ee8:$s5: Download ERROR
      • 0x8280:$s6: [kl]
      C:\svchost.exeJoeSecurity_NjratYara detected NjratJoe Security
        Click to see the 7 entries
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.1647033528.00000000008F2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
          00000000.00000000.1647033528.00000000008F2000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
          • 0x62c1:$a1: get_Registry
          • 0x7ce8:$a3: Download ERROR
          • 0x7fda:$a5: netsh firewall delete allowedprogram "
          00000000.00000000.1647033528.00000000008F2000.00000002.00000001.01000000.00000003.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
          • 0x7ed0:$a1: netsh firewall add allowedprogram
          • 0x80ca:$b1: [TAP]
          • 0x8070:$b2: & exit
          • 0x803c:$c1: md.exe /k ping 0 & del
          Process Memory Space: fBpY1pYq34.exe PID: 7440JoeSecurity_NjratYara detected NjratJoe Security
            Process Memory Space: MsMpEng.exe PID: 7540JoeSecurity_NjratYara detected NjratJoe Security
              SourceRuleDescriptionAuthorStrings
              0.0.fBpY1pYq34.exe.8f0000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
                0.0.fBpY1pYq34.exe.8f0000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
                • 0x64c1:$a1: get_Registry
                • 0x7ee8:$a3: Download ERROR
                • 0x81da:$a5: netsh firewall delete allowedprogram "
                0.0.fBpY1pYq34.exe.8f0000.0.unpacknjrat1Identify njRatBrian Wallace @botnet_hunter
                • 0x80d0:$a1: netsh firewall add allowedprogram
                • 0x82ca:$b1: [TAP]
                • 0x8270:$b2: & exit
                • 0x823c:$c1: md.exe /k ping 0 & del
                0.0.fBpY1pYq34.exe.8f0000.0.unpackMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
                • 0x81da:$s1: netsh firewall delete allowedprogram
                • 0x80d0:$s2: netsh firewall add allowedprogram
                • 0x823a:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 6B 00 20 00 70 00 69 00 6E 00 67
                • 0x7ec4:$s4: Execute ERROR
                • 0x7f24:$s4: Execute ERROR
                • 0x7ee8:$s5: Download ERROR
                • 0x8280:$s6: [kl]

                System Summary

                barindex
                Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\MsMpEng.exe, ProcessId: 7540, TargetFilename: D:\svchost.exe
                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Windows\MsMpEng.exe" .., EventID: 13, EventType: SetValue, Image: C:\Windows\MsMpEng.exe, ProcessId: 7540, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\08e0b826461df6aaa32a19d4d44ad609
                Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Windows\MsMpEng.exe, ProcessId: 7540, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exe
                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Windows\MsMpEng.exe" .., EventID: 13, EventType: SetValue, Image: C:\Windows\MsMpEng.exe, ProcessId: 7540, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\08e0b826461df6aaa32a19d4d44ad609

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\MsMpEng.exe, ProcessId: 7540, TargetFilename: C:\svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-06T20:42:12.182745+010020211761Malware Command and Control Activity Detected192.168.2.44973018.157.68.7319294TCP
                2024-12-06T20:43:16.100859+010020211761Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:21.118862+010020211761Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:26.104707+010020211761Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-06T20:42:12.182745+010020331321Malware Command and Control Activity Detected192.168.2.44973018.157.68.7319294TCP
                2024-12-06T20:43:16.100859+010020331321Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:21.118862+010020331321Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:26.104707+010020331321Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-06T20:42:16.621790+010028255641Malware Command and Control Activity Detected192.168.2.44973018.157.68.7319294TCP
                2024-12-06T20:42:32.871746+010028255641Malware Command and Control Activity Detected192.168.2.44973018.157.68.7319294TCP
                2024-12-06T20:42:41.027908+010028255641Malware Command and Control Activity Detected192.168.2.44973018.157.68.7319294TCP
                2024-12-06T20:43:07.278115+010028255641Malware Command and Control Activity Detected192.168.2.44973018.157.68.7319294TCP
                2024-12-06T20:43:08.141766+010028255641Malware Command and Control Activity Detected192.168.2.44973018.157.68.7319294TCP
                2024-12-06T20:43:10.902941+010028255641Malware Command and Control Activity Detected192.168.2.44973018.157.68.7319294TCP
                2024-12-06T20:43:11.027925+010028255641Malware Command and Control Activity Detected192.168.2.44973018.157.68.7319294TCP
                2024-12-06T20:43:12.152899+010028255641Malware Command and Control Activity Detected192.168.2.44973018.157.68.7319294TCP
                2024-12-06T20:43:21.053448+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:21.173763+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:21.294327+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:21.788075+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:24.202195+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:24.327692+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:24.770942+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:26.096740+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:26.820404+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:27.421269+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:27.662676+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:28.868933+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:28.988807+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:29.135388+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:31.302771+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:32.038737+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:33.005564+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:33.246801+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:33.978655+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:34.941452+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:35.794251+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:36.397247+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:37.122048+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:38.331225+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:38.451430+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:39.382357+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:39.502291+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:39.650934+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:39.771285+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:40.132547+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:40.617382+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:42.186677+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:42.306742+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:43.285204+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:44.612543+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:45.942787+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:46.544217+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:47.396729+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:47.756738+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:48.970186+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:49.838354+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:49.958267+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:50.239786+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:51.091660+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:51.458405+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:51.578468+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:51.698516+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:51.818421+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:52.233831+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:54.288630+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:55.035273+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:57.077347+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:57.942305+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:58.184485+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:58.451107+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:58.571447+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:58.849252+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:58.969398+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:59.207196+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:59.703464+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:59.823997+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:00.558073+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:00.920181+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:01.040800+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:01.926134+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:03.251498+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:03.371767+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:03.991120+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:04.355611+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:04.599437+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:04.720246+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:06.288575+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:06.648834+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:07.369155+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:08.090883+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:09.434120+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:09.914983+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:10.518383+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:10.638262+010028255641Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:21.999483+010028255641Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:04.202437+010028255641Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:06.504711+010028255641Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:13.544110+010028255641Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:13.794092+010028255641Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:14.856573+010028255641Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:14.981542+010028255641Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:16.099638+010028255641Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:16.219500+010028255641Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:18.229957+010028255641Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:18.354125+010028255641Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:19.219713+010028255641Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:20.301531+010028255641Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:21.153265+010028255641Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:21.876830+010028255641Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:22.250604+010028255641Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:23.261636+010028255641Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:26.584710+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:27.428623+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:27.985277+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:28.179438+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:28.300617+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:29.382821+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:30.274563+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:30.636835+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:31.360586+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:33.428954+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:34.151398+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:35.139444+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:35.742916+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:35.862816+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:36.103536+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:36.223505+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:36.349982+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:36.595198+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:36.716966+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:37.560335+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:37.920256+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:38.542590+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:42.190453+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:42.432748+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:42.555273+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:42.771963+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:42.894855+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:43.399469+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:44.239590+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:44.359733+010028255641Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-06T20:42:12.309557+010028255631Malware Command and Control Activity Detected192.168.2.44973018.157.68.7319294TCP
                2024-12-06T20:44:21.239430+010028255631Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-06T20:42:00.277565+010028148601Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:42:00.277565+010028148601Malware Command and Control Activity Detected192.168.2.44973018.157.68.7319294TCP
                2024-12-06T20:42:00.277565+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:42:00.277565+010028148601Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:43:18.747502+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:20.326350+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:22.508637+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:23.838186+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:25.976557+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:28.384945+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:30.702071+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:32.645349+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:34.701498+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:36.397247+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:38.331225+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:40.858653+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:42.672552+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:44.489895+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:46.544217+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:48.604558+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:50.850982+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:53.688573+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:56.476910+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:43:59.460587+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:01.562696+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:03.991120+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:05.928208+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:07.728682+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:44:09.314289+010028148601Malware Command and Control Activity Detected192.168.2.4497823.126.37.1819294TCP
                2024-12-06T20:45:20.181620+010028148601Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:22.250604+010028148601Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP
                2024-12-06T20:45:30.876971+010028148601Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:32.829162+010028148601Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:34.882872+010028148601Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:37.440088+010028148601Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:39.643857+010028148601Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                2024-12-06T20:45:41.709784+010028148601Malware Command and Control Activity Detected192.168.2.45000518.197.239.519294TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-06T20:42:12.309557+010028384861Malware Command and Control Activity Detected192.168.2.44973018.157.68.7319294TCP
                2024-12-06T20:44:21.239430+010028384861Malware Command and Control Activity Detected192.168.2.4499253.126.37.1819294TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: fBpY1pYq34.exeAvira: detected
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exeAvira: detection malicious, Label: TR/ATRAPS.Gen
                Source: C:\Windows\MsMpEng.exeAvira: detection malicious, Label: TR/ATRAPS.Gen
                Source: C:\svchost.exeAvira: detection malicious, Label: TR/ATRAPS.Gen
                Source: 00000000.00000000.1647033528.00000000008F2000.00000002.00000001.01000000.00000003.sdmpMalware Configuration Extractor: Njrat {"Host": "2.tcp.eu.ngrok.io", "Port": "19294", "Version": "im523", "Campaign ID": "hacked", "Install Name": "MsMpEng.exe", "Install Dir": "WinDir"}
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exeReversingLabs: Detection: 84%
                Source: C:\Windows\MsMpEng.exeReversingLabs: Detection: 84%
                Source: C:\svchost.exeReversingLabs: Detection: 84%
                Source: fBpY1pYq34.exeReversingLabs: Detection: 84%
                Source: Yara matchFile source: fBpY1pYq34.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.fBpY1pYq34.exe.8f0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1647033528.00000000008F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: fBpY1pYq34.exe PID: 7440, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: MsMpEng.exe PID: 7540, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exe, type: DROPPED
                Source: Yara matchFile source: C:\svchost.exe, type: DROPPED
                Source: Yara matchFile source: C:\Windows\MsMpEng.exe, type: DROPPED
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exeJoe Sandbox ML: detected
                Source: C:\Windows\MsMpEng.exeJoe Sandbox ML: detected
                Source: C:\svchost.exeJoe Sandbox ML: detected
                Source: fBpY1pYq34.exeJoe Sandbox ML: detected
                Source: fBpY1pYq34.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
                Source: fBpY1pYq34.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Spreading

                barindex
                Source: C:\Windows\MsMpEng.exeFile created: C:\autorun.infJump to behavior
                Source: fBpY1pYq34.exe, 00000000.00000000.1647033528.00000000008F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: autorun.inf
                Source: fBpY1pYq34.exe, 00000000.00000000.1647033528.00000000008F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: [autorun]
                Source: fBpY1pYq34.exe, 00000000.00000002.1715282881.0000000002F01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
                Source: fBpY1pYq34.exe, 00000000.00000002.1715282881.0000000002F01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
                Source: MsMpEng.exe, 00000001.00000002.4101423130.0000000003453000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
                Source: MsMpEng.exe, 00000001.00000002.4101423130.0000000003453000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
                Source: fBpY1pYq34.exeBinary or memory string: autorun.inf
                Source: fBpY1pYq34.exeBinary or memory string: [autorun]
                Source: autorun.inf.1.drBinary or memory string: [autorun]
                Source: 08e0b826461df6aaa32a19d4d44ad609.exe.1.drBinary or memory string: autorun.inf
                Source: 08e0b826461df6aaa32a19d4d44ad609.exe.1.drBinary or memory string: [autorun]
                Source: MsMpEng.exe.0.drBinary or memory string: autorun.inf
                Source: MsMpEng.exe.0.drBinary or memory string: [autorun]
                Source: svchost.exe.1.drBinary or memory string: autorun.inf
                Source: svchost.exe.1.drBinary or memory string: [autorun]

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49730 -> 18.157.68.73:19294
                Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49730 -> 18.157.68.73:19294
                Source: Network trafficSuricata IDS: 2825563 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (inf) : 192.168.2.4:49730 -> 18.157.68.73:19294
                Source: Network trafficSuricata IDS: 2838486 - Severity 1 - ETPRO MALWARE njRAT/Bladabindi Variant CnC Activity (inf) : 192.168.2.4:49730 -> 18.157.68.73:19294
                Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:49730 -> 18.157.68.73:19294
                Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49782 -> 3.126.37.18:19294
                Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49782 -> 3.126.37.18:19294
                Source: Network trafficSuricata IDS: 2814860 - Severity 1 - ETPRO MALWARE njRAT/Bladabindi CnC Callback (act) : 192.168.2.4:49782 -> 3.126.37.18:19294
                Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:49782 -> 3.126.37.18:19294
                Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:49925 -> 3.126.37.18:19294
                Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:49925 -> 3.126.37.18:19294
                Source: Network trafficSuricata IDS: 2825563 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (inf) : 192.168.2.4:49925 -> 3.126.37.18:19294
                Source: Network trafficSuricata IDS: 2838486 - Severity 1 - ETPRO MALWARE njRAT/Bladabindi Variant CnC Activity (inf) : 192.168.2.4:49925 -> 3.126.37.18:19294
                Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:49925 -> 3.126.37.18:19294
                Source: Network trafficSuricata IDS: 2033132 - Severity 1 - ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll) : 192.168.2.4:50005 -> 18.197.239.5:19294
                Source: Network trafficSuricata IDS: 2021176 - Severity 1 - ET MALWARE Bladabindi/njRAT CnC Command (ll) : 192.168.2.4:50005 -> 18.197.239.5:19294
                Source: Network trafficSuricata IDS: 2825564 - Severity 1 - ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act) : 192.168.2.4:50005 -> 18.197.239.5:19294
                Source: Network trafficSuricata IDS: 2814860 - Severity 1 - ETPRO MALWARE njRAT/Bladabindi CnC Callback (act) : 192.168.2.4:49925 -> 3.126.37.18:19294
                Source: Network trafficSuricata IDS: 2814860 - Severity 1 - ETPRO MALWARE njRAT/Bladabindi CnC Callback (act) : 192.168.2.4:50005 -> 18.197.239.5:19294
                Source: Network trafficSuricata IDS: 2814860 - Severity 1 - ETPRO MALWARE njRAT/Bladabindi CnC Callback (act) : 192.168.2.4:49730 -> 18.157.68.73:19294
                Source: global trafficTCP traffic: 192.168.2.4:49730 -> 18.157.68.73:19294
                Source: global trafficTCP traffic: 192.168.2.4:49782 -> 3.126.37.18:19294
                Source: global trafficTCP traffic: 192.168.2.4:50005 -> 18.197.239.5:19294
                Source: Joe Sandbox ViewIP Address: 3.126.37.18 3.126.37.18
                Source: Joe Sandbox ViewIP Address: 18.157.68.73 18.157.68.73
                Source: Joe Sandbox ViewIP Address: 18.197.239.5 18.197.239.5
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: 2.tcp.eu.ngrok.io
                Source: fBpY1pYq34.exe, 08e0b826461df6aaa32a19d4d44ad609.exe.1.dr, MsMpEng.exe.0.dr, svchost.exe.1.drString found in binary or memory: https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: fBpY1pYq34.exe, kl.cs.Net Code: VKCodeToUnicode
                Source: MsMpEng.exe.0.dr, kl.cs.Net Code: VKCodeToUnicode
                Source: 08e0b826461df6aaa32a19d4d44ad609.exe.1.dr, kl.cs.Net Code: VKCodeToUnicode
                Source: svchost.exe.1.dr, kl.cs.Net Code: VKCodeToUnicode

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: fBpY1pYq34.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.fBpY1pYq34.exe.8f0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1647033528.00000000008F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: fBpY1pYq34.exe PID: 7440, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: MsMpEng.exe PID: 7540, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exe, type: DROPPED
                Source: Yara matchFile source: C:\svchost.exe, type: DROPPED
                Source: Yara matchFile source: C:\Windows\MsMpEng.exe, type: DROPPED

                Operating System Destruction

                barindex
                Source: C:\Windows\MsMpEng.exeProcess information set: 01 00 00 00 Jump to behavior

                System Summary

                barindex
                Source: fBpY1pYq34.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: fBpY1pYq34.exe, type: SAMPLEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: fBpY1pYq34.exe, type: SAMPLEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: 0.0.fBpY1pYq34.exe.8f0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: 0.0.fBpY1pYq34.exe.8f0000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: 0.0.fBpY1pYq34.exe.8f0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: 00000000.00000000.1647033528.00000000008F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: 00000000.00000000.1647033528.00000000008F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: C:\svchost.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: C:\svchost.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: C:\svchost.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: C:\Windows\MsMpEng.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
                Source: C:\Windows\MsMpEng.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
                Source: C:\Windows\MsMpEng.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
                Source: C:\Windows\MsMpEng.exeProcess Stats: CPU usage > 49%
                Source: C:\Windows\MsMpEng.exeCode function: 1_2_011CBEF2 NtSetInformationProcess,1_2_011CBEF2
                Source: C:\Windows\MsMpEng.exeCode function: 1_2_011CBED0 NtSetInformationProcess,1_2_011CBED0
                Source: C:\Windows\MsMpEng.exeCode function: 1_2_019101C2 NtQuerySystemInformation,1_2_019101C2
                Source: C:\Windows\MsMpEng.exeCode function: 1_2_01910187 NtQuerySystemInformation,1_2_01910187
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeFile created: C:\Windows\MsMpEng.exeJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeFile created: C:\Windows\MsMpEng.exe\:Zone.Identifier:$DATAJump to behavior
                Source: fBpY1pYq34.exe, 00000000.00000002.1714739052.000000000109E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs fBpY1pYq34.exe
                Source: fBpY1pYq34.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: fBpY1pYq34.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: fBpY1pYq34.exe, type: SAMPLEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: fBpY1pYq34.exe, type: SAMPLEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: 0.0.fBpY1pYq34.exe.8f0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: 0.0.fBpY1pYq34.exe.8f0000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: 0.0.fBpY1pYq34.exe.8f0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: 00000000.00000000.1647033528.00000000008F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: 00000000.00000000.1647033528.00000000008F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: C:\svchost.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: C:\svchost.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: C:\svchost.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: C:\Windows\MsMpEng.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
                Source: C:\Windows\MsMpEng.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
                Source: C:\Windows\MsMpEng.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
                Source: classification engineClassification label: mal100.spre.troj.adwa.spyw.evad.winEXE@9/10@4/3
                Source: C:\Windows\MsMpEng.exeCode function: 1_2_011CBBA2 AdjustTokenPrivileges,1_2_011CBBA2
                Source: C:\Windows\MsMpEng.exeCode function: 1_2_011CBB6B AdjustTokenPrivileges,1_2_011CBB6B
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\fBpY1pYq34.exe.logJump to behavior
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7652:120:WilError_03
                Source: C:\Windows\MsMpEng.exeMutant created: NULL
                Source: C:\Windows\MsMpEng.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                Source: C:\Windows\MsMpEng.exeMutant created: \Sessions\1\BaseNamedObjects\08e0b826461df6aaa32a19d4d44ad609
                Source: fBpY1pYq34.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: fBpY1pYq34.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: fBpY1pYq34.exeReversingLabs: Detection: 84%
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeFile read: C:\Users\user\Desktop\fBpY1pYq34.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\fBpY1pYq34.exe "C:\Users\user\Desktop\fBpY1pYq34.exe"
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess created: C:\Windows\MsMpEng.exe "C:\Windows\MsMpEng.exe"
                Source: C:\Windows\MsMpEng.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Windows\MsMpEng.exe" "MsMpEng.exe" ENABLE
                Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Windows\MsMpEng.exe "C:\Windows\MsMpEng.exe" ..
                Source: unknownProcess created: C:\Windows\MsMpEng.exe "C:\Windows\MsMpEng.exe" ..
                Source: unknownProcess created: C:\Windows\MsMpEng.exe "C:\Windows\MsMpEng.exe" ..
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess created: C:\Windows\MsMpEng.exe "C:\Windows\MsMpEng.exe" Jump to behavior
                Source: C:\Windows\MsMpEng.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Windows\MsMpEng.exe" "MsMpEng.exe" ENABLEJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: shfolder.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: avicap32.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: msvfw32.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\MsMpEng.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{674B6698-EE92-11D0-AD71-00C04FD8FDFF}\InprocServer32Jump to behavior
                Source: C:\Windows\MsMpEng.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
                Source: fBpY1pYq34.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
                Source: fBpY1pYq34.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: fBpY1pYq34.exe, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                Source: MsMpEng.exe.0.dr, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                Source: 08e0b826461df6aaa32a19d4d44ad609.exe.1.dr, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                Source: svchost.exe.1.dr, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                Source: C:\Windows\MsMpEng.exeCode function: 6_2_052F07BE push eax; iretd 6_2_052F07BF
                Source: C:\Windows\MsMpEng.exeCode function: 9_2_01C70635 push ss; iretd 9_2_01C70643

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\MsMpEng.exeFile created: C:\svchost.exeJump to dropped file
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeExecutable created and started: C:\Windows\MsMpEng.exeJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeFile created: C:\Windows\MsMpEng.exeJump to dropped file
                Source: C:\Windows\MsMpEng.exeFile created: C:\svchost.exeJump to dropped file
                Source: C:\Windows\MsMpEng.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exeJump to dropped file
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeFile created: C:\Windows\MsMpEng.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Windows\MsMpEng.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 08e0b826461df6aaa32a19d4d44ad609Jump to behavior
                Source: C:\Windows\MsMpEng.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 08e0b826461df6aaa32a19d4d44ad609Jump to behavior
                Source: C:\Windows\MsMpEng.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exeJump to dropped file
                Source: C:\Windows\MsMpEng.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exeJump to behavior
                Source: C:\Windows\MsMpEng.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exeJump to behavior
                Source: C:\Windows\MsMpEng.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exe\:Zone.Identifier:$DATAJump to behavior
                Source: C:\Windows\MsMpEng.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 08e0b826461df6aaa32a19d4d44ad609Jump to behavior
                Source: C:\Windows\MsMpEng.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 08e0b826461df6aaa32a19d4d44ad609Jump to behavior
                Source: C:\Windows\MsMpEng.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 08e0b826461df6aaa32a19d4d44ad609Jump to behavior
                Source: C:\Windows\MsMpEng.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 08e0b826461df6aaa32a19d4d44ad609Jump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeMemory allocated: 1080000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeMemory allocated: 2F00000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeMemory allocated: 4F00000 memory commit | memory reserve | memory write watchJump to behavior
                Source: C:\Windows\MsMpEng.exeMemory allocated: 1450000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\MsMpEng.exeMemory allocated: 3450000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\MsMpEng.exeMemory allocated: 17D0000 memory commit | memory reserve | memory write watchJump to behavior
                Source: C:\Windows\MsMpEng.exeMemory allocated: 12C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\MsMpEng.exeMemory allocated: 3110000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\MsMpEng.exeMemory allocated: 5110000 memory commit | memory reserve | memory write watchJump to behavior
                Source: C:\Windows\MsMpEng.exeMemory allocated: 1690000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\MsMpEng.exeMemory allocated: 3580000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\MsMpEng.exeMemory allocated: 1B90000 memory commit | memory reserve | memory write watchJump to behavior
                Source: C:\Windows\MsMpEng.exeMemory allocated: D60000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\MsMpEng.exeMemory allocated: 2B40000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\MsMpEng.exeMemory allocated: 4B40000 memory commit | memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\MsMpEng.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\MsMpEng.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\MsMpEng.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\MsMpEng.exeWindow / User API: threadDelayed 3128Jump to behavior
                Source: C:\Windows\MsMpEng.exeWindow / User API: threadDelayed 1166Jump to behavior
                Source: C:\Windows\MsMpEng.exeWindow / User API: threadDelayed 4075Jump to behavior
                Source: C:\Windows\MsMpEng.exeWindow / User API: foregroundWindowGot 427Jump to behavior
                Source: C:\Windows\MsMpEng.exeWindow / User API: foregroundWindowGot 1287Jump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exe TID: 7460Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\MsMpEng.exe TID: 7544Thread sleep time: -1166000s >= -30000sJump to behavior
                Source: C:\Windows\MsMpEng.exe TID: 7544Thread sleep time: -4075000s >= -30000sJump to behavior
                Source: C:\Windows\MsMpEng.exe TID: 7920Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\MsMpEng.exe TID: 8108Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\MsMpEng.exe TID: 8180Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\MsMpEng.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\MsMpEng.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\MsMpEng.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: MsMpEng.exe, 00000001.00000002.4100478417.000000000124B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWwordAttempts="
                Source: MsMpEng.exe, 00000001.00000002.4100478417.000000000124B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlln%
                Source: netsh.exe, 00000003.00000003.1785723168.0000000000841000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\MsMpEng.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\MsMpEng.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: fBpY1pYq34.exe, kl.csReference to suspicious API methods: MapVirtualKey(a, 0u)
                Source: fBpY1pYq34.exe, kl.csReference to suspicious API methods: GetAsyncKeyState(num2)
                Source: fBpY1pYq34.exe, OK.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, 100, ref lpszVer, 100)
                Source: C:\Users\user\Desktop\fBpY1pYq34.exeProcess created: C:\Windows\MsMpEng.exe "C:\Windows\MsMpEng.exe" Jump to behavior
                Source: MsMpEng.exe, 00000001.00000002.4101423130.000000000377E000.00000004.00000800.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4101423130.0000000003660000.00000004.00000800.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4101423130.0000000003761000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: MsMpEng.exe, 00000001.00000002.4101423130.000000000377E000.00000004.00000800.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4101423130.0000000003660000.00000004.00000800.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4101423130.0000000003674000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program managerL.
                Source: MsMpEng.exe, 00000001.00000002.4101423130.0000000003453000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: program manager
                Source: MsMpEng.exe, 00000001.00000002.4101423130.000000000377E000.00000004.00000800.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4101423130.0000000003761000.00000004.00000800.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4101423130.0000000003674000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@9
                Source: C:\Windows\MsMpEng.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\MsMpEng.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\MsMpEng.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\MsMpEng.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Lowering of HIPS / PFW / Operating System Security Settings

                barindex
                Source: C:\Windows\MsMpEng.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Windows\MsMpEng.exe" "MsMpEng.exe" ENABLE
                Source: C:\Windows\MsMpEng.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Windows\MsMpEng.exe" "MsMpEng.exe" ENABLE
                Source: fBpY1pYq34.exe, 00000000.00000002.1714739052.00000000010CE000.00000004.00000020.00020000.00000000.sdmp, fBpY1pYq34.exe, 00000000.00000002.1714739052.0000000001115000.00000004.00000020.00020000.00000000.sdmp, fBpY1pYq34.exe, 00000000.00000002.1715282881.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4101423130.000000000377E000.00000004.00000800.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4101091494.0000000001480000.00000004.00000020.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4103871804.0000000005E40000.00000004.00000020.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4100315660.00000000010F6000.00000004.00000010.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4101423130.0000000003761000.00000004.00000800.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4101423130.0000000003987000.00000004.00000800.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4100478417.000000000124B000.00000004.00000020.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4101423130.0000000003674000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\Windows\MsMpEng.exe
                Source: MsMpEng.exe, 00000006.00000002.1950556648.0000000001108000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: APPDOMAIN_IDs\MsMpEng.exe
                Source: fBpY1pYq34.exe, 00000000.00000002.1715282881.0000000002F01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: msmpeng.exe
                Source: fBpY1pYq34.exe, 00000000.00000002.1715282881.0000000002F01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: c:\windows\msmpeng.exe
                Source: fBpY1pYq34.exe, 00000000.00000002.1714739052.00000000010CE000.00000004.00000020.00020000.00000000.sdmp, fBpY1pYq34.exe, 00000000.00000002.1714739052.0000000001115000.00000004.00000020.00020000.00000000.sdmp, fBpY1pYq34.exe, 00000000.00000002.1715282881.0000000002F01000.00000004.00000800.00020000.00000000.sdmp, fBpY1pYq34.exe, 00000000.00000002.1714739052.00000000010FE000.00000004.00000020.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4102886510.00000000045D3000.00000004.00000800.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4102886510.000000000457C000.00000004.00000800.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4102886510.000000000462A000.00000004.00000800.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4100315660.00000000010F6000.00000004.00000010.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4102886510.0000000004477000.00000004.00000800.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4102886510.0000000004525000.00000004.00000800.00020000.00000000.sdmp, MsMpEng.exe, 00000001.00000002.4101423130.0000000003451000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: fBpY1pYq34.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.fBpY1pYq34.exe.8f0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1647033528.00000000008F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: fBpY1pYq34.exe PID: 7440, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: MsMpEng.exe PID: 7540, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exe, type: DROPPED
                Source: Yara matchFile source: C:\svchost.exe, type: DROPPED
                Source: Yara matchFile source: C:\Windows\MsMpEng.exe, type: DROPPED

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: fBpY1pYq34.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.fBpY1pYq34.exe.8f0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1647033528.00000000008F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: fBpY1pYq34.exe PID: 7440, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: MsMpEng.exe PID: 7540, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exe, type: DROPPED
                Source: Yara matchFile source: C:\svchost.exe, type: DROPPED
                Source: Yara matchFile source: C:\Windows\MsMpEng.exe, type: DROPPED
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure11
                Replication Through Removable Media
                1
                Native API
                321
                Registry Run Keys / Startup Folder
                1
                Access Token Manipulation
                221
                Masquerading
                1
                Input Capture
                111
                Security Software Discovery
                Remote Services1
                Input Capture
                1
                Non-Standard Port
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                12
                Process Injection
                21
                Disable or Modify Tools
                LSASS Memory2
                Process Discovery
                Remote Desktop ProtocolData from Removable Media1
                Non-Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)321
                Registry Run Keys / Startup Folder
                31
                Virtualization/Sandbox Evasion
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive1
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                DLL Side-Loading
                1
                Access Token Manipulation
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
                Process Injection
                LSA Secrets1
                Peripheral Device Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Obfuscated Files or Information
                Cached Domain Credentials1
                File and Directory Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Software Packing
                DCSync12
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1570343 Sample: fBpY1pYq34.exe Startdate: 06/12/2024 Architecture: WINDOWS Score: 100 42 2.tcp.eu.ngrok.io 2->42 50 Suricata IDS alerts for network traffic 2->50 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 13 other signatures 2->56 9 fBpY1pYq34.exe 1 6 2->9         started        13 MsMpEng.exe 3 2->13         started        15 MsMpEng.exe 2 2->15         started        17 MsMpEng.exe 2 2->17         started        signatures3 process4 file5 36 C:\Windows\MsMpEng.exe, PE32 9->36 dropped 38 C:\Windows\MsMpEng.exe:Zone.Identifier, ASCII 9->38 dropped 40 C:\Users\user\AppData\...\fBpY1pYq34.exe.log, ASCII 9->40 dropped 66 Drops executables to the windows directory (C:\Windows) and starts them 9->66 19 MsMpEng.exe 2 11 9->19         started        signatures6 process7 dnsIp8 44 2.tcp.eu.ngrok.io 18.157.68.73, 19294, 49730 AMAZON-02US United States 19->44 46 18.197.239.5, 19294, 50005 AMAZON-02US United States 19->46 48 3.126.37.18, 19294, 49782, 49925 AMAZON-02US United States 19->48 28 C:\svchost.exe, PE32 19->28 dropped 30 C:\...\08e0b826461df6aaa32a19d4d44ad609.exe, PE32 19->30 dropped 32 C:\svchost.exe:Zone.Identifier, ASCII 19->32 dropped 34 2 other malicious files 19->34 dropped 58 Antivirus detection for dropped file 19->58 60 Multi AV Scanner detection for dropped file 19->60 62 Protects its processes via BreakOnTermination flag 19->62 64 8 other signatures 19->64 24 netsh.exe 2 19->24         started        file9 signatures10 process11 process12 26 conhost.exe 24->26         started       

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                fBpY1pYq34.exe84%ReversingLabsByteCode-MSIL.Backdoor.njRAT
                fBpY1pYq34.exe100%AviraTR/ATRAPS.Gen
                fBpY1pYq34.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exe100%AviraTR/ATRAPS.Gen
                C:\Windows\MsMpEng.exe100%AviraTR/ATRAPS.Gen
                C:\svchost.exe100%AviraTR/ATRAPS.Gen
                C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exe100%Joe Sandbox ML
                C:\Windows\MsMpEng.exe100%Joe Sandbox ML
                C:\svchost.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exe84%ReversingLabsByteCode-MSIL.Backdoor.njRAT
                C:\Windows\MsMpEng.exe84%ReversingLabsByteCode-MSIL.Backdoor.njRAT
                C:\svchost.exe84%ReversingLabsByteCode-MSIL.Backdoor.njRAT
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                2.tcp.eu.ngrok.io
                18.157.68.73
                truetrue
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0fBpY1pYq34.exe, 08e0b826461df6aaa32a19d4d44ad609.exe.1.dr, MsMpEng.exe.0.dr, svchost.exe.1.drfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    3.126.37.18
                    unknownUnited States
                    16509AMAZON-02UStrue
                    18.157.68.73
                    2.tcp.eu.ngrok.ioUnited States
                    16509AMAZON-02UStrue
                    18.197.239.5
                    unknownUnited States
                    16509AMAZON-02UStrue
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1570343
                    Start date and time:2024-12-06 20:41:06 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 7m 35s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:12
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:fBpY1pYq34.exe
                    renamed because original name is a hash value
                    Original Sample Name:06282cdd7fa54ea991fba55a50f8d8bd.exe
                    Detection:MAL
                    Classification:mal100.spre.troj.adwa.spyw.evad.winEXE@9/10@4/3
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 98%
                    • Number of executed functions: 203
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: fBpY1pYq34.exe
                    TimeTypeDescription
                    14:42:40API Interceptor188105x Sleep call for process: MsMpEng.exe modified
                    19:42:11AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run 08e0b826461df6aaa32a19d4d44ad609 "C:\Windows\MsMpEng.exe" ..
                    19:42:19AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run 08e0b826461df6aaa32a19d4d44ad609 "C:\Windows\MsMpEng.exe" ..
                    19:42:27AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run 08e0b826461df6aaa32a19d4d44ad609 "C:\Windows\MsMpEng.exe" ..
                    19:42:36AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exe
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    3.126.37.18f3aef511705f37f9792c6032b936ca61.exeGet hashmaliciousNjratBrowse
                      W9UAjNR4L6.exeGet hashmaliciousNjratBrowse
                        7zFM.exeGet hashmaliciousZTratBrowse
                          4xKDL5YCfQ.exeGet hashmaliciousNjratBrowse
                            b8UsrDOVGV.exeGet hashmaliciousNjratBrowse
                              tiodtk2cfy.exeGet hashmaliciousNjratBrowse
                                pQBmVoyRnw.exeGet hashmaliciousNjratBrowse
                                  NezbdhNgwG.exeGet hashmaliciousNjratBrowse
                                    xdPdkPMD8u.exeGet hashmaliciousNjratBrowse
                                      VBUXm77rfL.exeGet hashmaliciousNjratBrowse
                                        18.157.68.73f3aef511705f37f9792c6032b936ca61.exeGet hashmaliciousNjratBrowse
                                          Ve0c8i5So2.exeGet hashmaliciousNjratBrowse
                                            b8UsrDOVGV.exeGet hashmaliciousNjratBrowse
                                              81Rz15POL6.exeGet hashmaliciousNjratBrowse
                                                649DB66A36E095B16832637A31D3CCC75040C5A6C23F6.exeGet hashmaliciousNjratBrowse
                                                  RWqHoCWEPI.exeGet hashmaliciousNjratBrowse
                                                    VBUXm77rfL.exeGet hashmaliciousNjratBrowse
                                                      1UGdjTlX5v.exeGet hashmaliciousNjratBrowse
                                                        kXghM8bJcm.exeGet hashmaliciousNjratBrowse
                                                          eI43OwXSvq.exeGet hashmaliciousNjratBrowse
                                                            18.197.239.5ULNZPn6D33.exeGet hashmaliciousSliverBrowse
                                                            • 2.tcp.eu.ngrok.io:11642/e.bin
                                                            P90GT_Invoice_Related_Property_Tax_P800.exeGet hashmaliciousRedLineBrowse
                                                            • 2.tcp.eu.ngrok.io:17685/
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            2.tcp.eu.ngrok.iof3aef511705f37f9792c6032b936ca61.exeGet hashmaliciousNjratBrowse
                                                            • 3.126.37.18
                                                            W9UAjNR4L6.exeGet hashmaliciousNjratBrowse
                                                            • 3.126.37.18
                                                            ULNZPn6D33.exeGet hashmaliciousSliverBrowse
                                                            • 18.197.239.5
                                                            Injector.exeGet hashmaliciousZTratBrowse
                                                            • 18.197.239.5
                                                            7zFM.exeGet hashmaliciousZTratBrowse
                                                            • 3.126.37.18
                                                            Game Laucher.exeGet hashmaliciousNjratBrowse
                                                            • 18.192.93.86
                                                            10.exeGet hashmaliciousUnknownBrowse
                                                            • 18.192.93.86
                                                            En3e396wX1.exeGet hashmaliciousNjratBrowse
                                                            • 18.197.239.5
                                                            ZxocxU01PB.exeGet hashmaliciousNjratBrowse
                                                            • 18.197.239.5
                                                            4xKDL5YCfQ.exeGet hashmaliciousNjratBrowse
                                                            • 18.156.13.209
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            AMAZON-02USFYI_ Remittance Advice - 667543.emlGet hashmaliciousUnknownBrowse
                                                            • 52.33.23.190
                                                            https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp/email.email.panda%C2%ADdoc%C2%AD.net/c/eJxUkE2P2yAQhn-NuWWFARt88CFVY612oypR2m7UywqGwSGJDcLY3c2vryJ1-3EbjeZ99MxrW1Nz4xSxAeYBx_zqbdufVQy8WvbnZ4mHr1v5vX_uDcG2lJxXVAlZk1MLSiPjHKRWYBw4lJZJCRqkEVJZQXzLKBMlo3WpqKz4g6l4zS03pmSmLmVZCIqD9teHqEerbYCHETPx02tOGlCbK7Y5zUiu7SnnOBV8XbCuYJ2O8W8EwlCw7kO_YN3CCt7lcMGx4J8NSlVVAgyKymkGjIKWqBoJ3DlUXIGiDUhX8I6MIXvnQWcfxnsNzgkqLMCqwQZWolF0pTk0K0qZQ7S1QVeTkHo9-tuf0GZ5eheeH9Pm7by_vbzf7PD4ZUdSG09zSoWgIWY_zMOUtXN-7O_-JOHip9-A-fB43HRxdxy-Qfi03b-sbbxIktuPF_8ZV1mnHv_bTPeLpWXkZ0iXKWrAO3SXD-unw3Y8i7e8HH7ki-bz5H4FAAD__zN8qVcGet hashmaliciousUnknownBrowse
                                                            • 52.35.175.3
                                                            https://view.monday.com/7943156422-7d953d66ef734304cc1947de503c6a54?r=use1Get hashmaliciousUnknownBrowse
                                                            • 3.160.188.124
                                                            https://ftp.phishing.guru/XZTVLTzdsZUYrUVQvc2UxelY4RXAyY1lsWllpOGZuODg5eElvOG81SlRoMHJnZ1MwbTRTYVVxVzZlMm5NZTN3Z1Z4K3NxMmZFRUUwc09aYVN3TnJFWE5KRVNJd3RESWEzaGVVRUJOTXFUS1oyaTFpbnhWYmNZMEpzc1FsRmJRTWp4OSt1QWd2djVBa050cXBJTWtQaVo1bG95emZjbHdMNDJTN1ExSkVJV3F2VEZOWnByVFp1eTB0U2h3PT0tLWdwOUd3TlJKYU9yai92dFAtLW1zSmtEb2l5OG5rdkdhS3p4QUkwOXc9PQ==?cid=2305350685&c=E,1,2hwsfxJSqavaDh1yKkXV3W2-TyhvGdShzpZs_xrCQV32rd5rxIItzkHynov7i6KPhRMjTOfzpbOL_1ijK1wBxrPztz6i3OeFYMVWHhBAPgGet hashmaliciousKnowBe4Browse
                                                            • 52.217.115.240
                                                            la.bot.sh4.elfGet hashmaliciousMiraiBrowse
                                                            • 54.171.230.55
                                                            la.bot.mipsel.elfGet hashmaliciousMiraiBrowse
                                                            • 54.171.230.55
                                                            DHL_734825510.exeGet hashmaliciousFormBookBrowse
                                                            • 13.248.169.48
                                                            https://app.droplet.io/form/K47rYNGet hashmaliciousUnknownBrowse
                                                            • 3.21.252.22
                                                            Platinum Hall County, Georgia Proposal (16.6 KB).docxGet hashmaliciousKnowBe4Browse
                                                            • 108.139.79.89
                                                            mipsel.elfGet hashmaliciousGafgytBrowse
                                                            • 54.171.230.55
                                                            AMAZON-02USFYI_ Remittance Advice - 667543.emlGet hashmaliciousUnknownBrowse
                                                            • 52.33.23.190
                                                            https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp/email.email.panda%C2%ADdoc%C2%AD.net/c/eJxUkE2P2yAQhn-NuWWFARt88CFVY612oypR2m7UywqGwSGJDcLY3c2vryJ1-3EbjeZ99MxrW1Nz4xSxAeYBx_zqbdufVQy8WvbnZ4mHr1v5vX_uDcG2lJxXVAlZk1MLSiPjHKRWYBw4lJZJCRqkEVJZQXzLKBMlo3WpqKz4g6l4zS03pmSmLmVZCIqD9teHqEerbYCHETPx02tOGlCbK7Y5zUiu7SnnOBV8XbCuYJ2O8W8EwlCw7kO_YN3CCt7lcMGx4J8NSlVVAgyKymkGjIKWqBoJ3DlUXIGiDUhX8I6MIXvnQWcfxnsNzgkqLMCqwQZWolF0pTk0K0qZQ7S1QVeTkHo9-tuf0GZ5eheeH9Pm7by_vbzf7PD4ZUdSG09zSoWgIWY_zMOUtXN-7O_-JOHip9-A-fB43HRxdxy-Qfi03b-sbbxIktuPF_8ZV1mnHv_bTPeLpWXkZ0iXKWrAO3SXD-unw3Y8i7e8HH7ki-bz5H4FAAD__zN8qVcGet hashmaliciousUnknownBrowse
                                                            • 52.35.175.3
                                                            https://view.monday.com/7943156422-7d953d66ef734304cc1947de503c6a54?r=use1Get hashmaliciousUnknownBrowse
                                                            • 3.160.188.124
                                                            https://ftp.phishing.guru/XZTVLTzdsZUYrUVQvc2UxelY4RXAyY1lsWllpOGZuODg5eElvOG81SlRoMHJnZ1MwbTRTYVVxVzZlMm5NZTN3Z1Z4K3NxMmZFRUUwc09aYVN3TnJFWE5KRVNJd3RESWEzaGVVRUJOTXFUS1oyaTFpbnhWYmNZMEpzc1FsRmJRTWp4OSt1QWd2djVBa050cXBJTWtQaVo1bG95emZjbHdMNDJTN1ExSkVJV3F2VEZOWnByVFp1eTB0U2h3PT0tLWdwOUd3TlJKYU9yai92dFAtLW1zSmtEb2l5OG5rdkdhS3p4QUkwOXc9PQ==?cid=2305350685&c=E,1,2hwsfxJSqavaDh1yKkXV3W2-TyhvGdShzpZs_xrCQV32rd5rxIItzkHynov7i6KPhRMjTOfzpbOL_1ijK1wBxrPztz6i3OeFYMVWHhBAPgGet hashmaliciousKnowBe4Browse
                                                            • 52.217.115.240
                                                            la.bot.sh4.elfGet hashmaliciousMiraiBrowse
                                                            • 54.171.230.55
                                                            la.bot.mipsel.elfGet hashmaliciousMiraiBrowse
                                                            • 54.171.230.55
                                                            DHL_734825510.exeGet hashmaliciousFormBookBrowse
                                                            • 13.248.169.48
                                                            https://app.droplet.io/form/K47rYNGet hashmaliciousUnknownBrowse
                                                            • 3.21.252.22
                                                            Platinum Hall County, Georgia Proposal (16.6 KB).docxGet hashmaliciousKnowBe4Browse
                                                            • 108.139.79.89
                                                            mipsel.elfGet hashmaliciousGafgytBrowse
                                                            • 54.171.230.55
                                                            AMAZON-02USFYI_ Remittance Advice - 667543.emlGet hashmaliciousUnknownBrowse
                                                            • 52.33.23.190
                                                            https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp/email.email.panda%C2%ADdoc%C2%AD.net/c/eJxUkE2P2yAQhn-NuWWFARt88CFVY612oypR2m7UywqGwSGJDcLY3c2vryJ1-3EbjeZ99MxrW1Nz4xSxAeYBx_zqbdufVQy8WvbnZ4mHr1v5vX_uDcG2lJxXVAlZk1MLSiPjHKRWYBw4lJZJCRqkEVJZQXzLKBMlo3WpqKz4g6l4zS03pmSmLmVZCIqD9teHqEerbYCHETPx02tOGlCbK7Y5zUiu7SnnOBV8XbCuYJ2O8W8EwlCw7kO_YN3CCt7lcMGx4J8NSlVVAgyKymkGjIKWqBoJ3DlUXIGiDUhX8I6MIXvnQWcfxnsNzgkqLMCqwQZWolF0pTk0K0qZQ7S1QVeTkHo9-tuf0GZ5eheeH9Pm7by_vbzf7PD4ZUdSG09zSoWgIWY_zMOUtXN-7O_-JOHip9-A-fB43HRxdxy-Qfi03b-sbbxIktuPF_8ZV1mnHv_bTPeLpWXkZ0iXKWrAO3SXD-unw3Y8i7e8HH7ki-bz5H4FAAD__zN8qVcGet hashmaliciousUnknownBrowse
                                                            • 52.35.175.3
                                                            https://view.monday.com/7943156422-7d953d66ef734304cc1947de503c6a54?r=use1Get hashmaliciousUnknownBrowse
                                                            • 3.160.188.124
                                                            https://ftp.phishing.guru/XZTVLTzdsZUYrUVQvc2UxelY4RXAyY1lsWllpOGZuODg5eElvOG81SlRoMHJnZ1MwbTRTYVVxVzZlMm5NZTN3Z1Z4K3NxMmZFRUUwc09aYVN3TnJFWE5KRVNJd3RESWEzaGVVRUJOTXFUS1oyaTFpbnhWYmNZMEpzc1FsRmJRTWp4OSt1QWd2djVBa050cXBJTWtQaVo1bG95emZjbHdMNDJTN1ExSkVJV3F2VEZOWnByVFp1eTB0U2h3PT0tLWdwOUd3TlJKYU9yai92dFAtLW1zSmtEb2l5OG5rdkdhS3p4QUkwOXc9PQ==?cid=2305350685&c=E,1,2hwsfxJSqavaDh1yKkXV3W2-TyhvGdShzpZs_xrCQV32rd5rxIItzkHynov7i6KPhRMjTOfzpbOL_1ijK1wBxrPztz6i3OeFYMVWHhBAPgGet hashmaliciousKnowBe4Browse
                                                            • 52.217.115.240
                                                            la.bot.sh4.elfGet hashmaliciousMiraiBrowse
                                                            • 54.171.230.55
                                                            la.bot.mipsel.elfGet hashmaliciousMiraiBrowse
                                                            • 54.171.230.55
                                                            DHL_734825510.exeGet hashmaliciousFormBookBrowse
                                                            • 13.248.169.48
                                                            https://app.droplet.io/form/K47rYNGet hashmaliciousUnknownBrowse
                                                            • 3.21.252.22
                                                            Platinum Hall County, Georgia Proposal (16.6 KB).docxGet hashmaliciousKnowBe4Browse
                                                            • 108.139.79.89
                                                            mipsel.elfGet hashmaliciousGafgytBrowse
                                                            • 54.171.230.55
                                                            No context
                                                            No context
                                                            Process:C:\Windows\MsMpEng.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):525
                                                            Entropy (8bit):5.259753436570609
                                                            Encrypted:false
                                                            SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                                            MD5:260E01CC001F9C4643CA7A62F395D747
                                                            SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                                            SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                                            SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                                            Malicious:false
                                                            Reputation:moderate, very likely benign file
                                                            Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                                            Process:C:\Users\user\Desktop\fBpY1pYq34.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:modified
                                                            Size (bytes):525
                                                            Entropy (8bit):5.259753436570609
                                                            Encrypted:false
                                                            SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                                            MD5:260E01CC001F9C4643CA7A62F395D747
                                                            SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                                            SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                                            SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                                            Malicious:true
                                                            Reputation:moderate, very likely benign file
                                                            Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                                            Process:C:\Windows\MsMpEng.exe
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):87040
                                                            Entropy (8bit):7.320573688132402
                                                            Encrypted:false
                                                            SSDEEP:1536:NX1CKfcCqx+gRJNfxKGU4Q+GhjOwxLfUP0k6rM5cpGPaOK5e:NX4KEp+yJZxKGlYSwxLu0kc5sPe5e
                                                            MD5:06282CDD7FA54EA991FBA55A50F8D8BD
                                                            SHA1:BA2CC621CE142888E001221B881F18DFDF971D16
                                                            SHA-256:5ADACFC1A38F978177F6AA03D8E95E584D75E2CD614AA88A686678F50EC4E0D4
                                                            SHA-512:2A0FC3C07392EC03DBBB9B23910FEC809266D185C73CBF02DC3FBFCA5033D1218EB5BE576A3852888AFBF5A882B9DF6D185D3C4A7394BCC113D584600B60F1D1
                                                            Malicious:true
                                                            Yara Hits:
                                                            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exe, Author: Joe Security
                                                            • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exe, Author: unknown
                                                            • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exe, Author: Brian Wallace @botnet_hunter
                                                            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\08e0b826461df6aaa32a19d4d44ad609.exe, Author: ditekSHen
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 84%
                                                            Reputation:low
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Pg................................. ........@.. ....................................@.................................`...K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc...............R..............@..B........................H........e...E..........................................................&.(......**..(......*.s.........s.........s.........s..........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                                            Process:C:\Windows\MsMpEng.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):26
                                                            Entropy (8bit):3.95006375643621
                                                            Encrypted:false
                                                            SSDEEP:3:ggPYV:rPYV
                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                            Malicious:true
                                                            Reputation:high, very likely benign file
                                                            Preview:[ZoneTransfer]....ZoneId=0
                                                            Process:C:\Users\user\Desktop\fBpY1pYq34.exe
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):87040
                                                            Entropy (8bit):7.320573688132402
                                                            Encrypted:false
                                                            SSDEEP:1536:NX1CKfcCqx+gRJNfxKGU4Q+GhjOwxLfUP0k6rM5cpGPaOK5e:NX4KEp+yJZxKGlYSwxLu0kc5sPe5e
                                                            MD5:06282CDD7FA54EA991FBA55A50F8D8BD
                                                            SHA1:BA2CC621CE142888E001221B881F18DFDF971D16
                                                            SHA-256:5ADACFC1A38F978177F6AA03D8E95E584D75E2CD614AA88A686678F50EC4E0D4
                                                            SHA-512:2A0FC3C07392EC03DBBB9B23910FEC809266D185C73CBF02DC3FBFCA5033D1218EB5BE576A3852888AFBF5A882B9DF6D185D3C4A7394BCC113D584600B60F1D1
                                                            Malicious:true
                                                            Yara Hits:
                                                            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Windows\MsMpEng.exe, Author: Joe Security
                                                            • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Windows\MsMpEng.exe, Author: unknown
                                                            • Rule: njrat1, Description: Identify njRat, Source: C:\Windows\MsMpEng.exe, Author: Brian Wallace @botnet_hunter
                                                            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Windows\MsMpEng.exe, Author: ditekSHen
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 84%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Pg................................. ........@.. ....................................@.................................`...K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc...............R..............@..B........................H........e...E..........................................................&.(......**..(......*.s.........s.........s.........s..........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                                            Process:C:\Users\user\Desktop\fBpY1pYq34.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):26
                                                            Entropy (8bit):3.95006375643621
                                                            Encrypted:false
                                                            SSDEEP:3:ggPYV:rPYV
                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                            Malicious:true
                                                            Preview:[ZoneTransfer]....ZoneId=0
                                                            Process:C:\Windows\MsMpEng.exe
                                                            File Type:Microsoft Windows Autorun file
                                                            Category:dropped
                                                            Size (bytes):50
                                                            Entropy (8bit):4.320240000427043
                                                            Encrypted:false
                                                            SSDEEP:3:It1KV2LKMACovK0x:e1KzxvD
                                                            MD5:5B0B50BADE67C5EC92D42E971287A5D9
                                                            SHA1:90D5C99143E7A56AD6E5EE401015F8ECC093D95A
                                                            SHA-256:04DDE2489D2D2E6846D42250D813AB90B5CA847D527F8F2C022E6C327DC6DB53
                                                            SHA-512:C064DC3C4185A38D1CAEBD069ACB9FDBB85DFB650D6A241036E501A09BC89FD06E267BE9D400D20E6C14B4068473D1C6557962E8D82FDFD191DB7EABB6E66821
                                                            Malicious:true
                                                            Preview:[autorun]..open=C:\svchost.exe..shellexecute=C:\..
                                                            Process:C:\Windows\MsMpEng.exe
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):87040
                                                            Entropy (8bit):7.320573688132402
                                                            Encrypted:false
                                                            SSDEEP:1536:NX1CKfcCqx+gRJNfxKGU4Q+GhjOwxLfUP0k6rM5cpGPaOK5e:NX4KEp+yJZxKGlYSwxLu0kc5sPe5e
                                                            MD5:06282CDD7FA54EA991FBA55A50F8D8BD
                                                            SHA1:BA2CC621CE142888E001221B881F18DFDF971D16
                                                            SHA-256:5ADACFC1A38F978177F6AA03D8E95E584D75E2CD614AA88A686678F50EC4E0D4
                                                            SHA-512:2A0FC3C07392EC03DBBB9B23910FEC809266D185C73CBF02DC3FBFCA5033D1218EB5BE576A3852888AFBF5A882B9DF6D185D3C4A7394BCC113D584600B60F1D1
                                                            Malicious:true
                                                            Yara Hits:
                                                            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\svchost.exe, Author: Joe Security
                                                            • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\svchost.exe, Author: unknown
                                                            • Rule: njrat1, Description: Identify njRat, Source: C:\svchost.exe, Author: Brian Wallace @botnet_hunter
                                                            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\svchost.exe, Author: ditekSHen
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 84%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Pg................................. ........@.. ....................................@.................................`...K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc...............R..............@..B........................H........e...E..........................................................&.(......**..(......*.s.........s.........s.........s..........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                                            Process:C:\Windows\MsMpEng.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):26
                                                            Entropy (8bit):3.95006375643621
                                                            Encrypted:false
                                                            SSDEEP:3:ggPYV:rPYV
                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                            Malicious:true
                                                            Preview:[ZoneTransfer]....ZoneId=0
                                                            Process:C:\Windows\SysWOW64\netsh.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):313
                                                            Entropy (8bit):4.971939296804078
                                                            Encrypted:false
                                                            SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
                                                            MD5:689E2126A85BF55121488295EE068FA1
                                                            SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
                                                            SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
                                                            SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
                                                            Malicious:false
                                                            Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):7.320573688132402
                                                            TrID:
                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                            • Windows Screen Saver (13104/52) 0.07%
                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                            File name:fBpY1pYq34.exe
                                                            File size:87'040 bytes
                                                            MD5:06282cdd7fa54ea991fba55a50f8d8bd
                                                            SHA1:ba2cc621ce142888e001221b881f18dfdf971d16
                                                            SHA256:5adacfc1a38f978177f6aa03d8e95e584d75e2cd614aa88a686678f50ec4e0d4
                                                            SHA512:2a0fc3c07392ec03dbbb9b23910fec809266d185c73cbf02dc3fbfca5033d1218eb5be576a3852888afbf5a882b9df6d185d3c4a7394bcc113d584600b60f1d1
                                                            SSDEEP:1536:NX1CKfcCqx+gRJNfxKGU4Q+GhjOwxLfUP0k6rM5cpGPaOK5e:NX4KEp+yJZxKGlYSwxLu0kc5sPe5e
                                                            TLSH:5383CF4DBBE081A8C4BD297749B2E41207BAF14F2A53ED1D8FE5549E37335818BA0DE1
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Pg................................. ........@.. ....................................@................................
                                                            Icon Hash:0ff1f83b1b5a3b0f
                                                            Entrypoint:0x40abae
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x67509E11 [Wed Dec 4 18:23:13 2024 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                            Instruction
                                                            jmp dword ptr [00402000h]
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xab600x4b.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000xc288.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1a0000xc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x20000x8bb40x8c00939fa9ad853c0b58226bd4f09d773ffcFalse0.4636439732142857data5.604687559089036IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rsrc0xc0000xc2880xc400a29dd8502d5e6f73493da1b185c7de9aFalse0.9878228635204082data7.983859079724822IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0x1a0000xc0x20014e8c9d445c6e20e65bc602fcc627817False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_ICON0xc0e80xbfa3PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced1.000428056014187
                                                            RT_GROUP_ICON0x1808c0x14data0.95
                                                            RT_MANIFEST0x180a00x1e7XML 1.0 document, ASCII text, with CRLF line terminators0.5338809034907598
                                                            DLLImport
                                                            mscoree.dll_CorExeMain
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2024-12-06T20:42:00.277565+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:42:00.277565+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.44973018.157.68.7319294TCP
                                                            2024-12-06T20:42:00.277565+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:42:00.277565+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:42:12.182745+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.44973018.157.68.7319294TCP
                                                            2024-12-06T20:42:12.182745+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.44973018.157.68.7319294TCP
                                                            2024-12-06T20:42:12.309557+01002825563ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (inf)1192.168.2.44973018.157.68.7319294TCP
                                                            2024-12-06T20:42:12.309557+01002838486ETPRO MALWARE njRAT/Bladabindi Variant CnC Activity (inf)1192.168.2.44973018.157.68.7319294TCP
                                                            2024-12-06T20:42:16.621790+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.44973018.157.68.7319294TCP
                                                            2024-12-06T20:42:32.871746+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.44973018.157.68.7319294TCP
                                                            2024-12-06T20:42:41.027908+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.44973018.157.68.7319294TCP
                                                            2024-12-06T20:43:07.278115+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.44973018.157.68.7319294TCP
                                                            2024-12-06T20:43:08.141766+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.44973018.157.68.7319294TCP
                                                            2024-12-06T20:43:10.902941+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.44973018.157.68.7319294TCP
                                                            2024-12-06T20:43:11.027925+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.44973018.157.68.7319294TCP
                                                            2024-12-06T20:43:12.152899+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.44973018.157.68.7319294TCP
                                                            2024-12-06T20:43:16.100859+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:16.100859+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:18.747502+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:20.326350+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:21.053448+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:21.173763+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:21.294327+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:21.788075+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:22.508637+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:23.838186+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:24.202195+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:24.327692+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:24.770942+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:25.976557+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:26.096740+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:26.820404+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:27.421269+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:27.662676+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:28.384945+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:28.868933+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:28.988807+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:29.135388+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:30.702071+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:31.302771+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:32.038737+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:32.645349+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:33.005564+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:33.246801+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:33.978655+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:34.701498+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:34.941452+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:35.794251+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:36.397247+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:36.397247+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:37.122048+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:38.331225+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:38.331225+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:38.451430+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:39.382357+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:39.502291+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:39.650934+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:39.771285+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:40.132547+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:40.617382+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:40.858653+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:42.186677+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:42.306742+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:42.672552+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:43.285204+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:44.489895+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:44.612543+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:45.942787+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:46.544217+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:46.544217+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:47.396729+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:47.756738+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:48.604558+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:48.970186+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:49.838354+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:49.958267+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:50.239786+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:50.850982+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:51.091660+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:51.458405+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:51.578468+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:51.698516+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:51.818421+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:52.233831+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:53.688573+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:54.288630+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:55.035273+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:56.476910+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:57.077347+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:57.942305+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:58.184485+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:58.451107+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:58.571447+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:58.849252+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:58.969398+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:59.207196+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:59.460587+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:59.703464+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:43:59.823997+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:00.558073+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:00.920181+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:01.040800+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:01.562696+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:01.926134+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:03.251498+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:03.371767+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:03.991120+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:03.991120+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:04.355611+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:04.599437+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:04.720246+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:05.928208+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:06.288575+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:06.648834+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:07.369155+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:07.728682+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:08.090883+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:09.314289+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:09.434120+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:09.914983+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:10.518383+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:10.638262+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4497823.126.37.1819294TCP
                                                            2024-12-06T20:44:21.118862+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:44:21.118862+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:44:21.239430+01002825563ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (inf)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:44:21.239430+01002838486ETPRO MALWARE njRAT/Bladabindi Variant CnC Activity (inf)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:44:21.999483+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:45:04.202437+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:45:06.504711+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:45:13.544110+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:45:13.794092+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:45:14.856573+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:45:14.981542+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:45:16.099638+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:45:16.219500+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:45:18.229957+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:45:18.354125+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:45:19.219713+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:45:20.181620+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:45:20.301531+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:45:21.153265+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:45:21.876830+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:45:22.250604+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:45:22.250604+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:45:23.261636+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.4499253.126.37.1819294TCP
                                                            2024-12-06T20:45:26.104707+01002033132ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:26.104707+01002021176ET MALWARE Bladabindi/njRAT CnC Command (ll)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:26.584710+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:27.428623+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:27.985277+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:28.179438+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:28.300617+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:29.382821+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:30.274563+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:30.636835+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:30.876971+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:31.360586+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:32.829162+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:33.428954+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:34.151398+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:34.882872+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:35.139444+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:35.742916+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:35.862816+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:36.103536+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:36.223505+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:36.349982+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:36.595198+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:36.716966+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:37.440088+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:37.560335+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:37.920256+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:38.542590+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:39.643857+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:41.709784+01002814860ETPRO MALWARE njRAT/Bladabindi CnC Callback (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:42.190453+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:42.432748+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:42.555273+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:42.771963+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:42.894855+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:43.399469+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:44.239590+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            2024-12-06T20:45:44.359733+01002825564ETPRO MALWARE Generic njRAT/Bladabindi CnC Activity (act)1192.168.2.45000518.197.239.519294TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Dec 6, 2024 20:42:11.552701950 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:42:11.673397064 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:42:11.673492908 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:42:12.182744980 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:42:12.309484959 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:42:12.309556961 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:42:12.430006981 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:42:16.621789932 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:42:16.742916107 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:42:32.871746063 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:42:32.992033958 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:42:41.027908087 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:42:41.148072958 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:07.278115034 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:43:07.398096085 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:08.141766071 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:43:08.271409035 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:10.902940989 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:43:11.022680044 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:11.027925014 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:43:11.147787094 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:12.152899027 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:43:12.272716999 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:12.272795916 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:43:12.392548084 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:12.392601013 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:43:12.512520075 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:12.514626026 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:43:12.637378931 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:12.637753963 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:43:12.757390022 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:12.758590937 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:43:12.878546000 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:12.878608942 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:43:12.998341084 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:13.000174046 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:43:13.119925976 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:13.120604992 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:43:13.240345955 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:13.240581036 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:43:13.361830950 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:13.362600088 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:43:13.482372999 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:13.482619047 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:43:13.602365971 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:13.602466106 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:43:13.722704887 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:13.722775936 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:43:13.741313934 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:13.744504929 CET4973019294192.168.2.418.157.68.73
                                                            Dec 6, 2024 20:43:13.842622995 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:13.864286900 CET192944973018.157.68.73192.168.2.4
                                                            Dec 6, 2024 20:43:15.977567911 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:16.098021030 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:16.098120928 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:16.100858927 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:16.220549107 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:16.220634937 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:16.342077971 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:16.342135906 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:16.462013006 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:16.462070942 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:16.581770897 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:16.581867933 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:16.702353001 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:16.702452898 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:16.822388887 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:16.822537899 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:16.942682981 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:16.942739010 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:17.062609911 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:17.064518929 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:17.184181929 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:17.184263945 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:17.304167032 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:17.304249048 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:17.424104929 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:17.424201965 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:17.544059038 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:17.544142008 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:17.663935900 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:17.664272070 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:17.784564972 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:17.785043955 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:17.905033112 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:17.905122042 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:18.024969101 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:18.025039911 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:18.146361113 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:18.146440983 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:18.266222954 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:18.267004967 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:18.386961937 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:18.387018919 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:18.506854057 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:18.507086039 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:18.627477884 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:18.627574921 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:18.747415066 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:18.747502089 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:18.867434025 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:18.867501974 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:18.988625050 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:18.988686085 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:19.109154940 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:19.109225988 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:19.229219913 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:19.229291916 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:19.349178076 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:19.349235058 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:19.471255064 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:19.471311092 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:19.591126919 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:19.591308117 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:19.711154938 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:19.711218119 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:19.831074953 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:19.832529068 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:19.953450918 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:19.954204082 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:20.074390888 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:20.074737072 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:20.194951057 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:20.196526051 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:20.325881004 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:20.326349974 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:20.446280003 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:20.447352886 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:20.567806959 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:20.567866087 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:20.687846899 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:20.688538074 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:20.808998108 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:20.812527895 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:20.933310032 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:20.933384895 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:21.053395033 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:21.053447962 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:21.173672915 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:21.173763037 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:21.294277906 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:21.294327021 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:21.415524960 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:21.788074970 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:21.907792091 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:21.907849073 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:22.028265953 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:22.028316975 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:22.148065090 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:22.148123980 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:22.267908096 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:22.267988920 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:22.387794971 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:22.387865067 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:22.507724047 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:22.508636951 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:22.628590107 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:22.628652096 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:22.748815060 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:22.752537966 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:22.873697996 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:22.873765945 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:22.993947983 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:22.994041920 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:23.113970041 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:23.114037037 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:23.234268904 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:23.234355927 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:23.354929924 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:23.355148077 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:23.475090027 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:23.475155115 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:23.595204115 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:23.597695112 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:23.717614889 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:23.717983007 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:23.837969065 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:23.838186026 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:23.958209991 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:23.960628986 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:24.080476046 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:24.081218004 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:24.202056885 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:24.202194929 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:24.327521086 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:24.327692032 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:24.447805882 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:24.770941973 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:24.890769958 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:24.890830040 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:25.010792017 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:25.010850906 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:25.131218910 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:25.132008076 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:25.251837015 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:25.254853964 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:25.374934912 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:25.374990940 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:25.494802952 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:25.494856119 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:25.615619898 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:25.615683079 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:25.735647917 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:25.736545086 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:25.856395006 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:25.856534958 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:25.976502895 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:25.976557016 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:26.096681118 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:26.096740007 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:26.216892004 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:26.216974020 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:26.337474108 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:26.337544918 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:26.457511902 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:26.457583904 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:26.577585936 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:26.577661037 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:26.700222015 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:26.700351954 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:26.820152044 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:26.820404053 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:26.940438986 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:26.940543890 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:27.060439110 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:27.060503006 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:27.180304050 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:27.180362940 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:27.300338030 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:27.300386906 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:27.421032906 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:27.421268940 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:27.542402029 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:27.542453051 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:27.662484884 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:27.662676096 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:27.782809973 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:27.782959938 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:27.902782917 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:27.902839899 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:28.023360968 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:28.023411989 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:28.143543005 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:28.143619061 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:28.263394117 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:28.263498068 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:28.384890079 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:28.384944916 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:28.506182909 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:28.508522034 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:28.628319979 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:28.628388882 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:28.748965979 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:28.749034882 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:28.868868113 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:28.868932962 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:28.988725901 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:28.988806963 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:29.108939886 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:29.135387897 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:29.255723000 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:29.255796909 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:29.375654936 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:29.375724077 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:29.496412992 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:29.496871948 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:29.616897106 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:29.617054939 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:29.736828089 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:29.738677979 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:29.858472109 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:29.858726978 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:29.978657007 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:29.978744030 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:30.099073887 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:30.099148035 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:30.218991995 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:30.219074011 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:30.339061022 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:30.339167118 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:30.459858894 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:30.459942102 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:30.581502914 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:30.581574917 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:30.701993942 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:30.702070951 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:30.822107077 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:30.822197914 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:30.942106009 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:30.942184925 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:31.062186003 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:31.062275887 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:31.182199001 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:31.182656050 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:31.302711010 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:31.302771091 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:31.425529003 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:31.426707983 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:31.546540022 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:31.550561905 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:31.673065901 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:31.674621105 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:31.794826984 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:31.798584938 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:31.918514013 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:31.918629885 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:32.038573980 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:32.038737059 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:32.158761978 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:32.162870884 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:32.282752991 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:32.282803059 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:32.405036926 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:32.405268908 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:32.525145054 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:32.525243998 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:32.645275116 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:32.645349026 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:32.765152931 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:32.765206099 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:32.885248899 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:32.885349989 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:33.005479097 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:33.005563974 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:33.125921011 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:33.126053095 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:33.245955944 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:33.246800900 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:33.366676092 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:33.370624065 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:33.490489960 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:33.490619898 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:33.611506939 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:33.614583015 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:33.735841990 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:33.736310959 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:33.858438969 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:33.858510971 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:33.978588104 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:33.978655100 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:34.099482059 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:34.099555969 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:34.219777107 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:34.219825029 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:34.339732885 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:34.339782953 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:34.460984945 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:34.461050987 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:34.581142902 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:34.581212044 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:34.701438904 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:34.701498032 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:34.821496964 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:34.821561098 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:34.941401958 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:34.941452026 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:35.061228991 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:35.062546015 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:35.182523966 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:35.184536934 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:35.304610014 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:35.308422089 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:35.430876017 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:35.432538033 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:35.552426100 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:35.552506924 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:35.673012972 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:35.674124002 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:35.794193029 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:35.794250965 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:35.914061069 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:35.914874077 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:36.034928083 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:36.035005093 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:36.155858040 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:36.155926943 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:36.276335001 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:36.276388884 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:36.397200108 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:36.397247076 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:36.517102957 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:36.517148972 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:36.640439987 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:36.640551090 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:36.760611057 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:36.760696888 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:36.881597996 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:36.881654024 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:37.002012014 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:37.002063990 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:37.121994019 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:37.122047901 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:37.241900921 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:37.241986990 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:37.362432957 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:37.362577915 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:37.482384920 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:37.484374046 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:37.604360104 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:37.604471922 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:37.724431038 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:37.724513054 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:37.844306946 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:37.844386101 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:37.964653015 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:37.965490103 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:38.085325956 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:38.085387945 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:38.208192110 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:38.208241940 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:38.331180096 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:38.331224918 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:38.451376915 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:38.451430082 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:38.571722984 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:38.571865082 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:38.692068100 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:38.692117929 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:38.812155008 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:38.812227964 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:38.931942940 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:38.932020903 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:39.052047968 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:39.052119017 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:39.235018015 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:39.235367060 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:39.382075071 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:39.382356882 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:39.502232075 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:39.502290964 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:39.622153997 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:39.650933981 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:39.770937920 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:39.771285057 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:39.891001940 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:39.892559052 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:40.012398005 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:40.012579918 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:40.132461071 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:40.132546902 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:40.253905058 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:40.253963947 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:40.373745918 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:40.373831987 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:40.493721962 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:40.494637012 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:40.615832090 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:40.617382050 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:40.737307072 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:40.738044977 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:40.857933044 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:40.858653069 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:40.978677988 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:40.978774071 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:41.098627090 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:41.098695040 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:41.221534014 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:41.221590042 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:41.341653109 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:41.341721058 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:41.461796999 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:41.463054895 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:41.582963943 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:41.583018064 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:41.703421116 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:41.703666925 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:41.823573112 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:41.823646069 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:41.943624020 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:41.946754932 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:42.066550016 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:42.066627979 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:42.186615944 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:42.186676979 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:42.306690931 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:42.306741953 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:42.427721024 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:42.427778006 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:42.547914982 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:42.548595905 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:42.670622110 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:42.672552109 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:42.792519093 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:42.793503046 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:42.916560888 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:42.920561075 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:43.040379047 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:43.041889906 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:43.162081957 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:43.162134886 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:43.285154104 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:43.285203934 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:43.405219078 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:43.405270100 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:43.525425911 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:43.525490999 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:43.645366907 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:43.645421028 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:43.765268087 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:43.765388012 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:43.885526896 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:43.885596991 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:44.005595922 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:44.005670071 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:44.125425100 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:44.125503063 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:44.245748043 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:44.245812893 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:44.365710020 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:44.367490053 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:44.489295959 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:44.489895105 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:44.612411022 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:44.612543106 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:44.732932091 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:44.736557961 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:44.856420994 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:44.857696056 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:44.977503061 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:44.980561972 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:45.100799084 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:45.100879908 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:45.221086979 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:45.221158981 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:45.341475010 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:45.341562033 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:45.461427927 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:45.461520910 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:45.581590891 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:45.581760883 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:45.701648951 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:45.701704025 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:45.822027922 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:45.822688103 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:45.942667007 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:45.942786932 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:46.062612057 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:46.062685013 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:46.182466030 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:46.182537079 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:46.303160906 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:46.303261995 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:46.423482895 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:46.424146891 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:46.544131994 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:46.544217110 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:46.664118052 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:46.666593075 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:46.787122965 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:46.790688038 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:46.910898924 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:46.914587975 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:47.035761118 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:47.036549091 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:47.156570911 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:47.156624079 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:47.276544094 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:47.276634932 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:47.396581888 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:47.396728992 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:47.516732931 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:47.516789913 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:47.636784077 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:47.636828899 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:47.756685972 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:47.756737947 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:47.876471043 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:47.876554012 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:47.997118950 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:47.997256994 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:48.117038012 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:48.117095947 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:48.237149000 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:48.239564896 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:48.359373093 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:48.359574080 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:48.480535984 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:48.482377052 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:48.602647066 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:48.604557991 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:48.724437952 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:48.728569984 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:48.850080013 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:48.850157976 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:48.970129967 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:48.970185995 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:49.090043068 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:49.090425968 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:49.213660002 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:49.213723898 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:49.338368893 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:49.338473082 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:49.461529970 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:49.461606979 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:49.585740089 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:49.585848093 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:49.707034111 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:49.707119942 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:49.827142000 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:49.838354111 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:49.958218098 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:49.958266973 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:50.078572989 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:50.078707933 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:50.239717007 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:50.239785910 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:50.360316038 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:50.360400915 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:50.481323004 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:50.482459068 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:50.608978987 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:50.609046936 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:50.729720116 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:50.731012106 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:50.850908995 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:50.850981951 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:50.970803976 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:50.971652031 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:51.091578960 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:51.091660023 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:51.213526964 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:51.213577986 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:51.333451033 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:51.333524942 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:51.453542948 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:51.458405018 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:51.578398943 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:51.578468084 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:51.698452950 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:51.698515892 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:51.818347931 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:51.818420887 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:51.940936089 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:52.233830929 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:52.354254007 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:52.354310036 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:52.476443052 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:52.476511002 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:52.596597910 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:52.596692085 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:52.718950033 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:52.719007015 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:52.838850975 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:52.838938951 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:52.958755016 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:52.960568905 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:53.080319881 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:53.080569983 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:53.200356007 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:53.200422049 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:53.320246935 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:53.324604034 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:53.444525003 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:53.445720911 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:53.565540075 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:53.566203117 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:53.686259985 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:53.688572884 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:53.808429956 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:53.808564901 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:53.928280115 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:53.928596973 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:54.048619986 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:54.048784971 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:54.168719053 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:54.168771982 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:54.288573027 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:54.288630009 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:54.409035921 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:55.035273075 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:55.155261993 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:55.155322075 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:55.275054932 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:55.275291920 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:55.395237923 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:55.395343065 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:55.515079021 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:55.515163898 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:55.635055065 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:55.636570930 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:55.756458998 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:55.756556988 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:55.876326084 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:55.877054930 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:55.996953011 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:55.997045040 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:56.116766930 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:56.116827011 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:56.237140894 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:56.237205029 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:56.356990099 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:56.357054949 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:56.476844072 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:56.476910114 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:56.596780062 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:56.596848965 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:56.716905117 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:56.716958046 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:56.837095976 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:56.837166071 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:56.957493067 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:56.957544088 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:57.077295065 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:57.077347040 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:57.197173119 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:57.197231054 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:57.328155041 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:57.328593016 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:57.448493004 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:57.448599100 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:57.569144011 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:57.572679043 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:57.694468021 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:57.696595907 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:57.819036007 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:57.820199966 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:57.941253901 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:57.942305088 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:58.062273979 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:58.064582109 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:58.184408903 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:58.184484959 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:58.304297924 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:58.451107025 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:58.571382999 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:58.571446896 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:58.693842888 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:58.849251986 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:58.969343901 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:58.969398022 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:59.090426922 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:59.207195997 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:59.332815886 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:59.336678028 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:59.456595898 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:59.460587025 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:59.580495119 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:59.580581903 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:59.703125954 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:59.703464031 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:59.823339939 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:59.823997021 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:43:59.943746090 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:43:59.944585085 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:00.064366102 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:00.064582109 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:00.185195923 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:00.188590050 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:00.311881065 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:00.311944962 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:00.434642076 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:00.434700966 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:00.558023930 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:00.558073044 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:00.678064108 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:00.678143024 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:00.798593044 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:00.798649073 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:00.920135021 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:00.920181036 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:01.040740013 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:01.040800095 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:01.247273922 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:01.247337103 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:01.442344904 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:01.442745924 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:01.562612057 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:01.562695980 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:01.683177948 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:01.684181929 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:01.804390907 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:01.804935932 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:01.926057100 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:01.926134109 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:02.045958042 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:02.046037912 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:02.166157007 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:02.166708946 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:02.286657095 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:02.286710978 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:02.407274008 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:02.407347918 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:02.527118921 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:02.527189970 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:02.647078037 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:02.647133112 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:02.767235994 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:02.767287016 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:02.889581919 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:02.889642000 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:03.009537935 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:03.009612083 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:03.129425049 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:03.129491091 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:03.250685930 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:03.251497984 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:03.371335030 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:03.371767044 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:03.491723061 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:03.991120100 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:04.111092091 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:04.114595890 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:04.234419107 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:04.234488010 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:04.355560064 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:04.355611086 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:04.475476980 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:04.475532055 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:04.599379063 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:04.599436998 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:04.720199108 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:04.720246077 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:04.840104103 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:04.840162039 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:04.960356951 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:04.960412025 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:05.080406904 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:05.080468893 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:05.200591087 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:05.200649977 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:05.320405960 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:05.320681095 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:05.447289944 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:05.447565079 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:05.567357063 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:05.567497969 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:05.687314987 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:05.688618898 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:05.808382034 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:05.808471918 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:05.928102970 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:05.928208113 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:06.047905922 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:06.048068047 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:06.167916059 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:06.168139935 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:06.288522959 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:06.288574934 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:06.408765078 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:06.408818007 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:06.528923035 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:06.528981924 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:06.648745060 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:06.648833990 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:06.768939972 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:06.768991947 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:06.888753891 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:06.888848066 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:07.008794069 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:07.008984089 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:07.128851891 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:07.129024982 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:07.248754978 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:07.249285936 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:07.369088888 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:07.369154930 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:07.488967896 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:07.489018917 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:07.608760118 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:07.608805895 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:07.728576899 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:07.728682041 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:07.848412037 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:07.848597050 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:07.968419075 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:07.970695019 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:08.090739012 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:08.090883017 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:08.210935116 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:08.214957952 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:08.335025072 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:08.338736057 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:08.458643913 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:08.462598085 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:08.582673073 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:08.586745024 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:08.706510067 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:08.706717968 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:08.826574087 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:08.826805115 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:08.946651936 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:08.946867943 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:09.066757917 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:09.070703983 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:09.190502882 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:09.192609072 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:09.314234018 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:09.314289093 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:09.434056044 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:09.434119940 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:09.554116964 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:09.554204941 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:09.674411058 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:09.674458981 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:09.794189930 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:09.794244051 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:09.914923906 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:09.914983034 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:10.036439896 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:10.036516905 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:10.156407118 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:10.156572104 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:10.276465893 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:10.278322935 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:10.398027897 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:10.398097038 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:10.518018007 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:10.518383026 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:10.638175011 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:10.638262033 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:10.758342028 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:10.758779049 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:10.879175901 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:10.880683899 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:11.007235050 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:18.738699913 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:18.740623951 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:20.747426987 CET4978219294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:20.867252111 CET19294497823.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:20.993246078 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:21.113204002 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:21.116719961 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:21.118861914 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:21.239362001 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:21.239429951 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:21.359256029 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:44:21.999483109 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:44:22.120712996 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:04.202436924 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:04.322758913 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:06.504710913 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:06.624546051 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:13.544110060 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:13.664041042 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:13.794091940 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:13.914174080 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:14.856573105 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:14.976340055 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:14.981542110 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:15.102473021 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:16.099637985 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:16.219449043 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:16.219500065 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:16.339854956 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:16.339955091 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:16.468518972 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:16.468579054 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:16.651174068 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:16.651251078 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:16.771070004 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:16.771266937 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:16.892688990 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:16.896716118 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:17.017920971 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:17.017973900 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:17.141179085 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:17.141233921 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:17.261830091 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:17.264714003 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:17.387419939 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:17.387481928 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:17.507437944 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:17.507488966 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:17.627263069 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:17.627329111 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:17.747136116 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:17.747385979 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:17.867161036 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:17.867227077 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:17.986893892 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:17.986954927 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:18.106718063 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:18.108707905 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:18.228619099 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:18.229957104 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:18.349889994 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:18.354125023 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:18.476473093 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:18.478750944 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:18.601852894 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:18.601959944 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:18.727432966 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:18.727724075 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:18.851054907 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:18.856746912 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:18.976593971 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:18.976742983 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:19.096601963 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:19.096698999 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:19.219233036 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:19.219712973 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:19.340780020 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:19.340836048 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:19.461193085 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:19.461255074 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:19.581239939 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:19.581293106 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:19.701101065 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:19.701153040 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:19.821078062 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:19.821135998 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:19.940974951 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:19.941062927 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:20.061494112 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:20.061701059 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:20.181531906 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:20.181619883 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:20.301440001 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:20.301531076 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:20.421500921 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:20.422751904 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:20.542889118 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:20.543080091 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:20.666740894 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:20.666837931 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:20.790282965 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:20.790875912 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:20.910659075 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:20.911031008 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:21.031438112 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:21.032736063 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:21.152646065 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:21.153264999 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:21.273113966 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:21.274991989 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:21.394944906 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:21.395047903 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:21.515414000 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:21.515494108 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:21.635299921 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:21.635356903 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:21.755631924 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:21.755691051 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:21.876776934 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:21.876830101 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:21.996854067 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:21.996973038 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:22.123519897 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:22.123594046 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:22.250504017 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:22.250603914 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:22.371347904 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:22.371833086 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:22.492017984 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:22.496731043 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:22.618288994 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:22.619779110 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:22.897573948 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:22.898803949 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:23.018754005 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:23.018903017 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:23.138741970 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:23.140605927 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:23.260615110 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:23.261636019 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:23.382637024 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:23.382756948 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:23.502856016 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:23.502943039 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:23.622998953 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:23.623064041 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:23.736206055 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:23.736268997 CET4992519294192.168.2.43.126.37.18
                                                            Dec 6, 2024 20:45:23.742779016 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:23.856220961 CET19294499253.126.37.18192.168.2.4
                                                            Dec 6, 2024 20:45:25.982089996 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:26.102052927 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:26.102130890 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:26.104707003 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:26.224497080 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:26.224555016 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:26.344386101 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:26.344543934 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:26.464315891 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:26.464549065 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:26.584359884 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:26.584709883 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:26.704632044 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:26.704762936 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:26.824615002 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:26.824773073 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:26.944576025 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:26.944757938 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:27.064552069 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:27.064789057 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:27.184561968 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:27.184731960 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:27.305290937 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:27.308773994 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:27.428570032 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:27.428622961 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:27.548614979 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:27.985276937 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:28.105467081 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:28.179438114 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:28.299207926 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:28.300616980 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:28.420387030 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:28.420476913 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:28.540257931 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:28.540340900 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:28.660198927 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:28.660280943 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:28.780205011 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:28.780262947 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:28.900044918 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:28.900118113 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:29.019917965 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:29.019995928 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:29.139754057 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:29.142862082 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:29.262722015 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:29.262803078 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:29.382705927 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:29.382821083 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:29.503488064 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:29.506844997 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:29.626761913 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:29.627731085 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:29.749859095 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:29.752790928 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:29.872554064 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:29.876804113 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:29.997137070 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:29.997751951 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:30.117902040 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:30.118908882 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:30.238991022 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:30.274563074 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:30.394434929 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:30.394572973 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:30.515079021 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:30.515161037 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:30.636737108 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:30.636835098 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:30.756836891 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:30.756896019 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:30.876909018 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:30.876971006 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:30.997149944 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:30.997226954 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:31.119990110 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:31.120047092 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:31.240142107 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:31.240204096 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:31.360522985 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:31.360585928 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:31.480993032 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:31.481072903 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:31.601488113 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:31.601558924 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:31.723150969 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:31.723977089 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:31.843903065 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:31.843988895 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:31.966903925 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:31.970312119 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:32.090318918 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:32.090405941 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:32.212133884 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:32.212594032 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:32.348328114 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:32.348747015 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:32.468640089 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:32.468750954 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:32.588725090 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:32.588968992 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:32.709059954 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:32.709151030 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:32.829039097 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:32.829161882 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:32.949012041 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:32.949212074 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:33.069365025 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:33.069444895 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:33.189240932 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:33.189363003 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:33.309106112 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:33.309165955 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:33.428891897 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:33.428953886 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:33.549120903 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:33.549189091 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:33.669029951 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:33.669095993 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:33.788866043 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:33.788925886 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:33.911294937 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:33.911359072 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:34.031263113 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:34.031472921 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:34.151334047 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:34.151397943 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:34.271224976 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:34.271322012 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:34.394042015 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:34.394802094 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:34.515763998 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:34.515850067 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:34.635770082 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:34.638932943 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:34.759119987 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:34.762800932 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:34.882675886 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:34.882872105 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:35.002793074 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:35.003803015 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:35.123699903 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:35.139444113 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:35.260019064 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:35.262761116 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:35.382919073 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:35.382987022 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:35.502901077 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:35.502959013 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:35.622773886 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:35.622833967 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:35.742855072 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:35.742916107 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:35.862761021 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:35.862816095 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:35.982667923 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:35.982731104 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:36.103406906 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:36.103535891 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:36.223376989 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:36.223505020 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:36.349906921 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:36.349982023 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:36.471632957 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:36.472630978 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:36.595115900 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:36.595197916 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:36.715167046 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:36.716965914 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:36.836882114 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:36.838835955 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:36.959278107 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:36.959362030 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:37.079340935 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:37.079417944 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:37.200057983 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:37.200167894 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:37.320168972 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:37.320256948 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:37.440015078 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:37.440088034 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:37.560277939 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:37.560334921 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:37.680248976 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:37.680319071 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:37.800339937 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:37.800401926 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:37.920197010 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:37.920255899 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:38.056128979 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:38.056190014 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:38.299547911 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:38.299669027 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:38.421412945 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:38.421751976 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:38.541508913 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:38.542589903 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:38.662518024 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:38.662909031 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:38.782939911 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:38.788769007 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:38.908685923 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:38.911115885 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:39.031130075 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:39.034945965 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:39.155030012 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:39.157303095 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:39.277221918 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:39.278784037 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:39.398833990 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:39.398984909 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:39.518800974 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:39.518883944 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:39.643749952 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:39.643857002 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:39.763773918 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:39.763828993 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:39.883589029 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:39.883646011 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:40.003460884 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:40.003518105 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:40.123595953 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:40.123653889 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:40.243510008 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:40.243566990 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:40.363442898 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:40.363498926 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:40.483618975 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:40.486835957 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:40.610857010 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:40.612169981 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:40.733206034 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:40.733266115 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:40.855726004 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:40.856388092 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:40.977260113 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:40.980766058 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:41.100722075 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:41.104770899 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:41.226625919 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:41.228758097 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:41.349239111 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:41.350116014 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:41.469882011 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:41.469943047 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:41.589729071 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:41.589831114 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:41.709702015 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:41.709784031 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:41.829984903 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:41.830070019 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:41.950093031 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:41.950160980 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:42.070163012 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:42.070225000 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:42.190397978 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:42.190453053 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:42.310275078 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:42.310333014 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:42.430691957 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:42.432748079 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:42.555108070 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:42.555273056 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:42.675308943 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:42.771962881 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:42.891915083 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:42.894855022 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:43.014868021 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:43.399468899 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:43.519270897 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:43.519328117 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:43.639648914 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:43.639744043 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:43.759473085 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:43.759553909 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:43.879297972 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:43.879378080 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:43.999152899 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:43.999202967 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:44.119379997 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:44.119457006 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:44.239517927 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:44.239589930 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:44.359500885 CET192945000518.197.239.5192.168.2.4
                                                            Dec 6, 2024 20:45:44.359733105 CET5000519294192.168.2.418.197.239.5
                                                            Dec 6, 2024 20:45:44.479594946 CET192945000518.197.239.5192.168.2.4
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Dec 6, 2024 20:42:10.954665899 CET5810053192.168.2.41.1.1.1
                                                            Dec 6, 2024 20:42:11.530965090 CET53581001.1.1.1192.168.2.4
                                                            Dec 6, 2024 20:43:15.748929024 CET5724253192.168.2.41.1.1.1
                                                            Dec 6, 2024 20:43:15.976728916 CET53572421.1.1.1192.168.2.4
                                                            Dec 6, 2024 20:44:20.755745888 CET6183753192.168.2.41.1.1.1
                                                            Dec 6, 2024 20:44:20.990926027 CET53618371.1.1.1192.168.2.4
                                                            Dec 6, 2024 20:45:25.748755932 CET6209353192.168.2.41.1.1.1
                                                            Dec 6, 2024 20:45:25.981053114 CET53620931.1.1.1192.168.2.4
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Dec 6, 2024 20:42:10.954665899 CET192.168.2.41.1.1.10xbe7Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                            Dec 6, 2024 20:43:15.748929024 CET192.168.2.41.1.1.10xb04aStandard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                            Dec 6, 2024 20:44:20.755745888 CET192.168.2.41.1.1.10x2236Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                            Dec 6, 2024 20:45:25.748755932 CET192.168.2.41.1.1.10x3be1Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Dec 6, 2024 20:42:11.530965090 CET1.1.1.1192.168.2.40xbe7No error (0)2.tcp.eu.ngrok.io18.157.68.73A (IP address)IN (0x0001)false
                                                            Dec 6, 2024 20:43:15.976728916 CET1.1.1.1192.168.2.40xb04aNo error (0)2.tcp.eu.ngrok.io3.126.37.18A (IP address)IN (0x0001)false
                                                            Dec 6, 2024 20:44:20.990926027 CET1.1.1.1192.168.2.40x2236No error (0)2.tcp.eu.ngrok.io3.126.37.18A (IP address)IN (0x0001)false
                                                            Dec 6, 2024 20:45:25.981053114 CET1.1.1.1192.168.2.40x3be1No error (0)2.tcp.eu.ngrok.io18.197.239.5A (IP address)IN (0x0001)false

                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:14:41:54
                                                            Start date:06/12/2024
                                                            Path:C:\Users\user\Desktop\fBpY1pYq34.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\fBpY1pYq34.exe"
                                                            Imagebase:0x8f0000
                                                            File size:87'040 bytes
                                                            MD5 hash:06282CDD7FA54EA991FBA55A50F8D8BD
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.1647033528.00000000008F2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000000.1647033528.00000000008F2000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                            • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000000.1647033528.00000000008F2000.00000002.00000001.01000000.00000003.sdmp, Author: Brian Wallace @botnet_hunter
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:1
                                                            Start time:14:42:01
                                                            Start date:06/12/2024
                                                            Path:C:\Windows\MsMpEng.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\MsMpEng.exe"
                                                            Imagebase:0xcb0000
                                                            File size:87'040 bytes
                                                            MD5 hash:06282CDD7FA54EA991FBA55A50F8D8BD
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Windows\MsMpEng.exe, Author: Joe Security
                                                            • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Windows\MsMpEng.exe, Author: unknown
                                                            • Rule: njrat1, Description: Identify njRat, Source: C:\Windows\MsMpEng.exe, Author: Brian Wallace @botnet_hunter
                                                            • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Windows\MsMpEng.exe, Author: ditekSHen
                                                            Antivirus matches:
                                                            • Detection: 100%, Avira
                                                            • Detection: 100%, Joe Sandbox ML
                                                            • Detection: 84%, ReversingLabs
                                                            Reputation:low
                                                            Has exited:false

                                                            Target ID:3
                                                            Start time:14:42:07
                                                            Start date:06/12/2024
                                                            Path:C:\Windows\SysWOW64\netsh.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:netsh firewall add allowedprogram "C:\Windows\MsMpEng.exe" "MsMpEng.exe" ENABLE
                                                            Imagebase:0x1560000
                                                            File size:82'432 bytes
                                                            MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:4
                                                            Start time:14:42:07
                                                            Start date:06/12/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff7699e0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:6
                                                            Start time:14:42:19
                                                            Start date:06/12/2024
                                                            Path:C:\Windows\MsMpEng.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\MsMpEng.exe" ..
                                                            Imagebase:0xb20000
                                                            File size:87'040 bytes
                                                            MD5 hash:06282CDD7FA54EA991FBA55A50F8D8BD
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:9
                                                            Start time:14:42:27
                                                            Start date:06/12/2024
                                                            Path:C:\Windows\MsMpEng.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\MsMpEng.exe" ..
                                                            Imagebase:0xdf0000
                                                            File size:87'040 bytes
                                                            MD5 hash:06282CDD7FA54EA991FBA55A50F8D8BD
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:10
                                                            Start time:14:42:35
                                                            Start date:06/12/2024
                                                            Path:C:\Windows\MsMpEng.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\MsMpEng.exe" ..
                                                            Imagebase:0x4b0000
                                                            File size:87'040 bytes
                                                            MD5 hash:06282CDD7FA54EA991FBA55A50F8D8BD
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:true

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:8.7%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:37
                                                              Total number of Limit Nodes:1
                                                              execution_graph 1750 100a361 1752 100a392 RegQueryValueExW 1750->1752 1753 100a41b 1752->1753 1754 100a462 1756 100a486 RegSetValueExW 1754->1756 1757 100a507 1756->1757 1738 100ac24 1739 100ac46 ShellExecuteExW 1738->1739 1741 100ac88 1739->1741 1742 100a8a4 1744 100a8c6 SetFileAttributesW 1742->1744 1745 100a90b 1744->1745 1702 100ac46 1704 100ac6c ShellExecuteExW 1702->1704 1705 100ac88 1704->1705 1706 100a646 1708 100a67e CreateMutexW 1706->1708 1709 100a6c1 1708->1709 1714 100a8c6 1715 100a8ef SetFileAttributesW 1714->1715 1717 100a90b 1715->1717 1730 100aa07 1731 100aa3e CopyFileW 1730->1731 1733 100aa8e 1731->1733 1734 100a612 1735 100a646 CreateMutexW 1734->1735 1737 100a6c1 1735->1737 1746 100a2d2 1747 100a2d6 SetErrorMode 1746->1747 1749 100a33f 1747->1749 1722 100aa3e 1724 100aa67 CopyFileW 1722->1724 1725 100aa8e 1724->1725 1726 100a2fe 1727 100a353 1726->1727 1728 100a32a SetErrorMode 1726->1728 1727->1728 1729 100a33f 1728->1729

                                                              Callgraph

                                                              • Executed
                                                              • Not Executed
                                                              • Opacity -> Relevance
                                                              • Disassembly available
                                                              callgraph 0 Function_0100A005 1 Function_0100AB06 2 Function_0100AA07 3 Function_050C0F05 4 Function_01002909 5 Function_050C0006 6 Function_050C0301 23 Function_050C0938 6->23 24 Function_01310606 6->24 102 Function_013105DF 6->102 104 Function_013105C0 6->104 7 Function_050C0B03 8 Function_0100A710 9 Function_01002310 10 Function_0100AC11 11 Function_0100A612 12 Function_050C0310 12->23 12->24 12->102 12->104 13 Function_0100201C 14 Function_0100A81E 15 Function_0100A120 16 Function_01310712 17 Function_0100AC24 18 Function_01002528 19 Function_0100A02E 20 Function_050C0C22 21 Function_01002430 22 Function_01310000 23->24 23->102 23->104 25 Function_01002639 26 Function_0100A23C 27 Function_0100213C 28 Function_0100253D 29 Function_0100AA3E 30 Function_0100A540 31 Function_050C084F 32 Function_01002044 33 Function_01310074 34 Function_0100A646 35 Function_0100AC46 36 Function_01002A4B 37 Function_050C0D40 38 Function_0100A74E 39 Function_0131067F 40 Function_0100A952 41 Function_050C0F58 42 Function_050C0759 43 Function_01002755 44 Function_01002556 45 Function_01002458 46 Function_050C0E55 47 Function_0131066A 48 Function_0100A45C 49 Function_0131026D 50 Function_0100A25E 51 Function_01002B5E 52 Function_0100A361 53 Function_01002761 54 Function_0100A462 55 Function_01310052 56 Function_01002264 57 Function_01002364 58 Function_050C076B 59 Function_01002A69 60 Function_0100276D 61 Function_0100A56E 62 Function_01310740 63 Function_0100A172 64 Function_0100AB74 65 Function_01002675 66 Function_0100A078 67 Function_01002978 68 Function_01310648 68->47 69 Function_0100A97E 70 Function_050C0C8D 71 Function_01002681 72 Function_0100A486 73 Function_050C088A 73->24 73->102 73->104 74 Function_050C0080 75 Function_01002891 76 Function_0100A392 77 Function_050C0D98 78 Function_01002194 79 Function_050C069B 80 Function_01002098 81 Function_0100A09A 82 Function_0100289D 83 Function_0100AB9E 84 Function_010025A0 85 Function_0100A8A4 86 Function_050C0BA8 87 Function_01002BA6 88 Function_050C03BD 88->23 88->24 88->102 88->104 89 Function_010022B4 90 Function_010023BC 91 Function_0100A8C6 92 Function_0100A7C7 93 Function_0100ACC7 94 Function_0100AACF 95 Function_010026CF 96 Function_010020D0 97 Function_0100A2D2 98 Function_0100AAE1 99 Function_010026E1 100 Function_013105D0 101 Function_010025E5 103 Function_010021F0 105 Function_010027F3 106 Function_0100A1F4 107 Function_010023F4 108 Function_0100ACFA 109 Function_0100A2FE

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 50c0310-50c0334 2 50c033e-50c0346 0->2 3 50c0336-50c0338 0->3 4 50c034e-50c0391 2->4 5 50c0348-50c034d 2->5 3->2 8 50c03d8-50c0418 4->8 9 50c0393-50c03bb 4->9 16 50c041f 8->16 17 50c041a 8->17 14 50c03ce 9->14 14->8 53 50c041f call 13105c0 16->53 54 50c041f call 50c0938 16->54 55 50c041f call 1310606 16->55 56 50c041f call 13105df 16->56 17->16 18 50c0425-50c0434 19 50c046b-50c0523 18->19 20 50c0436-50c0460 18->20 39 50c0525-50c0569 19->39 40 50c0570-50c0587 19->40 20->19 39->40 41 50c058d-50c05bf 40->41 42 50c0880 40->42 41->42 53->18 54->18 55->18 56->18
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1715520834.00000000050C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_50c0000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 2l$2l$2l
                                                              • API String ID: 0-3036608467
                                                              • Opcode ID: 156870c59e7c605ac0800ecc1096b4fe1a5df224aeeda395ed331b1a470784ce
                                                              • Instruction ID: 329549bc8f17b7dd89e8d4cd3b0ebf0143a1c5f25b569b5236d2cc69cecc0dee
                                                              • Opcode Fuzzy Hash: 156870c59e7c605ac0800ecc1096b4fe1a5df224aeeda395ed331b1a470784ce
                                                              • Instruction Fuzzy Hash: 145105307002108BE718EB7994246BE76E7BB8A348B144169E446DB7D9DF3ADC06C7A1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 57 50c03bd-50c0418 65 50c041f 57->65 66 50c041a 57->66 102 50c041f call 13105c0 65->102 103 50c041f call 50c0938 65->103 104 50c041f call 1310606 65->104 105 50c041f call 13105df 65->105 66->65 67 50c0425-50c0434 68 50c046b-50c0523 67->68 69 50c0436-50c0460 67->69 88 50c0525-50c0569 68->88 89 50c0570-50c0587 68->89 69->68 88->89 90 50c058d-50c05bf 89->90 91 50c0880 89->91 90->91 102->67 103->67 104->67 105->67
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1715520834.00000000050C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_50c0000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 2l$2l$2l
                                                              • API String ID: 0-3036608467
                                                              • Opcode ID: 1ad3e51b832e36b76229dea97f8048b475ec3eca0b26b893a138bd5aa4e7357b
                                                              • Instruction ID: 690be7372f9c4abc910500f858e1c22d46e113bbd362afbee141f9e28aa53366
                                                              • Opcode Fuzzy Hash: 1ad3e51b832e36b76229dea97f8048b475ec3eca0b26b893a138bd5aa4e7357b
                                                              • Instruction Fuzzy Hash: B541E3307001108BE719EB7990247BD76D36FDA249B144069E446DBBD5DF2ECD0A87A2

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 106 50c0938-50c0993 108 50c0a2e-50c0a30 106->108 109 50c0999-50c0a22 106->109 110 50c0a37-50c0a3c 108->110 259 50c0a24 call 13105c0 109->259 260 50c0a24 call 1310606 109->260 261 50c0a24 call 13105df 109->261 112 50c0b1e-50c0bc2 110->112 113 50c0a42-50c0a7a 110->113 150 50c0c9e-50c0ca7 112->150 151 50c0bc8-50c0c8b 112->151 129 50c0a7c-50c0a9a 113->129 130 50c0aa1-50c0afc 113->130 129->130 168 50c0b01 130->168 149 50c0a2a-50c0a2c 149->108 155 50c0a32 149->155 152 50c0cad-50c0d3e 150->152 153 50c0d51-50c0d5a 150->153 151->150 152->153 156 50c0d5c-50c0d73 153->156 157 50c0d7a-50c0d83 153->157 155->110 156->157 161 50c0da9-50c0db2 157->161 162 50c0d85-50c0d96 157->162 163 50c0db8-50c0e06 161->163 164 50c0f33-50c0f3a 161->164 162->161 187 50c0f1c-50c0f2d 163->187 168->112 187->164 188 50c0e0b-50c0e14 187->188 190 50c0e1a-50c0f1a 188->190 191 50c0f40-50c0fd1 188->191 190->187 240 50c0f3b 190->240 222 50c10ca 191->222 223 50c0fd7-50c0fe8 191->223 224 50c10cc-50c10d3 222->224 230 50c0fea-50c100b 223->230 237 50c100d 230->237 238 50c1012-50c1048 230->238 237->238 246 50c104f-50c1077 238->246 247 50c104a 238->247 240->191 251 50c107d-50c10a1 246->251 252 50c1079-50c107b 246->252 247->246 255 50c10aa-50c10b4 251->255 256 50c10a3-50c10a8 251->256 252->224 257 50c10ba-50c10c4 255->257 258 50c10b6-50c10b8 255->258 256->224 257->222 257->230 258->224 259->149 260->149 261->149
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1715520834.00000000050C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_50c0000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: :@k$\Ol
                                                              • API String ID: 0-3385220609
                                                              • Opcode ID: eb637423420b9005f0a9f27bb22e66bae55aa7a25c02a74efb47fe6dc2277288
                                                              • Instruction ID: ceb83ccafd45121ee0c8cf96c770c239771b5090baa2a9a588a13136c55b5db3
                                                              • Opcode Fuzzy Hash: eb637423420b9005f0a9f27bb22e66bae55aa7a25c02a74efb47fe6dc2277288
                                                              • Instruction Fuzzy Hash: 2B025B347042149FDB19EB78D4647AE77E2BF89308B10846CD406DB7A9DF39AC46CBA1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 262 100a612-100a695 266 100a697 262->266 267 100a69a-100a6a3 262->267 266->267 268 100a6a5 267->268 269 100a6a8-100a6b1 267->269 268->269 270 100a702-100a707 269->270 271 100a6b3-100a6d7 CreateMutexW 269->271 270->271 274 100a709-100a70e 271->274 275 100a6d9-100a6ff 271->275 274->275
                                                              APIs
                                                              • CreateMutexW.KERNELBASE(?,?), ref: 0100A6B9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1714211991.000000000100A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100A000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_100a000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID: CreateMutex
                                                              • String ID:
                                                              • API String ID: 1964310414-0
                                                              • Opcode ID: 3a019f02ec9d3e55fd22de5967b006a5bb0f0835bd7ad5d2808cd80c76797e70
                                                              • Instruction ID: 2461339a053a6773c0ea665cf47a2be31dc60d7cc219b8e692731207738ee7fd
                                                              • Opcode Fuzzy Hash: 3a019f02ec9d3e55fd22de5967b006a5bb0f0835bd7ad5d2808cd80c76797e70
                                                              • Instruction Fuzzy Hash: 1E31A1B15097809FE712CB25CC45B96BFF8EF06210F09849AE984DF293D375E909CB61

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 278 100a361-100a3cf 281 100a3d1 278->281 282 100a3d4-100a3dd 278->282 281->282 283 100a3e2-100a3e8 282->283 284 100a3df 282->284 285 100a3ea 283->285 286 100a3ed-100a404 283->286 284->283 285->286 288 100a406-100a419 RegQueryValueExW 286->288 289 100a43b-100a440 286->289 290 100a442-100a447 288->290 291 100a41b-100a438 288->291 289->288 290->291
                                                              APIs
                                                              • RegQueryValueExW.KERNELBASE(?,00000E24,3E6A766E,00000000,00000000,00000000,00000000), ref: 0100A40C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1714211991.000000000100A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100A000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_100a000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID: QueryValue
                                                              • String ID:
                                                              • API String ID: 3660427363-0
                                                              • Opcode ID: 59201f7bfdb06d448682dd19e3a8495ac91109046ed80db6247aeb33513aa6ec
                                                              • Instruction ID: 8299d940158c41311daebfc4399d72e9b9f3db6764fe7c570200366581fd998e
                                                              • Opcode Fuzzy Hash: 59201f7bfdb06d448682dd19e3a8495ac91109046ed80db6247aeb33513aa6ec
                                                              • Instruction Fuzzy Hash: C3318FB5504780AFE722CF15CC84F96BFF8EF06210F0984DAE985DB292D364E909CB61

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 295 100a462-100a4c3 298 100a4c5 295->298 299 100a4c8-100a4d4 295->299 298->299 300 100a4d6 299->300 301 100a4d9-100a4f0 299->301 300->301 303 100a4f2-100a505 RegSetValueExW 301->303 304 100a527-100a52c 301->304 305 100a507-100a524 303->305 306 100a52e-100a533 303->306 304->303 306->305
                                                              APIs
                                                              • RegSetValueExW.KERNELBASE(?,00000E24,3E6A766E,00000000,00000000,00000000,00000000), ref: 0100A4F8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1714211991.000000000100A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100A000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_100a000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: ea6b241b1948fae64258321478f36ccd92484d0eb935be9691a99181e4073a2e
                                                              • Instruction ID: 9d16b9791f61d54a441de07149b22f9c6e4c70c6a66a55096e4367cee3ae08be
                                                              • Opcode Fuzzy Hash: ea6b241b1948fae64258321478f36ccd92484d0eb935be9691a99181e4073a2e
                                                              • Instruction Fuzzy Hash: 5C21A7B6504780AFE7228F15DC44F67BFF8EF46220F08849AE985DB692D364E908C771

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 310 100a646-100a695 313 100a697 310->313 314 100a69a-100a6a3 310->314 313->314 315 100a6a5 314->315 316 100a6a8-100a6b1 314->316 315->316 317 100a702-100a707 316->317 318 100a6b3-100a6bb CreateMutexW 316->318 317->318 320 100a6c1-100a6d7 318->320 321 100a709-100a70e 320->321 322 100a6d9-100a6ff 320->322 321->322
                                                              APIs
                                                              • CreateMutexW.KERNELBASE(?,?), ref: 0100A6B9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1714211991.000000000100A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100A000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_100a000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID: CreateMutex
                                                              • String ID:
                                                              • API String ID: 1964310414-0
                                                              • Opcode ID: 56852505037c603a9d4d2a0abad85a9bb5230f5fefbcdcee7aeebe033e916bf0
                                                              • Instruction ID: 7bdb90bcaf324d65e4ab4fc421d530a6ec205b936568730da81e9735d620c460
                                                              • Opcode Fuzzy Hash: 56852505037c603a9d4d2a0abad85a9bb5230f5fefbcdcee7aeebe033e916bf0
                                                              • Instruction Fuzzy Hash: 1B2183B16002009FF711DF65CD45BA6FBE8EF14224F0484A9E9899B781D775E905CB71

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 325 100aa07-100aa65 327 100aa67 325->327 328 100aa6a-100aa70 325->328 327->328 329 100aa72 328->329 330 100aa75-100aa7e 328->330 329->330 331 100aa80-100aaa0 CopyFileW 330->331 332 100aac1-100aac6 330->332 335 100aaa2-100aabe 331->335 336 100aac8-100aacd 331->336 332->331 336->335
                                                              APIs
                                                              • CopyFileW.KERNELBASE(?,?,?), ref: 0100AA86
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1714211991.000000000100A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100A000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_100a000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID: CopyFile
                                                              • String ID:
                                                              • API String ID: 1304948518-0
                                                              • Opcode ID: acb1e2fd8fab14ee99c8114eab166b9af24b006ff28426687a3a63e9c4a0602e
                                                              • Instruction ID: 4d3e9b8c473b5ea91a02cd3e96fe099d4297ca653ab6abd8e9eb154b5054c6d6
                                                              • Opcode Fuzzy Hash: acb1e2fd8fab14ee99c8114eab166b9af24b006ff28426687a3a63e9c4a0602e
                                                              • Instruction Fuzzy Hash: 5C2171B16093809FE752CB25DD45B56BFF8EF06224F0984DAE984DF2A3D224D948CB61

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 338 100a392-100a3cf 340 100a3d1 338->340 341 100a3d4-100a3dd 338->341 340->341 342 100a3e2-100a3e8 341->342 343 100a3df 341->343 344 100a3ea 342->344 345 100a3ed-100a404 342->345 343->342 344->345 347 100a406-100a419 RegQueryValueExW 345->347 348 100a43b-100a440 345->348 349 100a442-100a447 347->349 350 100a41b-100a438 347->350 348->347 349->350
                                                              APIs
                                                              • RegQueryValueExW.KERNELBASE(?,00000E24,3E6A766E,00000000,00000000,00000000,00000000), ref: 0100A40C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1714211991.000000000100A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100A000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_100a000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID: QueryValue
                                                              • String ID:
                                                              • API String ID: 3660427363-0
                                                              • Opcode ID: 98056fa95c27b9fa44f93d5740e796e1b06a38f362a6bdc51c2a2b585e3981da
                                                              • Instruction ID: f3d5b6a1a0d1bb9407c55d40a8d99101e2c72cfc7ff6dd53ca02755f4a2863de
                                                              • Opcode Fuzzy Hash: 98056fa95c27b9fa44f93d5740e796e1b06a38f362a6bdc51c2a2b585e3981da
                                                              • Instruction Fuzzy Hash: 2E21AEB56007049FF722CE15CC84FA6BBECEF14620F04C49AEA858B691D760E908CA71

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 354 100a486-100a4c3 356 100a4c5 354->356 357 100a4c8-100a4d4 354->357 356->357 358 100a4d6 357->358 359 100a4d9-100a4f0 357->359 358->359 361 100a4f2-100a505 RegSetValueExW 359->361 362 100a527-100a52c 359->362 363 100a507-100a524 361->363 364 100a52e-100a533 361->364 362->361 364->363
                                                              APIs
                                                              • RegSetValueExW.KERNELBASE(?,00000E24,3E6A766E,00000000,00000000,00000000,00000000), ref: 0100A4F8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1714211991.000000000100A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100A000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_100a000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: a1025e6ab4bac111f7acb5e4f67c9f3dadaf6bdde49b95133c381222967a1ece
                                                              • Instruction ID: 29147eff1be0e79d0b6bc3b070194ec363dc79be964e0944d8bcf74a668ae506
                                                              • Opcode Fuzzy Hash: a1025e6ab4bac111f7acb5e4f67c9f3dadaf6bdde49b95133c381222967a1ece
                                                              • Instruction Fuzzy Hash: 3C11B1B6600700AFF7228E15CC45FAABBECEF14620F04845AED459B781D761E408CA71

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 368 100a2d2-100a2d4 369 100a2d6-100a2dd 368->369 370 100a2de-100a328 368->370 369->370 372 100a353-100a358 370->372 373 100a32a-100a33d SetErrorMode 370->373 372->373 374 100a35a-100a35f 373->374 375 100a33f-100a352 373->375 374->375
                                                              APIs
                                                              • SetErrorMode.KERNELBASE(?), ref: 0100A330
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1714211991.000000000100A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100A000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_100a000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode
                                                              • String ID:
                                                              • API String ID: 2340568224-0
                                                              • Opcode ID: 4123af3bba8e97a015910de396c481fe75bee3323b5f254d800c44dc4fa8138f
                                                              • Instruction ID: 4b5b714df36419dda79a0d20c63610ec6711d9997e807c6b656f84580f136fdf
                                                              • Opcode Fuzzy Hash: 4123af3bba8e97a015910de396c481fe75bee3323b5f254d800c44dc4fa8138f
                                                              • Instruction Fuzzy Hash: 3B214F7190D3C09FD7138B29DC54A52BFB49F47224F0D80DBED848F2A3D269A808DB62

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 378 100ac24-100ac6a 380 100ac6c 378->380 381 100ac6f-100ac78 378->381 380->381 382 100acb9-100acbe 381->382 383 100ac7a-100ac9a ShellExecuteExW 381->383 382->383 386 100acc0-100acc5 383->386 387 100ac9c-100acb8 383->387 386->387
                                                              APIs
                                                              • ShellExecuteExW.SHELL32(?), ref: 0100AC80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1714211991.000000000100A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100A000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_100a000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID: ExecuteShell
                                                              • String ID:
                                                              • API String ID: 587946157-0
                                                              • Opcode ID: 45a7aa502d6a3373b0011b793ee52ec6837bd5731651ceac3ab6d228b7b4c8a0
                                                              • Instruction ID: 4c1ec8820b5d91aff4b3dd83e4337d0420b393068474d1fb168c16fab353854b
                                                              • Opcode Fuzzy Hash: 45a7aa502d6a3373b0011b793ee52ec6837bd5731651ceac3ab6d228b7b4c8a0
                                                              • Instruction Fuzzy Hash: A51193716093849FD712CF25DC94B52BFE8DF46220F0884EAED85CF692D275E908CB61

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 389 100a8a4-100a8ed 391 100a8f2-100a8fb 389->391 392 100a8ef 389->392 393 100a93c-100a941 391->393 394 100a8fd-100a91d SetFileAttributesW 391->394 392->391 393->394 397 100a943-100a948 394->397 398 100a91f-100a93b 394->398 397->398
                                                              APIs
                                                              • SetFileAttributesW.KERNELBASE(?,?), ref: 0100A903
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1714211991.000000000100A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100A000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_100a000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID: AttributesFile
                                                              • String ID:
                                                              • API String ID: 3188754299-0
                                                              • Opcode ID: ad12588e5c1c2bde8d7ff63e68d01c055dc5638a558cf9c721635eb7ce94a220
                                                              • Instruction ID: 737595b69e660200b5072d17aa3d4848ba23852456cc63333745ce14114da40b
                                                              • Opcode Fuzzy Hash: ad12588e5c1c2bde8d7ff63e68d01c055dc5638a558cf9c721635eb7ce94a220
                                                              • Instruction Fuzzy Hash: 0C11B6716043809FEB12CF25DC44B56BFE8EF46220F0984EAED85CF652D238E944CB61

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 400 100aa3e-100aa65 401 100aa67 400->401 402 100aa6a-100aa70 400->402 401->402 403 100aa72 402->403 404 100aa75-100aa7e 402->404 403->404 405 100aa80-100aa88 CopyFileW 404->405 406 100aac1-100aac6 404->406 407 100aa8e-100aaa0 405->407 406->405 409 100aaa2-100aabe 407->409 410 100aac8-100aacd 407->410 410->409
                                                              APIs
                                                              • CopyFileW.KERNELBASE(?,?,?), ref: 0100AA86
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1714211991.000000000100A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100A000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_100a000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID: CopyFile
                                                              • String ID:
                                                              • API String ID: 1304948518-0
                                                              • Opcode ID: 298f113eab362cb58718712fc010401f58fc70457aff51c8d19bf38e3a6b7dde
                                                              • Instruction ID: 65254eb03cbac4986f5e3c1454e094700e6195ca4eeccc448d12b50a83e3e2cc
                                                              • Opcode Fuzzy Hash: 298f113eab362cb58718712fc010401f58fc70457aff51c8d19bf38e3a6b7dde
                                                              • Instruction Fuzzy Hash: B0117071B003009FFB51CF19D944B56BBE8EB15220F0884AADD49CB7C2D734E944CA61

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 412 100a8c6-100a8ed 413 100a8f2-100a8fb 412->413 414 100a8ef 412->414 415 100a93c-100a941 413->415 416 100a8fd-100a905 SetFileAttributesW 413->416 414->413 415->416 418 100a90b-100a91d 416->418 419 100a943-100a948 418->419 420 100a91f-100a93b 418->420 419->420
                                                              APIs
                                                              • SetFileAttributesW.KERNELBASE(?,?), ref: 0100A903
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1714211991.000000000100A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100A000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_100a000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID: AttributesFile
                                                              • String ID:
                                                              • API String ID: 3188754299-0
                                                              • Opcode ID: 13c14e8ac78ef10375ede312c0b3b923ae386b36ad1eea26310a9106fffcb28f
                                                              • Instruction ID: a5ad6475e29e40ae65c01d781b04c59fc26088585f9dad502511fa5a8edba3ad
                                                              • Opcode Fuzzy Hash: 13c14e8ac78ef10375ede312c0b3b923ae386b36ad1eea26310a9106fffcb28f
                                                              • Instruction Fuzzy Hash: F6018075B003048FEB51CF29D98476AFBE8EF04220F0884AADD85CB782E274E944CB61
                                                              APIs
                                                              • ShellExecuteExW.SHELL32(?), ref: 0100AC80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1714211991.000000000100A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100A000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_100a000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID: ExecuteShell
                                                              • String ID:
                                                              • API String ID: 587946157-0
                                                              • Opcode ID: 37ce08cb09b50c4c54d4da7b407c00f08a0d7b21cba9f37e2d52ca5054d32d02
                                                              • Instruction ID: 11bffd7d6a3f0f1145eaaf8b724a74304f433425c5b954f8e6bfcc11dd9ce3d0
                                                              • Opcode Fuzzy Hash: 37ce08cb09b50c4c54d4da7b407c00f08a0d7b21cba9f37e2d52ca5054d32d02
                                                              • Instruction Fuzzy Hash: 40018071A04204CFEB51CF1AD985B6ABBD8EF04220F08C4AADD49CF786D275E504CA61
                                                              APIs
                                                              • SetErrorMode.KERNELBASE(?), ref: 0100A330
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1714211991.000000000100A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100A000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_100a000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode
                                                              • String ID:
                                                              • API String ID: 2340568224-0
                                                              • Opcode ID: c75ba199706d65a480e39b0ec14e2db3d415f49a3e33bfc188b184ed316d31ea
                                                              • Instruction ID: 38b80d5af840767e99cf7428790553dde555d46841fa85efb5d94de20d829a83
                                                              • Opcode Fuzzy Hash: c75ba199706d65a480e39b0ec14e2db3d415f49a3e33bfc188b184ed316d31ea
                                                              • Instruction Fuzzy Hash: ACF08175D04744CFEB518F19D984765FBE4EF05220F08C09AED494F792D2B5E508CAA2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1715520834.00000000050C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_50c0000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4defef17aff633122ba8af1eb95d93337d8b949d7817fc32e86c8b3e6f3e1c45
                                                              • Instruction ID: fe582de2b61ed45893227850895bffd7b61b6a829e08d473d2326a4dca18d377
                                                              • Opcode Fuzzy Hash: 4defef17aff633122ba8af1eb95d93337d8b949d7817fc32e86c8b3e6f3e1c45
                                                              • Instruction Fuzzy Hash: FD51483410274A9BD704FF3DE6B958A77B2BBA434D3008529E0448B7AEDB7C9949CB91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1715224959.0000000001310000.00000040.00000020.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1310000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c7a66281b7e00b488019701b08645af2bdedb9c026846bfe6aa38f010abf30c4
                                                              • Instruction ID: 5be76b4b0f7c0cab2e47d95c25c96e54fb0b2cdc1cf36017c33ac29347bad45e
                                                              • Opcode Fuzzy Hash: c7a66281b7e00b488019701b08645af2bdedb9c026846bfe6aa38f010abf30c4
                                                              • Instruction Fuzzy Hash: 911106719002808FD729CF0DE984765FB90EB85634F18C86EEC498F705D33AA488CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1715520834.00000000050C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_50c0000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 80d61534a2b3fa265474a59695ff88e002973cc2197b0cca8ab05f660b33de59
                                                              • Instruction ID: c4e91aed3e26be8e5b1fc31f4d18008b3f96056f46604c08ad0c0f25ff6f607e
                                                              • Opcode Fuzzy Hash: 80d61534a2b3fa265474a59695ff88e002973cc2197b0cca8ab05f660b33de59
                                                              • Instruction Fuzzy Hash: 0201D8A640E3C04FCB43A3B458680903F72AE1726839FA5D7C0C4CE5A3E909090AE736
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1715224959.0000000001310000.00000040.00000020.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1310000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a90e70f0cf9dc86e22b0ecb43ea344acd5012dbd52cdb85ece5346941f5488f4
                                                              • Instruction ID: b6ab8c373758c115a89de8ea6e0bd7217336800e438613d98ba1527dc3243da7
                                                              • Opcode Fuzzy Hash: a90e70f0cf9dc86e22b0ecb43ea344acd5012dbd52cdb85ece5346941f5488f4
                                                              • Instruction Fuzzy Hash: A501DBB54093805FD711CF169C41862FFB8EF86130708C49FFC498B652D165AD09CB72
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1715520834.00000000050C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_50c0000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 38f890d0f740d99478560714dc1d509c577a2598277a9943a9020b4edb6e490b
                                                              • Instruction ID: a8c62fc4e9659ba3d1acbe9341188a6f3d7645261ebb5cb68b87db45d58631d1
                                                              • Opcode Fuzzy Hash: 38f890d0f740d99478560714dc1d509c577a2598277a9943a9020b4edb6e490b
                                                              • Instruction Fuzzy Hash: 83018C74604342CFD714EF74D46889DB7F2BB90309F00892EE9C5877A8EBBA98048B52
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1715224959.0000000001310000.00000040.00000020.00020000.00000000.sdmp, Offset: 01310000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1310000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ee9c311df7d123ad5d4d558f43672e521c0d30e9bacd7f2f287dcbc6bf708744
                                                              • Instruction ID: debe0164fff05d9faaa68af1f3767eebfc4dd05b0fd888dd15c031648c960476
                                                              • Opcode Fuzzy Hash: ee9c311df7d123ad5d4d558f43672e521c0d30e9bacd7f2f287dcbc6bf708744
                                                              • Instruction Fuzzy Hash: 40E092B6A006044B9754CF0AEC41456F7D8EB84630B18C07FEC0D8B701E676B908CEA5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1714083277.0000000001002000.00000040.00000800.00020000.00000000.sdmp, Offset: 01002000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1002000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cb14d7212f1205f6728eb5ee2e05048d1b0ce75d21231a1b09c24ea2e83f7105
                                                              • Instruction ID: 01e3b9addf623b5ab32b9b33a446aba9239dc98b4ee7216a1446b01b41b4dcfa
                                                              • Opcode Fuzzy Hash: cb14d7212f1205f6728eb5ee2e05048d1b0ce75d21231a1b09c24ea2e83f7105
                                                              • Instruction Fuzzy Hash: 0AD05E792056C14FF3179A1CC1A8B953BE4AB65714F4B44F9AC408B7A3CB68D5D1D600
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1714083277.0000000001002000.00000040.00000800.00020000.00000000.sdmp, Offset: 01002000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_1002000_fBpY1pYq34.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 895ec062f4c8ae4d38a8a05dc3fcd244679bf460a7a6bec2392855ee565500d1
                                                              • Instruction ID: 004bf9ace5d54223525d022ce53e7ab4d96eebad94e8e8d00fac2c06c2904042
                                                              • Opcode Fuzzy Hash: 895ec062f4c8ae4d38a8a05dc3fcd244679bf460a7a6bec2392855ee565500d1
                                                              • Instruction Fuzzy Hash: D3D05E342002814BEB16DA0CD6D9F593BD8AB54B14F0A84E8AC508B7A2C7B4D8C0DA00

                                                              Execution Graph

                                                              Execution Coverage:20.2%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:7.7%
                                                              Total number of Nodes:181
                                                              Total number of Limit Nodes:9
                                                              execution_graph 7157 11cae9e 7158 11caed6 CreateFileW 7157->7158 7160 11caf25 7158->7160 7161 1912092 7162 19120c1 CoGetObjectContext 7161->7162 7163 19120ea 7161->7163 7164 19120d6 7162->7164 7163->7162 7237 17903bd 7239 17903c4 7237->7239 7238 17905bf 7239->7238 7241 1791ed7 7239->7241 7243 1791edd 7241->7243 7242 17923b1 7242->7238 7243->7242 7246 11cbed0 7243->7246 7250 11cbef2 7243->7250 7249 11cbef2 NtSetInformationProcess 7246->7249 7248 11cbf3c 7248->7242 7249->7248 7251 11cbf27 NtSetInformationProcess 7250->7251 7252 11cbf52 7250->7252 7253 11cbf3c 7251->7253 7252->7251 7253->7242 7165 11ca09a 7166 11ca0cf send 7165->7166 7167 11ca107 7165->7167 7168 11ca0dd 7166->7168 7167->7166 7254 11cac5a 7255 11cac83 SetFileAttributesW 7254->7255 7257 11cac9f 7255->7257 7258 1911ad6 7260 1911b0b GetProcessTimes 7258->7260 7261 1911b3d 7260->7261 7169 11cbe16 7171 11cbe4b GetExitCodeProcess 7169->7171 7172 11cbe74 7171->7172 7262 11cadd6 7263 11cadff CopyFileW 7262->7263 7265 11cae26 7263->7265 7173 11ca392 7174 11ca3c7 RegQueryValueExW 7173->7174 7176 11ca41b 7174->7176 7266 11cab52 7269 11cab8a RegOpenKeyExW 7266->7269 7268 11cabe0 7269->7268 7177 191319e 7179 19131d3 GetProcessWorkingSetSize 7177->7179 7180 19131ff 7179->7180 7181 1912e1e 7184 1912e56 RegCreateKeyExW 7181->7184 7183 1912ec8 7184->7183 7270 11ca74e 7271 11ca7b9 7270->7271 7272 11ca77a CloseHandle 7270->7272 7271->7272 7273 11ca788 7272->7273 7185 1913282 7187 19132b7 SetProcessWorkingSetSize 7185->7187 7188 19132e3 7187->7188 7274 19101c2 7275 1910222 7274->7275 7276 19101f7 NtQuerySystemInformation 7274->7276 7275->7276 7277 191020c 7276->7277 7278 1911bc2 7279 1911bfd getaddrinfo 7278->7279 7281 1911c6f 7279->7281 7282 11cb1ca 7283 11cb228 7282->7283 7284 11cb1f6 FindClose 7282->7284 7283->7284 7285 11cb20b 7284->7285 7189 1911086 7192 19110be WSASocketW 7189->7192 7191 19110fa 7192->7191 7193 1911906 7194 191193b shutdown 7193->7194 7196 1911964 7194->7196 7197 11caa06 7198 11caa6b 7197->7198 7199 11caa35 WaitForInputIdle 7197->7199 7198->7199 7200 11caa43 7199->7200 7201 11ca486 7204 11ca4bb RegSetValueExW 7201->7204 7203 11ca507 7204->7203 7290 11ca646 7291 11ca67e CreateMutexW 7290->7291 7293 11ca6c1 7291->7293 7294 19130ca 7296 19130f3 select 7294->7296 7297 1913128 7296->7297 7298 11ca2fe 7299 11ca32a SetErrorMode 7298->7299 7300 11ca353 7298->7300 7301 11ca33f 7299->7301 7300->7299 7205 19114b2 7206 19114ea ConvertStringSecurityDescriptorToSecurityDescriptorW 7205->7206 7208 191152b 7206->7208 7302 1910472 7303 19104b0 DuplicateHandle 7302->7303 7304 19104e8 7302->7304 7305 19104be 7303->7305 7304->7303 7209 11cafb6 7211 11cafeb GetFileType 7209->7211 7212 11cb018 7211->7212 7310 19100fe 7312 191012a K32EnumProcesses 7310->7312 7313 1910146 7312->7313 7314 1790509 7316 1790510 7314->7316 7315 17905bf 7316->7315 7317 1791ed7 2 API calls 7316->7317 7317->7315 7318 1791608 7319 1791252 7318->7319 7324 17916df 7319->7324 7333 17916f2 7319->7333 7342 1791653 7319->7342 7351 17916c1 7319->7351 7325 17916e6 7324->7325 7360 1790310 7325->7360 7328 1790310 2 API calls 7329 1791816 7328->7329 7330 179183c 7329->7330 7364 17927c0 7329->7364 7368 179275f 7329->7368 7334 17916f9 7333->7334 7335 1790310 2 API calls 7334->7335 7336 17917ad 7335->7336 7337 1790310 2 API calls 7336->7337 7338 1791816 7337->7338 7339 179183c 7338->7339 7340 179275f 2 API calls 7338->7340 7341 17927c0 2 API calls 7338->7341 7340->7339 7341->7339 7343 179165e 7342->7343 7344 1790310 2 API calls 7343->7344 7345 17917ad 7344->7345 7346 1790310 2 API calls 7345->7346 7347 1791816 7346->7347 7348 179183c 7347->7348 7349 179275f 2 API calls 7347->7349 7350 17927c0 2 API calls 7347->7350 7349->7348 7350->7348 7352 17916c8 7351->7352 7353 1790310 2 API calls 7352->7353 7354 17917ad 7353->7354 7355 1790310 2 API calls 7354->7355 7356 1791816 7355->7356 7357 179183c 7356->7357 7358 179275f 2 API calls 7356->7358 7359 17927c0 2 API calls 7356->7359 7358->7357 7359->7357 7362 1790322 7360->7362 7361 1790348 7361->7328 7362->7361 7363 1791ed7 2 API calls 7362->7363 7363->7361 7365 17927eb 7364->7365 7366 1792833 7365->7366 7372 1792dd8 7365->7372 7366->7330 7369 1792768 7368->7369 7370 1792794 7369->7370 7371 1792dd8 2 API calls 7369->7371 7370->7330 7371->7370 7373 1792ddc 7372->7373 7377 1911e2e 7373->7377 7381 1911e9e 7373->7381 7374 1792e48 7374->7366 7378 1911e9e GetVolumeInformationA 7377->7378 7380 1911ef6 7378->7380 7380->7374 7382 1911eee GetVolumeInformationA 7381->7382 7383 1911ef6 7382->7383 7383->7374 7217 1911da2 7219 1911dd7 WSAConnect 7217->7219 7220 1911df6 7219->7220 7384 1911662 7386 191169a MapViewOfFile 7384->7386 7387 19116e9 7386->7387 7221 11cb32a 7223 11cb35f ReadFile 7221->7223 7224 11cb391 7223->7224 7225 191212a 7226 1912165 LoadLibraryA 7225->7226 7228 19121a2 7226->7228 7229 11cba22 7230 11cba4b LookupPrivilegeValueW 7229->7230 7232 11cba72 7230->7232 7233 11cbba2 7234 11cbbd1 AdjustTokenPrivileges 7233->7234 7236 11cbbf3 7234->7236 7391 1912fee 7393 1913023 ioctlsocket 7391->7393 7394 191304f 7393->7394
                                                              APIs
                                                              • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 011CBBEB
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: AdjustPrivilegesToken
                                                              • String ID:
                                                              • API String ID: 2874748243-0
                                                              • Opcode ID: 5650263ca781d42e4b317dd0a8e8717c7d254cdbd2a6cd7d7e33f65ab909d94e
                                                              • Instruction ID: d822b96d60071da5f78505c4ada14cb4782da64caceca2155d989be708de185d
                                                              • Opcode Fuzzy Hash: 5650263ca781d42e4b317dd0a8e8717c7d254cdbd2a6cd7d7e33f65ab909d94e
                                                              • Instruction Fuzzy Hash: 1021BC75509380AFEB228F25DC41B62BFB4EF16310F0884DAE984CB563D335A918CB62
                                                              APIs
                                                              • NtQuerySystemInformation.NTDLL ref: 019101FD
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: InformationQuerySystem
                                                              • String ID:
                                                              • API String ID: 3562636166-0
                                                              • Opcode ID: 687fec83746a04751432b41e8e239cabad2128bd097eb995606baf05b6f2787a
                                                              • Instruction ID: c0550d80376e77002df8ecba94b8561a8676251f65ea6420b36cc690544bdf08
                                                              • Opcode Fuzzy Hash: 687fec83746a04751432b41e8e239cabad2128bd097eb995606baf05b6f2787a
                                                              • Instruction Fuzzy Hash: BA219F714097C09FDB238B21DC45A51FFB4EF06214F0984CBE9844B5A3D266995DCB62
                                                              APIs
                                                              • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 011CBBEB
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: AdjustPrivilegesToken
                                                              • String ID:
                                                              • API String ID: 2874748243-0
                                                              • Opcode ID: e91eed7d0865c46404eb2f6fc7baca05a2758b1dfdca899565247b9f1d81990c
                                                              • Instruction ID: 0686535b322f4c6947a44eeee8c071f9f49375e3ad0551a103d0fe5f692abc92
                                                              • Opcode Fuzzy Hash: e91eed7d0865c46404eb2f6fc7baca05a2758b1dfdca899565247b9f1d81990c
                                                              • Instruction Fuzzy Hash: D411A0715042009FEB24CF55D985B62FBE4EF14720F08C4AEDE49CBA56D335E418CB66
                                                              APIs
                                                              • NtSetInformationProcess.NTDLL ref: 011CBF2D
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: InformationProcess
                                                              • String ID:
                                                              • API String ID: 1801817001-0
                                                              • Opcode ID: 37e6b587709f143bba9b15aa91c3fa83b653a29febbda10e88b2d42dec958ead
                                                              • Instruction ID: a9235abf418db343fc2a8b4ae4afd025b35aa13b8948181cbf1433a2dc7d9e2a
                                                              • Opcode Fuzzy Hash: 37e6b587709f143bba9b15aa91c3fa83b653a29febbda10e88b2d42dec958ead
                                                              • Instruction Fuzzy Hash: F31191714083809FDB228F15DC45A62FFB4EF46220F08C49EED844B662D276A818CB62
                                                              APIs
                                                              • NtSetInformationProcess.NTDLL ref: 011CBF2D
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: InformationProcess
                                                              • String ID:
                                                              • API String ID: 1801817001-0
                                                              • Opcode ID: 2b432da700fc149ced344df26222028b17e192fd8dd8a311c7dbb6168c2b1d4e
                                                              • Instruction ID: 682dd00e2353d38766ddc4bba4b47db75e6d9098e23ae3ef2839ddf4b929d113
                                                              • Opcode Fuzzy Hash: 2b432da700fc149ced344df26222028b17e192fd8dd8a311c7dbb6168c2b1d4e
                                                              • Instruction Fuzzy Hash: 18018F318042009FDB218F05D885B61FBE0EF24720F08C09EDD494A752D376E418CF63
                                                              APIs
                                                              • NtQuerySystemInformation.NTDLL ref: 019101FD
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: InformationQuerySystem
                                                              • String ID:
                                                              • API String ID: 3562636166-0
                                                              • Opcode ID: be40eee65c63e25272ad1893a6851c39928ca0c76cfbde3a8520b273cf560369
                                                              • Instruction ID: aceb09254cfe2853398768a1ffd0790bf788a738d5cc8528f05201a334fe9f20
                                                              • Opcode Fuzzy Hash: be40eee65c63e25272ad1893a6851c39928ca0c76cfbde3a8520b273cf560369
                                                              • Instruction Fuzzy Hash: 6C018F35500204DFEB218F45D844B61FBE4FF19320F08C49AED494B656D376E498CB62

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 1790310-1790334 2 179033e-1790346 0->2 3 1790336-1790338 0->3 4 1790348-179034d 2->4 5 179034e-179035a 2->5 3->2 7 179035d-179035e 5->7 8 179035c 5->8 10 179035f-1790360 7->10 11 1790361 7->11 8->7 9 1790362 8->9 12 1790365-1790391 9->12 13 1790364 9->13 10->11 11->9 15 17903d8-1790418 12->15 16 1790393-17903ce 12->16 13->12 23 179041a 15->23 24 179041f 15->24 16->15 23->24 62 179041f call 1960606 24->62 63 179041f call 1790938 24->63 64 179041f call 1790ba8 24->64 65 179041f call 1790d98 24->65 66 179041f call 1790c8d 24->66 67 179041f call 1790d40 24->67 68 179041f call 1790b03 24->68 69 179041f call 1790c22 24->69 70 179041f call 1790f05 24->70 71 179041f call 1790e55 24->71 25 1790425-1790434 26 179046b-1790523 call 1960606 25->26 27 1790436-1790460 25->27 46 1790570-1790587 26->46 47 1790525-1790569 call 1960606 26->47 27->26 48 179058d-17905b9 call 1791ed7 46->48 49 1790880 46->49 47->46 57 17905bf 48->57 57->49 62->25 63->25 64->25 65->25 66->25 67->25 68->25 69->25 70->25 71->25
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: [xk^$-[xk^$2l$2l$2l$=[xk^
                                                              • API String ID: 0-1369363255
                                                              • Opcode ID: b3790825ba8eddb26d1da58d7b38ab028aacb32841f6f9a4c81697e7d6ffb8fe
                                                              • Instruction ID: ae8ec9e7ee6f8a3117cf2d599f89f130c13d60030390627925b3da03184e1c29
                                                              • Opcode Fuzzy Hash: b3790825ba8eddb26d1da58d7b38ab028aacb32841f6f9a4c81697e7d6ffb8fe
                                                              • Instruction Fuzzy Hash: 726135307212008BEB1CEB79940077E77EBAB95208B14456DE106DB7D5DF39DC0AC7A2

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 73 17903bd-1790418 81 179041a 73->81 82 179041f 73->82 81->82 120 179041f call 1960606 82->120 121 179041f call 1790938 82->121 122 179041f call 1790ba8 82->122 123 179041f call 1790d98 82->123 124 179041f call 1790c8d 82->124 125 179041f call 1790d40 82->125 126 179041f call 1790b03 82->126 127 179041f call 1790c22 82->127 128 179041f call 1790f05 82->128 129 179041f call 1790e55 82->129 83 1790425-1790434 84 179046b-1790523 call 1960606 83->84 85 1790436-1790460 83->85 104 1790570-1790587 84->104 105 1790525-1790569 call 1960606 84->105 85->84 106 179058d-17905b9 call 1791ed7 104->106 107 1790880 104->107 105->104 115 17905bf 106->115 115->107 120->83 121->83 122->83 123->83 124->83 125->83 126->83 127->83 128->83 129->83
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: [xk^$-[xk^$2l$2l$2l$=[xk^
                                                              • API String ID: 0-1369363255
                                                              • Opcode ID: e42db5db386c6a010a75638d30e733daed082abd0eeb1279d629b7be80e6ae54
                                                              • Instruction ID: 8a5b8b0eb56c7a00975597b0ad19da04752166c28be528cb663d78d97284ff82
                                                              • Opcode Fuzzy Hash: e42db5db386c6a010a75638d30e733daed082abd0eeb1279d629b7be80e6ae54
                                                              • Instruction Fuzzy Hash: 9541D030B112014BEB1CA77A9010BBD66DBAFE5648718446DE016EBBD4DF39DD0A87A2

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 131 1791653-179165c 132 179165e-1791681 131->132 133 1791691-17916a8 131->133 134 179168b 132->134 136 17916aa-17916b0 133->136 137 17916d2-179182f call 1790310 * 2 133->137 134->133 138 17916b7-17916bf 136->138 243 1791836 call 1960606 137->243 244 1791836 call 1792bc8 137->244 245 1791836 call 17929cb 137->245 246 1791836 call 1792aad 137->246 247 1791836 call 179275f 137->247 248 1791836 call 17927c0 137->248 249 1791836 call 1792915 137->249 250 1791836 call 17928c5 137->250 251 1791836 call 1792957 137->251 138->137 167 179183c-179184a call 1793038 253 1791850 call 1791d70 167->253 254 1791850 call 1791d60 167->254 169 1791856-179186e 172 1791870-1791891 169->172 173 1791893-17918d1 169->173 178 17918d4-17919ac 172->178 173->178 195 17919ae-17919b3 178->195 196 17919b5 178->196 197 17919ba-17919e2 195->197 196->197 200 17919eb 197->200 201 17919e4-17919e9 197->201 202 17919f0-1791a18 200->202 201->202 205 1791a1a-1791a1f 202->205 206 1791a21 202->206 207 1791a26-1791a4e 205->207 206->207 210 1791a50-1791a55 207->210 211 1791a57 207->211 212 1791a5c-1791a84 210->212 211->212 215 1791a8d 212->215 216 1791a86-1791a8b 212->216 217 1791a92-1791aba 215->217 216->217 220 1791abc-1791ac1 217->220 221 1791ac3 217->221 222 1791ac8-1791af0 220->222 221->222 225 1791af9 222->225 226 1791af2-1791af7 222->226 227 1791afe-1791b26 225->227 226->227 230 1791b28-1791b2d 227->230 231 1791b2f 227->231 232 1791b34-1791b6c call 1793038 230->232 231->232 237 1791b72-1791bbc 232->237 241 1791bbd 237->241 241->241 243->167 244->167 245->167 246->167 247->167 248->167 249->167 250->167 251->167 253->169 254->169
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: :@k$:@k$\Ol
                                                              • API String ID: 0-2849025850
                                                              • Opcode ID: c7870c7733b5199dea537437f874d4a0353ba4839cc16f43524be72609498ac9
                                                              • Instruction ID: b04029311361cf56d1c9fcf199c28d4003a449dd224b2669f806f64dfe2f5643
                                                              • Opcode Fuzzy Hash: c7870c7733b5199dea537437f874d4a0353ba4839cc16f43524be72609498ac9
                                                              • Instruction Fuzzy Hash: 7BC1AB31B012518BFF199B75E4117AE77EBEBA8618F20806A940697BC5CF7CDC09CB61

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 255 17916c1-179182f call 1790310 * 2 365 1791836 call 1960606 255->365 366 1791836 call 1792bc8 255->366 367 1791836 call 17929cb 255->367 368 1791836 call 1792aad 255->368 369 1791836 call 179275f 255->369 370 1791836 call 17927c0 255->370 371 1791836 call 1792915 255->371 372 1791836 call 17928c5 255->372 373 1791836 call 1792957 255->373 287 179183c-179184a call 1793038 362 1791850 call 1791d70 287->362 363 1791850 call 1791d60 287->363 289 1791856-179186e 292 1791870-1791891 289->292 293 1791893-17918d1 289->293 298 17918d4-17919ac 292->298 293->298 315 17919ae-17919b3 298->315 316 17919b5 298->316 317 17919ba-17919e2 315->317 316->317 320 17919eb 317->320 321 17919e4-17919e9 317->321 322 17919f0-1791a18 320->322 321->322 325 1791a1a-1791a1f 322->325 326 1791a21 322->326 327 1791a26-1791a4e 325->327 326->327 330 1791a50-1791a55 327->330 331 1791a57 327->331 332 1791a5c-1791a84 330->332 331->332 335 1791a8d 332->335 336 1791a86-1791a8b 332->336 337 1791a92-1791aba 335->337 336->337 340 1791abc-1791ac1 337->340 341 1791ac3 337->341 342 1791ac8-1791af0 340->342 341->342 345 1791af9 342->345 346 1791af2-1791af7 342->346 347 1791afe-1791b26 345->347 346->347 350 1791b28-1791b2d 347->350 351 1791b2f 347->351 352 1791b34-1791b6c call 1793038 350->352 351->352 357 1791b72-1791bbc 352->357 361 1791bbd 357->361 361->361 362->289 363->289 365->287 366->287 367->287 368->287 369->287 370->287 371->287 372->287 373->287
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: :@k$:@k$\Ol
                                                              • API String ID: 0-2849025850
                                                              • Opcode ID: 29fab50a593c4a6a2cf9046e0b40f304bbe9db5611815bb47902dbe0c9a0780c
                                                              • Instruction ID: 40c90fc9b176bbc8b4922903dfbf50a7023a09ca2246fa14d47bfd39c1ca1cf7
                                                              • Opcode Fuzzy Hash: 29fab50a593c4a6a2cf9046e0b40f304bbe9db5611815bb47902dbe0c9a0780c
                                                              • Instruction Fuzzy Hash: 74A1AF707012518BFF199B75E4117BE77ABEBA8618F60406A940697BC5CF7CCC09CB62

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 375 17916df-179182f call 1790310 * 2 482 1791836 call 1960606 375->482 483 1791836 call 1792bc8 375->483 484 1791836 call 17929cb 375->484 485 1791836 call 1792aad 375->485 486 1791836 call 179275f 375->486 487 1791836 call 17927c0 375->487 488 1791836 call 1792915 375->488 489 1791836 call 17928c5 375->489 490 1791836 call 1792957 375->490 406 179183c-179184a call 1793038 492 1791850 call 1791d70 406->492 493 1791850 call 1791d60 406->493 408 1791856-179186e 411 1791870-1791891 408->411 412 1791893-17918d1 408->412 417 17918d4-17919ac 411->417 412->417 434 17919ae-17919b3 417->434 435 17919b5 417->435 436 17919ba-17919e2 434->436 435->436 439 17919eb 436->439 440 17919e4-17919e9 436->440 441 17919f0-1791a18 439->441 440->441 444 1791a1a-1791a1f 441->444 445 1791a21 441->445 446 1791a26-1791a4e 444->446 445->446 449 1791a50-1791a55 446->449 450 1791a57 446->450 451 1791a5c-1791a84 449->451 450->451 454 1791a8d 451->454 455 1791a86-1791a8b 451->455 456 1791a92-1791aba 454->456 455->456 459 1791abc-1791ac1 456->459 460 1791ac3 456->460 461 1791ac8-1791af0 459->461 460->461 464 1791af9 461->464 465 1791af2-1791af7 461->465 466 1791afe-1791b26 464->466 465->466 469 1791b28-1791b2d 466->469 470 1791b2f 466->470 471 1791b34-1791b6c call 1793038 469->471 470->471 476 1791b72-1791bbc 471->476 480 1791bbd 476->480 480->480 482->406 483->406 484->406 485->406 486->406 487->406 488->406 489->406 490->406 492->408 493->408
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: :@k$:@k$\Ol
                                                              • API String ID: 0-2849025850
                                                              • Opcode ID: 7704964aa702dab2c4792988858073f3de884d65da4477b644a479a472b57b94
                                                              • Instruction ID: a70be3ec9b3cc8001aa6103e49e1e22d7b16de81d5be8ca9eb7b9fc81989188e
                                                              • Opcode Fuzzy Hash: 7704964aa702dab2c4792988858073f3de884d65da4477b644a479a472b57b94
                                                              • Instruction Fuzzy Hash: B1A19F707012518BFF199B75E4117BE77ABEBA8618F60406A940697BC5CFBCCC09CB62

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 494 17916f2-179182f call 1790310 * 2 600 1791836 call 1960606 494->600 601 1791836 call 1792bc8 494->601 602 1791836 call 17929cb 494->602 603 1791836 call 1792aad 494->603 604 1791836 call 179275f 494->604 605 1791836 call 17927c0 494->605 606 1791836 call 1792915 494->606 607 1791836 call 17928c5 494->607 608 1791836 call 1792957 494->608 524 179183c-179184a call 1793038 610 1791850 call 1791d70 524->610 611 1791850 call 1791d60 524->611 526 1791856-179186e 529 1791870-1791891 526->529 530 1791893-17918d1 526->530 535 17918d4-17919ac 529->535 530->535 552 17919ae-17919b3 535->552 553 17919b5 535->553 554 17919ba-17919e2 552->554 553->554 557 17919eb 554->557 558 17919e4-17919e9 554->558 559 17919f0-1791a18 557->559 558->559 562 1791a1a-1791a1f 559->562 563 1791a21 559->563 564 1791a26-1791a4e 562->564 563->564 567 1791a50-1791a55 564->567 568 1791a57 564->568 569 1791a5c-1791a84 567->569 568->569 572 1791a8d 569->572 573 1791a86-1791a8b 569->573 574 1791a92-1791aba 572->574 573->574 577 1791abc-1791ac1 574->577 578 1791ac3 574->578 579 1791ac8-1791af0 577->579 578->579 582 1791af9 579->582 583 1791af2-1791af7 579->583 584 1791afe-1791b26 582->584 583->584 587 1791b28-1791b2d 584->587 588 1791b2f 584->588 589 1791b34-1791b6c call 1793038 587->589 588->589 594 1791b72-1791bbc 589->594 598 1791bbd 594->598 598->598 600->524 601->524 602->524 603->524 604->524 605->524 606->524 607->524 608->524 610->526 611->526
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: :@k$:@k$\Ol
                                                              • API String ID: 0-2849025850
                                                              • Opcode ID: 97545fed64550bdda6346b7e21099bb07d3218c410a0c50b17b51259f329fee1
                                                              • Instruction ID: 567155ce80416398eecbfdea44f7ee0b311b5aad9f1f90ab3756e862fee6293d
                                                              • Opcode Fuzzy Hash: 97545fed64550bdda6346b7e21099bb07d3218c410a0c50b17b51259f329fee1
                                                              • Instruction Fuzzy Hash: 4FA19F707012518BFF199B75E4117BE77ABEBA8618F60406A940697BC5CFBCCC09CB62

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 612 1790938-179095e 613 1790961-1790993 612->613 614 1790960 612->614 616 1790999-1790a24 call 1960606 613->616 617 1790a2e-1790a30 613->617 614->613 659 1790a2a-1790a2c 616->659 618 1790a37-1790a3c 617->618 620 1790b1e-1790bc2 618->620 621 1790a42-1790a7a 618->621 657 1790bc8-1790c50 620->657 658 1790c9e-1790ca7 620->658 637 1790a7c-1790a9a 621->637 638 1790aa1-1790b01 621->638 637->638 638->620 694 1790c57-1790c8b 657->694 662 1790cad-1790d2c 658->662 663 1790d51-1790d5a 658->663 659->617 661 1790a32 659->661 661->618 705 1790d33-1790d3e 662->705 665 1790d7a-1790d83 663->665 666 1790d5c-1790d73 663->666 667 1790da9-1790db2 665->667 668 1790d85-1790d8c 665->668 666->665 671 1790db8-1790e06 call 1960606 667->671 672 1790f33-1790f3a 667->672 681 1790d96 668->681 693 1790f1c-1790f2d 671->693 681->667 693->672 696 1790e0b-1790e14 693->696 694->658 697 1790e1a-1790efb 696->697 698 1790f40-1790fd1 696->698 745 1790f03-1790f1a 697->745 728 17910ca 698->728 729 1790fd7-1790fe8 698->729 705->663 731 17910cc-17910d3 728->731 736 1790fea-179100b 729->736 743 179100d 736->743 744 1791012-1791048 736->744 743->744 753 179104a 744->753 754 179104f-1791077 744->754 745->693 748 1790f3b 745->748 748->698 753->754 758 1791079-179107b 754->758 759 179107d-17910a1 754->759 758->731 762 17910aa-17910b4 759->762 763 17910a3-17910a8 759->763 764 17910ba-17910c4 762->764 765 17910b6-17910b8 762->765 763->731 764->728 764->736 765->731
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: :@k$\Ol
                                                              • API String ID: 0-3385220609
                                                              • Opcode ID: 342eb13b8173ccdacc7e196d2ca67286ceea581de1c6da7dd1f4aec92cba4205
                                                              • Instruction ID: 1716d3e42d5a172c4af19148be74545364f36c145f5585104540418afe7b6493
                                                              • Opcode Fuzzy Hash: 342eb13b8173ccdacc7e196d2ca67286ceea581de1c6da7dd1f4aec92cba4205
                                                              • Instruction Fuzzy Hash: 82028C317052108FEF09EB78E4507ADB7E6EF88208B1440A9D506DB7A6DF39EC46CB91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 768 1790509-1790523 772 1790570-1790587 768->772 773 1790525-1790569 call 1960606 768->773 774 179058d-17905b9 call 1791ed7 772->774 775 1790880 772->775 773->772 783 17905bf 774->783 783->775
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: [xk^$2l
                                                              • API String ID: 0-3639770417
                                                              • Opcode ID: e12cc30d193f258e99b1338f612ee22a05feb2b6f550d105f8412dfcacdcc21b
                                                              • Instruction ID: 2b9594ae9db096951f8e696bdea07aac628fce276435549d689ca43b3dedcfeb
                                                              • Opcode Fuzzy Hash: e12cc30d193f258e99b1338f612ee22a05feb2b6f550d105f8412dfcacdcc21b
                                                              • Instruction Fuzzy Hash: 6701D460B111104B9F5CB77E001077E65DB6BE9548718842EE01AEB784DF38CC459BF7

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 788 1791ed7-1791ee2 790 1791ee4-1791eee 788->790 904 1791eee call 11cb28e 790->904 905 1791eee call 11cb236 790->905 792 1791ef3-1791eff 793 179234e 792->793 794 1791f05-1791f20 call 1960606 792->794 793->790 794->793 796 1791f26-1791f39 794->796 798 1791f3b-1791f41 796->798 799 1791f43-1791f52 796->799 800 1791fa4-1791fb1 798->800 803 1791f58-1791f62 799->803 804 1792353 799->804 807 1791fb8-1791fd2 800->807 805 1791f68 803->805 806 1791f64-1791f66 803->806 809 1792358-1792362 804->809 808 1791f6b-1791f91 805->808 806->808 821 1791fd9-1792027 807->821 822 1791fd4 807->822 823 1791f9b-1791fa2 808->823 824 1791f93-1791f99 808->824 813 1792365-1792366 809->813 814 1792364 809->814 815 1792369-179236a 813->815 816 1792368 813->816 814->813 819 179236d-17923a7 815->819 820 179236c 815->820 816->815 907 17923ac call 1960606 819->907 908 17923ac call 11cbed0 819->908 909 17923ac call 11cbef2 819->909 820->819 836 1792029 821->836 837 179202e-179207f 821->837 822->821 823->800 824->800 831 17923b1-17923cb 836->837 844 1792081 837->844 845 1792086-17920cc 837->845 844->845 851 17920ce 845->851 852 17920d3-1792103 845->852 851->852 852->793 856 1792109-1792139 852->856 860 17922c8-17922d6 856->860 861 17922dc-17922fe 860->861 862 179213e-1792144 860->862 861->793 864 1792300-1792304 861->864 862->809 863 179214a-1792179 862->863 863->804 873 179217f-17921a8 863->873 865 179230b-1792312 864->865 866 1792306 864->866 865->809 867 1792314-1792322 865->867 866->865 871 1792329-1792330 867->871 872 1792324 867->872 871->809 874 1792332-1792344 871->874 872->871 878 17921aa 873->878 879 17921af-17921da 873->879 874->793 878->879 883 17921dc-17921e5 879->883 884 1792212-179222d 879->884 885 17921f3-1792202 883->885 886 17921e7-17921eb 883->886 890 179222f 884->890 891 1792234-179227b 884->891 885->809 888 1792208-179220f 885->888 886->885 888->884 890->891 897 179227d 891->897 898 1792282-17922b3 891->898 897->898 902 17922bf-17922c2 898->902 903 17922b5-17922b9 898->903 902->804 902->860 903->804 903->902 904->792 905->792 907->831 908->831 909->831
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: L.l
                                                              • API String ID: 0-872349773
                                                              • Opcode ID: 2474f34a89b846be837804d19fbb050a0d4fbd0db8bff7a1ee8919158dd053b7
                                                              • Instruction ID: 7d8971d02e9254bdaede287187a7b679b74d85ffcfba81a61dafc995a6d3ccf1
                                                              • Opcode Fuzzy Hash: 2474f34a89b846be837804d19fbb050a0d4fbd0db8bff7a1ee8919158dd053b7
                                                              • Instruction Fuzzy Hash: 16D19F307013019FEF19EB74D440BAEB6E6AF98208F148479D549DB796EB38DD4ACB90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 910 1912df2-1912e76 914 1912e78 910->914 915 1912e7b-1912e87 910->915 914->915 916 1912e89 915->916 917 1912e8c-1912e95 915->917 916->917 918 1912e97 917->918 919 1912e9a-1912eb1 917->919 918->919 921 1912ef3-1912ef8 919->921 922 1912eb3-1912ec6 RegCreateKeyExW 919->922 921->922 923 1912ec8-1912ef0 922->923 924 1912efa-1912eff 922->924 924->923
                                                              APIs
                                                              • RegCreateKeyExW.KERNEL32(?,00000E24), ref: 01912EB9
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: dfabfbad413c56e40b0d467b05b9307ce80513d0cf718234f7f79964eb36fcc9
                                                              • Instruction ID: a68f8680a5b6e5d729653015e7e41fd4d93e67c5c4942b113336ad9f088729d0
                                                              • Opcode Fuzzy Hash: dfabfbad413c56e40b0d467b05b9307ce80513d0cf718234f7f79964eb36fcc9
                                                              • Instruction Fuzzy Hash: 08316F72504744AFE722CB65CC44FA7BFECEF05210F08859AE989DB652D324E948CBA1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 929 1910f73-1910f93 930 1910fb5-1910fe7 929->930 931 1910f95-1910fb4 929->931 935 1910fea-1911042 RegQueryValueExW 930->935 931->930 937 1911048-191105e 935->937
                                                              APIs
                                                              • RegQueryValueExW.KERNEL32(?,00000E24,?,?), ref: 0191103A
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: QueryValue
                                                              • String ID:
                                                              • API String ID: 3660427363-0
                                                              • Opcode ID: dc18e84f9e10f133cd7868df6c1377533a33c36abc42cf15a576c8d568df9ba6
                                                              • Instruction ID: 7864aa5cebd395ccfdf8af818cf9f83e0017cbafb32078de67d47b7a4a42d094
                                                              • Opcode Fuzzy Hash: dc18e84f9e10f133cd7868df6c1377533a33c36abc42cf15a576c8d568df9ba6
                                                              • Instruction Fuzzy Hash: 1D318F6110E7C06FD3138B358C61A61BFB4EF47610B0E85CBE8C48F6A3D119A919C7B2

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 938 1911ba0-1911c5f 944 1911cb1-1911cb6 938->944 945 1911c61-1911c69 getaddrinfo 938->945 944->945 947 1911c6f-1911c81 945->947 948 1911c83-1911cae 947->948 949 1911cb8-1911cbd 947->949 949->948
                                                              APIs
                                                              • getaddrinfo.WS2_32(?,00000E24), ref: 01911C67
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: getaddrinfo
                                                              • String ID:
                                                              • API String ID: 300660673-0
                                                              • Opcode ID: 87137e07d7fb8e100729f458f8fc82133c51f76b9dcc24d29b5c4792c0344737
                                                              • Instruction ID: 47c8acfbf2232235f14100a065db84a21230d648ec28ed63e8575770e32e4b60
                                                              • Opcode Fuzzy Hash: 87137e07d7fb8e100729f458f8fc82133c51f76b9dcc24d29b5c4792c0344737
                                                              • Instruction Fuzzy Hash: 9631C2B2500344AFE721CB61CD44FA6FBACEF44314F04899AFA489B682D375A94CCB71

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 953 1911e2e-1911ef0 GetVolumeInformationA 956 1911ef6-1911f1f 953->956
                                                              APIs
                                                              • GetVolumeInformationA.KERNEL32(?,00000E24,?,?), ref: 01911EEE
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: InformationVolume
                                                              • String ID:
                                                              • API String ID: 2039140958-0
                                                              • Opcode ID: cd516695f5f8c3f666197163103dce9e1b251d6d5dc7dbce33c934e333d3b424
                                                              • Instruction ID: 4e021ad3308add0f14e61c7ee214992a6bfbf0e4540cd6b57e409caf768a2779
                                                              • Opcode Fuzzy Hash: cd516695f5f8c3f666197163103dce9e1b251d6d5dc7dbce33c934e333d3b424
                                                              • Instruction Fuzzy Hash: F0316E7150D3C06FD3138B358C61AA2BFB8AF47210F1A85DBD8C4DF5A3D225A959C7A2

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 958 11cab1e-11cabad 962 11cabaf 958->962 963 11cabb2-11cabc9 958->963 962->963 965 11cac0b-11cac10 963->965 966 11cabcb-11cabde RegOpenKeyExW 963->966 965->966 967 11cabe0-11cac08 966->967 968 11cac12-11cac17 966->968 968->967
                                                              APIs
                                                              • RegOpenKeyExW.KERNEL32(?,00000E24), ref: 011CABD1
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: Open
                                                              • String ID:
                                                              • API String ID: 71445658-0
                                                              • Opcode ID: 8be4f2d1a1b2d339cf299932d1af6e78d74a121361344d1eaeaaf961d6ec6711
                                                              • Instruction ID: 82bf75973b1521fdaa46831316c385a2d6c60a1a172502ded2ed3d8949cf0a74
                                                              • Opcode Fuzzy Hash: 8be4f2d1a1b2d339cf299932d1af6e78d74a121361344d1eaeaaf961d6ec6711
                                                              • Instruction Fuzzy Hash: 023193714087846FE7228B65DC44FA6BFBCEF16210F09849AE985DB653D324E908C771

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 973 11ca612-11ca695 977 11ca69a-11ca6a3 973->977 978 11ca697 973->978 979 11ca6a8-11ca6b1 977->979 980 11ca6a5 977->980 978->977 981 11ca702-11ca707 979->981 982 11ca6b3-11ca6d7 CreateMutexW 979->982 980->979 981->982 985 11ca709-11ca70e 982->985 986 11ca6d9-11ca6ff 982->986 985->986
                                                              APIs
                                                              • CreateMutexW.KERNEL32(?,?), ref: 011CA6B9
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CreateMutex
                                                              • String ID:
                                                              • API String ID: 1964310414-0
                                                              • Opcode ID: 9038b4dbcb740ab0c4193b3a9b0c40daba25dcdaa6eb712cf79937b84aa7df77
                                                              • Instruction ID: 0d17eb5717f06da53f47e8c4fae14551c918a5c6937929fe65f519cb2f93e3f1
                                                              • Opcode Fuzzy Hash: 9038b4dbcb740ab0c4193b3a9b0c40daba25dcdaa6eb712cf79937b84aa7df77
                                                              • Instruction Fuzzy Hash: 4531C1B55097845FE712CB25DC45B96BFF8EF16210F08849AE984CB292E335E909C761
                                                              APIs
                                                              • GetExitCodeProcess.KERNEL32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 011CBE6C
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CodeExitProcess
                                                              • String ID:
                                                              • API String ID: 3861947596-0
                                                              • Opcode ID: 14ddd0f284c87817174782d35cf3c547c5604d5302ee00a579f74117ac05d4eb
                                                              • Instruction ID: 34c706f977cd509a6c93f0150c52b987f2ebddbf6925fe2710e8e02d2eda0a6c
                                                              • Opcode Fuzzy Hash: 14ddd0f284c87817174782d35cf3c547c5604d5302ee00a579f74117ac05d4eb
                                                              • Instruction Fuzzy Hash: F02123B25097805FE7128B24DC45BA6BFB8EF53720F0880DAE984DF593D224A909CB75
                                                              APIs
                                                              • GetProcessTimes.KERNEL32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 01911B35
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: ProcessTimes
                                                              • String ID:
                                                              • API String ID: 1995159646-0
                                                              • Opcode ID: edb2d01fc00923b6b25c38feb482bceecdf1ebc6a2273734322b6f6664b7c924
                                                              • Instruction ID: 9418083cc5945143603cc88f45c57957b7723218b68dba494647a25ca12f0ba4
                                                              • Opcode Fuzzy Hash: edb2d01fc00923b6b25c38feb482bceecdf1ebc6a2273734322b6f6664b7c924
                                                              • Instruction Fuzzy Hash: 4731F7B15057806FE712CF64DC45FA6BFB8EF16314F08849AE984CB193D225A949C771
                                                              APIs
                                                              • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 01911523
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: DescriptorSecurity$ConvertString
                                                              • String ID:
                                                              • API String ID: 3907675253-0
                                                              • Opcode ID: a1b64c3d42bf946ca44251428961152784c6f9ba292d835a2dc0be166c40b1cb
                                                              • Instruction ID: cd7882aa8d13975ea37d695eecaec5d2dc7bcaacd1708afd7994e28c1cceb5ee
                                                              • Opcode Fuzzy Hash: a1b64c3d42bf946ca44251428961152784c6f9ba292d835a2dc0be166c40b1cb
                                                              • Instruction Fuzzy Hash: 5A31B171504344AFE7228B64DC45FA6BFACEF45210F0884AAE945DB652D224E948CB61
                                                              APIs
                                                              • CreateFileW.KERNEL32(?,?,?,?,?,?), ref: 011CAF1D
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CreateFile
                                                              • String ID:
                                                              • API String ID: 823142352-0
                                                              • Opcode ID: db484c21bc1e41f7a57f55af346c5845bbc403bb906b9f355d30c897bdd79d47
                                                              • Instruction ID: 1acedeb5e113f6009289a09615a13a34b71a7cd7b03cd94c71f30667bcb236ea
                                                              • Opcode Fuzzy Hash: db484c21bc1e41f7a57f55af346c5845bbc403bb906b9f355d30c897bdd79d47
                                                              • Instruction Fuzzy Hash: 9B31D1B1504340AFE722CF25DC84F56FBE8EF05610F08849DE9898B692D335E808CB71
                                                              APIs
                                                              • RegCreateKeyExW.KERNEL32(?,00000E24), ref: 01912EB9
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 3a6487458dcb7b245dc0baeb59ccbc1924b6ec7f864100af81454e84611aff64
                                                              • Instruction ID: 2b2f63a6d070261fab31566d41e7669cd001e7adae7849dbd0d8e74f383f16ab
                                                              • Opcode Fuzzy Hash: 3a6487458dcb7b245dc0baeb59ccbc1924b6ec7f864100af81454e84611aff64
                                                              • Instruction Fuzzy Hash: 1121A072500608AFEB21DF15CC44FA7BBECEF18614F14881AEA49DBA52E330F448CB61
                                                              APIs
                                                              • RegQueryValueExW.KERNEL32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 011CA40C
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: QueryValue
                                                              • String ID:
                                                              • API String ID: 3660427363-0
                                                              • Opcode ID: b64e7de38de30916922d2508be495643bbeac5d8784dc2603fdfec9d062397a0
                                                              • Instruction ID: f7b11f5b2d22a6d9f3f8f7970104a0aaa0a0616c116b18d69e854e3df937c7c6
                                                              • Opcode Fuzzy Hash: b64e7de38de30916922d2508be495643bbeac5d8784dc2603fdfec9d062397a0
                                                              • Instruction Fuzzy Hash: B331B1B1508744AFE722CF15DC84FA2BFF8EF16610F08849AE945CB292D364E809CB61
                                                              APIs
                                                              • GetProcessWorkingSetSize.KERNEL32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 019131F7
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: ProcessSizeWorking
                                                              • String ID:
                                                              • API String ID: 3584180929-0
                                                              • Opcode ID: 6720d7d36c8089bbdd412e1b2e4e1868444f841b4ba09a81757df86ca21c0560
                                                              • Instruction ID: dfc0e992698a2e0854f051b4e83f82a69a53534a9405bacc0d9451cd4687cdad
                                                              • Opcode Fuzzy Hash: 6720d7d36c8089bbdd412e1b2e4e1868444f841b4ba09a81757df86ca21c0560
                                                              • Instruction Fuzzy Hash: 0E21D5B15097846FE713CB24CC54B96BFB8EF46224F08C4DAE9889F193D225A949C772
                                                              APIs
                                                              • getaddrinfo.WS2_32(?,00000E24), ref: 01911C67
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: getaddrinfo
                                                              • String ID:
                                                              • API String ID: 300660673-0
                                                              • Opcode ID: 818533c524628b920ca75732e18e3f892b3c514562735fdd65b7bc41b7941a53
                                                              • Instruction ID: e2e395024cea50919c413e0a6af076bd8235a880d67058156a09a967dc4a9f1a
                                                              • Opcode Fuzzy Hash: 818533c524628b920ca75732e18e3f892b3c514562735fdd65b7bc41b7941a53
                                                              • Instruction Fuzzy Hash: A921D172500204AEFB219B61CD84FA6F7ACEF54314F04885AFA48DA685D375E58CCB71
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: select
                                                              • String ID:
                                                              • API String ID: 1274211008-0
                                                              • Opcode ID: 71b3df8cbc68e5ad09945a49fd86ecc2eb14dba990c2bef5c9c8f4a844cc1349
                                                              • Instruction ID: 948e3e191c3e20558b09e385f379ea4a01e092860c16835da50aba4696eb4466
                                                              • Opcode Fuzzy Hash: 71b3df8cbc68e5ad09945a49fd86ecc2eb14dba990c2bef5c9c8f4a844cc1349
                                                              • Instruction Fuzzy Hash: 02216F755083849FD712CF25DC44B52BFF8FF06220F0884DAE988CB563D265E949CB61
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: :@k
                                                              • API String ID: 0-2277858631
                                                              • Opcode ID: 324cb268adccf4da69dd88e83cfbbf48ecaea575f47ce26c9b0717bd905d78d9
                                                              • Instruction ID: 9ea506b5f53774709048f2a9e518c993ec0d5db2244d457be3bfd40f55770bc9
                                                              • Opcode Fuzzy Hash: 324cb268adccf4da69dd88e83cfbbf48ecaea575f47ce26c9b0717bd905d78d9
                                                              • Instruction Fuzzy Hash: DED14E31A01304AFDF09EFB5E4506AEB7B6FB88244B108069D516977A5DF39EC46CF90
                                                              APIs
                                                              • RegSetValueExW.KERNEL32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 011CA4F8
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: 7c21a394ce3046d7d3780c9343573102ad40ae36a91cef31b429c9c9ba1d1b20
                                                              • Instruction ID: b8717ff37dce9274d9517c84f6bf8cdcff35bf9e6e3eb328a14ada053222b5b3
                                                              • Opcode Fuzzy Hash: 7c21a394ce3046d7d3780c9343573102ad40ae36a91cef31b429c9c9ba1d1b20
                                                              • Instruction Fuzzy Hash: 5421B0B25047846FE7228F15DC44FA7FFB8EF56620F08849AE985DB692D364E808C771
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: FileView
                                                              • String ID:
                                                              • API String ID: 3314676101-0
                                                              • Opcode ID: 107c6bcef894fe3b873cc366e8578f38939dbad44f1de01281e194eb4b1f92dc
                                                              • Instruction ID: 3e87f8c18c50c7141d04ad8dd5005d2658c2c874ceb16d429ff133e1d296d497
                                                              • Opcode Fuzzy Hash: 107c6bcef894fe3b873cc366e8578f38939dbad44f1de01281e194eb4b1f92dc
                                                              • Instruction Fuzzy Hash: D721BFB1404384AFE722CB65CC44F96FFF8EF19224F04849EE9859B692D375E508CB62
                                                              APIs
                                                              • WSASocketW.WS2_32(?,?,?,?,?), ref: 019110F2
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: Socket
                                                              • String ID:
                                                              • API String ID: 38366605-0
                                                              • Opcode ID: 8a264c80cc703fc0d9d685d38fd3fa8ed7128c3e977ae7cf82cad83a861433f8
                                                              • Instruction ID: 2c4a96c2bcef78682c7c88f44dbfaeb126d8e27968ee409e1530f9451ce90eb8
                                                              • Opcode Fuzzy Hash: 8a264c80cc703fc0d9d685d38fd3fa8ed7128c3e977ae7cf82cad83a861433f8
                                                              • Instruction Fuzzy Hash: 3B21D271405780AFE722CF65CC44F96FFB8EF05220F04849EE9858B652D375A408CB61
                                                              APIs
                                                              • CreateFileW.KERNEL32(?,?,?,?,?,?), ref: 011CAF1D
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CreateFile
                                                              • String ID:
                                                              • API String ID: 823142352-0
                                                              • Opcode ID: 6e8680bf805d2560e4baa7ee7d762b7fcc7e3045d5f7bc610ebd72e897bc1283
                                                              • Instruction ID: 4af6960a5963ed910944ef41fb585b775dab809b5cd4dfa6b7996701d80baecd
                                                              • Opcode Fuzzy Hash: 6e8680bf805d2560e4baa7ee7d762b7fcc7e3045d5f7bc610ebd72e897bc1283
                                                              • Instruction Fuzzy Hash: 2321B2B1500604AFE721CF65DD45F66FBE8EF18610F04846DE9459B691E371F408CB72
                                                              APIs
                                                              • ReadFile.KERNEL32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 011CB389
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: FileRead
                                                              • String ID:
                                                              • API String ID: 2738559852-0
                                                              • Opcode ID: 3da0e20b6927597fe1e392099646f8f173972e804bdfe0f6937f1e3f22067cc2
                                                              • Instruction ID: 9799b827d5c249826ee506ba94a802c4006a042e0e17e069ccaae92eb700efba
                                                              • Opcode Fuzzy Hash: 3da0e20b6927597fe1e392099646f8f173972e804bdfe0f6937f1e3f22067cc2
                                                              • Instruction Fuzzy Hash: 7E21C5B1408340AFE7228F55DC44FA7BFA8EF56710F04849AF985DB552D225A908CBB5
                                                              APIs
                                                              • RegQueryValueExW.KERNEL32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 01911438
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: QueryValue
                                                              • String ID:
                                                              • API String ID: 3660427363-0
                                                              • Opcode ID: 2317016a1283e67bcd0b24b2aec85990b041a7fb5f830fb40f1aeaa4c568cdd3
                                                              • Instruction ID: 5858732d886dd872df46e7b3a303f6e8b7cf625d3dcda30f410057ba00945115
                                                              • Opcode Fuzzy Hash: 2317016a1283e67bcd0b24b2aec85990b041a7fb5f830fb40f1aeaa4c568cdd3
                                                              • Instruction Fuzzy Hash: 9921A371504744AFE722CB55CC44F67BFFCEF45710F08849AEA459B692D325E408C761
                                                              APIs
                                                              • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 01911523
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: DescriptorSecurity$ConvertString
                                                              • String ID:
                                                              • API String ID: 3907675253-0
                                                              • Opcode ID: 7a7fba670a4c8c120b0dd3dfb74b5b631caef983ce805de607be8827ed48b4ac
                                                              • Instruction ID: 806472c75f5841211c4ece3363cde81f980e04065f5ef141d2b40ae17911759a
                                                              • Opcode Fuzzy Hash: 7a7fba670a4c8c120b0dd3dfb74b5b631caef983ce805de607be8827ed48b4ac
                                                              • Instruction Fuzzy Hash: 8C21D771500204AFEB21DF65DC45F6AFBECEF14210F08846AEA45DB645D374E5488B71
                                                              APIs
                                                              • K32EnumProcesses.KERNEL32(?,?,?,859D76D7,00000000,?,?,?,?,?,?,?,?,6C963C58), ref: 0191013E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: EnumProcesses
                                                              • String ID:
                                                              • API String ID: 84517404-0
                                                              • Opcode ID: 4741251fcb7f1bb86c72ca6c85e154b6662acf9df24b2b3247084951ce26b312
                                                              • Instruction ID: c35a9e9b0c7a3278a80b40c8ef944945ab977cc60623c02fda41865d92263be0
                                                              • Opcode Fuzzy Hash: 4741251fcb7f1bb86c72ca6c85e154b6662acf9df24b2b3247084951ce26b312
                                                              • Instruction Fuzzy Hash: F821BC715093C09FD7138B65CC54A92BFB8AF07320F0D84DBE988CF1A3D2299958CB62
                                                              APIs
                                                              • GetFileType.KERNEL32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 011CB009
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: FileType
                                                              • String ID:
                                                              • API String ID: 3081899298-0
                                                              • Opcode ID: a962bcd9a39e8c2cd3de10a943f13d33a6782b3c436445ebf2921eea6aaa51a3
                                                              • Instruction ID: 5b5c4a5008bbc0ee50509af3af17457d7b138667c9db3a64f59ebc2ed748360d
                                                              • Opcode Fuzzy Hash: a962bcd9a39e8c2cd3de10a943f13d33a6782b3c436445ebf2921eea6aaa51a3
                                                              • Instruction Fuzzy Hash: C72129B54087806FE7128B15DC45BA3BFBCEF56720F09C0DAE9848B693D324A909C775
                                                              APIs
                                                              • RegOpenKeyExW.KERNEL32(?,00000E24), ref: 011CABD1
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: Open
                                                              • String ID:
                                                              • API String ID: 71445658-0
                                                              • Opcode ID: 7aa24efb5aadf5990fd03da0226e358364df07ba61367724ebe1698a347e352e
                                                              • Instruction ID: 60d836e23e4bf76ecf38c4bccac8646f1f68219a847708f84c2bb587b176cea6
                                                              • Opcode Fuzzy Hash: 7aa24efb5aadf5990fd03da0226e358364df07ba61367724ebe1698a347e352e
                                                              • Instruction Fuzzy Hash: 1621CFB2500604AFE7219F55DC44FABFBECEF24614F04845AEA459B642E334E44C8BB2
                                                              APIs
                                                              • SetProcessWorkingSetSize.KERNEL32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 019132DB
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: ProcessSizeWorking
                                                              • String ID:
                                                              • API String ID: 3584180929-0
                                                              • Opcode ID: 7f84d19b0edbb5f3ba534ed108c74c51d63b8864066b1576bc064ade2790bead
                                                              • Instruction ID: 0aaa92566408ee1a49f1d784fec1f845d50e59042cae34acac3b04a4de887bfc
                                                              • Opcode Fuzzy Hash: 7f84d19b0edbb5f3ba534ed108c74c51d63b8864066b1576bc064ade2790bead
                                                              • Instruction Fuzzy Hash: 1721C2B15043846FE712CB25DC44FA6BFB8EF45220F08C49AE944DB692D264E908CB65
                                                              APIs
                                                              • CreateMutexW.KERNEL32(?,?), ref: 011CA6B9
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CreateMutex
                                                              • String ID:
                                                              • API String ID: 1964310414-0
                                                              • Opcode ID: bbe8756541014f16ecd49de1c740fdbf67764120f79eacf971c66277d6b2ce6b
                                                              • Instruction ID: 21161fce0265bc41de3a614606defa299bdcc20d323e0ec7e2f1207d38aa66b3
                                                              • Opcode Fuzzy Hash: bbe8756541014f16ecd49de1c740fdbf67764120f79eacf971c66277d6b2ce6b
                                                              • Instruction Fuzzy Hash: 7221D0B16002049FE711CB29DC45BA6FBE8EF24620F04846EE9458B741E371E809CB62
                                                              APIs
                                                              • shutdown.WS2_32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 0191195C
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: shutdown
                                                              • String ID:
                                                              • API String ID: 2510479042-0
                                                              • Opcode ID: 0bb0cdb326202738ca97f801afb105fa99cee88bba299c9518ca8e3256811e38
                                                              • Instruction ID: 76e31cf69066201b02736e1cb97d2368a4ef1a49d7f0bd1a2623c599a441eb4c
                                                              • Opcode Fuzzy Hash: 0bb0cdb326202738ca97f801afb105fa99cee88bba299c9518ca8e3256811e38
                                                              • Instruction Fuzzy Hash: E92195B1409384AFD7128B55DC44BA6FFB8EF46220F0884DAE9849F692D269A548C762
                                                              APIs
                                                              • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 011CBA6A
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: LookupPrivilegeValue
                                                              • String ID:
                                                              • API String ID: 3899507212-0
                                                              • Opcode ID: fc09bebf0a1a5490de5569fe516b511bd1a9edaefadd501e4aad4e1940b26a63
                                                              • Instruction ID: 8fb9116c5828798f1796d84d0aeb89ea9536ef87083e14806d74ea67bea064cf
                                                              • Opcode Fuzzy Hash: fc09bebf0a1a5490de5569fe516b511bd1a9edaefadd501e4aad4e1940b26a63
                                                              • Instruction Fuzzy Hash: 46216F716093805FEB228F29CC55B62BFE8EF46650F08849AED85CB652D275E808CB61
                                                              APIs
                                                              • RegQueryValueExW.KERNEL32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 011CA40C
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: QueryValue
                                                              • String ID:
                                                              • API String ID: 3660427363-0
                                                              • Opcode ID: a99ddfc597647f5a245d20860491f80b605dd88228d8b788dcba024581fd5e78
                                                              • Instruction ID: e6d57b7cba69d20c909d20d52e5543d8f95059cb095caea9f090923d24fbd2a5
                                                              • Opcode Fuzzy Hash: a99ddfc597647f5a245d20860491f80b605dd88228d8b788dcba024581fd5e78
                                                              • Instruction Fuzzy Hash: 2C2193756006049FE722CF15DC84FA6F7ECEF24A10F08C45AEA45DB651E364E809CB72
                                                              APIs
                                                              • ioctlsocket.WS2_32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 01913047
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: ioctlsocket
                                                              • String ID:
                                                              • API String ID: 3577187118-0
                                                              • Opcode ID: 9c3c7f18f408b85050ecd6812fc5e4d1f1e04fa664c264546c35d6eee9523f8c
                                                              • Instruction ID: b0afe04c1056efd25acfa1d9e90e5cbaac9d44a5f4bc05fd8c57b5dc602666d7
                                                              • Opcode Fuzzy Hash: 9c3c7f18f408b85050ecd6812fc5e4d1f1e04fa664c264546c35d6eee9523f8c
                                                              • Instruction Fuzzy Hash: 6221C6714093846FD722CF55CC44FA6FFB8EF45220F08C49AE9449B552D275A508C7B1
                                                              APIs
                                                              • SetFileAttributesW.KERNEL32(?,?,859D76D7,00000000,?,?,?,?,?,?,?,?,6C963C58), ref: 011CAC97
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: AttributesFile
                                                              • String ID:
                                                              • API String ID: 3188754299-0
                                                              • Opcode ID: b4748105fa65a5a95dff0bbc83dc58ccf38161404bd545bed9f87752dee0c3dd
                                                              • Instruction ID: abb5ef0c4089ff07cef69538e1639dba54329e5b05d8762f36107e2fa7c0b4f8
                                                              • Opcode Fuzzy Hash: b4748105fa65a5a95dff0bbc83dc58ccf38161404bd545bed9f87752dee0c3dd
                                                              • Instruction Fuzzy Hash: 1321C2715093C45FEB12CB25D885B92BFA8EF46324F0884DED8858B253D2749849CB62
                                                              APIs
                                                              • WSASocketW.WS2_32(?,?,?,?,?), ref: 019110F2
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: Socket
                                                              • String ID:
                                                              • API String ID: 38366605-0
                                                              • Opcode ID: 689a901f66fcc3802918dcebcaf87c36c03972daab268fef10b13c51d2ce3ca9
                                                              • Instruction ID: 7136b688b68aadbdf463da85daf8106d60e7673ce3ba352aee423d37e4ad0244
                                                              • Opcode Fuzzy Hash: 689a901f66fcc3802918dcebcaf87c36c03972daab268fef10b13c51d2ce3ca9
                                                              • Instruction Fuzzy Hash: F6210471500200AFE721CF65CD41FA6FBE8EF14320F04C86EEA458A641D375E409CB71
                                                              APIs
                                                              • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 01911DEE
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: Connect
                                                              • String ID:
                                                              • API String ID: 3144859779-0
                                                              • Opcode ID: 1d7cf1f27c539b35de9ab544f71db38479e837f7de2711ddc0405c8f0c82a9c0
                                                              • Instruction ID: b258e09067b8e759473b9b1c36471428c61d9653db02182461e6257d75ed3c40
                                                              • Opcode Fuzzy Hash: 1d7cf1f27c539b35de9ab544f71db38479e837f7de2711ddc0405c8f0c82a9c0
                                                              • Instruction Fuzzy Hash: 8B219271508384AFDB228F65DC44B62FFF8EF46310F08849AEE858B563D335A818DB61
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: FileView
                                                              • String ID:
                                                              • API String ID: 3314676101-0
                                                              • Opcode ID: 723bb5d3140663e92cce6e1989ea6fdd1125a7980ab398a90b1dd956318cec77
                                                              • Instruction ID: 8e66175ddcc7583867b71b53bcad26d60ea5e09d861919c1aa0da5fd82111127
                                                              • Opcode Fuzzy Hash: 723bb5d3140663e92cce6e1989ea6fdd1125a7980ab398a90b1dd956318cec77
                                                              • Instruction Fuzzy Hash: 6721D171400204AFE721CF65CD44F96FBE8EF18224F048469EA499B741D375F448CBA2
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(?,00000E24), ref: 01912193
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: 3ed1c160442f767a9fe686ccb2caf75184439225bd1171f4681df48a0d4e9830
                                                              • Instruction ID: 19f809258bcc0fb857a1676fc7be609574be31241625bc258a7a04b2f4771ed7
                                                              • Opcode Fuzzy Hash: 3ed1c160442f767a9fe686ccb2caf75184439225bd1171f4681df48a0d4e9830
                                                              • Instruction Fuzzy Hash: 5C11E4754043406FE721CB15CC85FA6FBA8EF46320F18809AFA449B692D264A948CB62
                                                              APIs
                                                              • RegSetValueExW.KERNEL32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 011CA4F8
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: 219d707495ab0c0f0d63f11f4d7504a52394466fae1bbd75fffe2e673f46c2f8
                                                              • Instruction ID: 9af15fb8ccacdb6142a0748b80df5332052be35411a07dd8283636c97719ea5f
                                                              • Opcode Fuzzy Hash: 219d707495ab0c0f0d63f11f4d7504a52394466fae1bbd75fffe2e673f46c2f8
                                                              • Instruction Fuzzy Hash: 9811D3B2500604AFE7228F15DC44FA7FBECEF24614F08C45AED459BA81E370E408CAB2
                                                              APIs
                                                              • RegQueryValueExW.KERNEL32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 01911438
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: QueryValue
                                                              • String ID:
                                                              • API String ID: 3660427363-0
                                                              • Opcode ID: bf438c4456d95b36d33171502273b456b188a3fbb0db0397a4c22bb3395210ab
                                                              • Instruction ID: 7647a50551279c702d47aeeec2d47b5e3d136dbb8f3a2b6bdc5ce1a139b2c0c9
                                                              • Opcode Fuzzy Hash: bf438c4456d95b36d33171502273b456b188a3fbb0db0397a4c22bb3395210ab
                                                              • Instruction Fuzzy Hash: 7911A272540604AFE721CF55CC40FA6FBECEF14B14F04C46AEA459AA91D364E448CB71
                                                              APIs
                                                              • CopyFileW.KERNEL32(?,?,?,859D76D7,00000000,?,?,?,?,?,?,?,?,6C963C58), ref: 011CAE1E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CopyFile
                                                              • String ID:
                                                              • API String ID: 1304948518-0
                                                              • Opcode ID: 68788e6e3a52b78e7f958058040184b54604c9989ec3c5cf2759a426c0e7a210
                                                              • Instruction ID: 8c95d4c1d4eba6fa4933dd2e5edb9bb7cc8aee54ab144a760c53a3b6a5a993a2
                                                              • Opcode Fuzzy Hash: 68788e6e3a52b78e7f958058040184b54604c9989ec3c5cf2759a426c0e7a210
                                                              • Instruction Fuzzy Hash: 601172B15043849FD711CF69DC85B52BFE8EF55620F0884AEED85CB652E235E808CB61
                                                              APIs
                                                              • GetProcessTimes.KERNEL32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 01911B35
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: ProcessTimes
                                                              • String ID:
                                                              • API String ID: 1995159646-0
                                                              • Opcode ID: effa74791a57f6aff81e5965375d5c9e20d6461f08f574252226e3a05bfc389a
                                                              • Instruction ID: 9ef7a47114b5ba106a8f86031bb80f75ec2e3572824516d31a1c790e36c40fef
                                                              • Opcode Fuzzy Hash: effa74791a57f6aff81e5965375d5c9e20d6461f08f574252226e3a05bfc389a
                                                              • Instruction Fuzzy Hash: D611D371500604AFEB218F65DC45FA6FBA8EF14320F04C46AEA459B655D375E448CBB1
                                                              APIs
                                                              • GetProcessWorkingSetSize.KERNEL32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 019131F7
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: ProcessSizeWorking
                                                              • String ID:
                                                              • API String ID: 3584180929-0
                                                              • Opcode ID: 8024fff162189d994f49feedabb1cc23715d3856bdcb99966698d889d096a1bd
                                                              • Instruction ID: bd47f09f9a335254f34e5db5113b771272d8098f9ce999126a65b05519e4be77
                                                              • Opcode Fuzzy Hash: 8024fff162189d994f49feedabb1cc23715d3856bdcb99966698d889d096a1bd
                                                              • Instruction Fuzzy Hash: 2D11E2716002049FEB218B55CC44BA6B7ACEF14220F04C86AEA09DB645D274E548CBB1
                                                              APIs
                                                              • SetProcessWorkingSetSize.KERNEL32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 019132DB
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: ProcessSizeWorking
                                                              • String ID:
                                                              • API String ID: 3584180929-0
                                                              • Opcode ID: 8024fff162189d994f49feedabb1cc23715d3856bdcb99966698d889d096a1bd
                                                              • Instruction ID: eb785a6918b2cc7d9ef52a69179da00f79efe6884ffed5332739896d9d4de878
                                                              • Opcode Fuzzy Hash: 8024fff162189d994f49feedabb1cc23715d3856bdcb99966698d889d096a1bd
                                                              • Instruction Fuzzy Hash: B711E2715002049FE7118F15DC44BAAF7ACEF14220F04C46AED09DB645D774E548CBB5
                                                              APIs
                                                              • GetExitCodeProcess.KERNEL32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 011CBE6C
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CodeExitProcess
                                                              • String ID:
                                                              • API String ID: 3861947596-0
                                                              • Opcode ID: fc7b35698a9792f6dfef572459ae4e7ca6951496f80bb68d40fd57d496407225
                                                              • Instruction ID: b2a6c1162186f9020b4926ba84bbf724f02857583d22914a6b80e005dac4d3ad
                                                              • Opcode Fuzzy Hash: fc7b35698a9792f6dfef572459ae4e7ca6951496f80bb68d40fd57d496407225
                                                              • Instruction Fuzzy Hash: 6111E371504200AFEB11CF15DC85BAAFB9CDF54A24F04C46AEE04DB681D775E508CBB6
                                                              APIs
                                                              • ReadFile.KERNEL32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 011CB389
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: FileRead
                                                              • String ID:
                                                              • API String ID: 2738559852-0
                                                              • Opcode ID: fb0f5ad768a7f4dd6121bcf21ddaa29fa54113072cfd217b9095a9e4f839cfa3
                                                              • Instruction ID: 85e711d5bf0b0fda5c7453a92d9fff9094a866b89e75759af8771f966970995a
                                                              • Opcode Fuzzy Hash: fb0f5ad768a7f4dd6121bcf21ddaa29fa54113072cfd217b9095a9e4f839cfa3
                                                              • Instruction Fuzzy Hash: A611EF72504200AFEB218F95CC41FAAFBA8EF64724F04C45AEE449AA41D335E408CBB6
                                                              APIs
                                                              • ioctlsocket.WS2_32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 01913047
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: ioctlsocket
                                                              • String ID:
                                                              • API String ID: 3577187118-0
                                                              • Opcode ID: 6df6d7048f38ad4e0e3d38f9b649ac2859a5b8f7b3eee662871b99de770ca328
                                                              • Instruction ID: 97063ba9030fc68eef4329a37c2d489c36515f08d205db68ead6bf15ef5779a6
                                                              • Opcode Fuzzy Hash: 6df6d7048f38ad4e0e3d38f9b649ac2859a5b8f7b3eee662871b99de770ca328
                                                              • Instruction Fuzzy Hash: 1E11C1B1900204AFE721CF55CC44FA6FBE8EF54324F04C49AE9499B645D275E5488BB1
                                                              APIs
                                                              • CoGetObjectContext.COMBASE(?,?), ref: 019120C7
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: ContextObject
                                                              • String ID:
                                                              • API String ID: 3343934925-0
                                                              • Opcode ID: 097a66e19f2b18d6ed1f2cdc8e9b03094a729861b334493c9e265a0121a4c348
                                                              • Instruction ID: 5a79301a2b9f713cf1ec60a54828918a332ce7b956d7be3f28a5424c398ee58d
                                                              • Opcode Fuzzy Hash: 097a66e19f2b18d6ed1f2cdc8e9b03094a729861b334493c9e265a0121a4c348
                                                              • Instruction Fuzzy Hash: B611B1714083809FD7128F25CD44B51FFB4EF46320F0980DADD844F263D275A85ADB62
                                                              APIs
                                                              • shutdown.WS2_32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 0191195C
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: shutdown
                                                              • String ID:
                                                              • API String ID: 2510479042-0
                                                              • Opcode ID: 15f2a3d1714e5bce29d7ba0436b9e10dad33316715aca9df7733a844642d4158
                                                              • Instruction ID: c480b43feee5ceeadcd087c43111a00a2895b3d1beb88c34a3e074fd4e11cb70
                                                              • Opcode Fuzzy Hash: 15f2a3d1714e5bce29d7ba0436b9e10dad33316715aca9df7733a844642d4158
                                                              • Instruction Fuzzy Hash: F411A071500204AFEB118B15DC84FAABBE8EF54224F04C4A6EE489B645D275E548CBB5
                                                              APIs
                                                              • SetErrorMode.KERNEL32(?,859D76D7,00000000,?,?,?,?,?,?,?,?,6C963C58), ref: 011CA330
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode
                                                              • String ID:
                                                              • API String ID: 2340568224-0
                                                              • Opcode ID: 53f6adec33aba65f71d8f75e71b738be334103bb60783db4557e728d3e41ccd3
                                                              • Instruction ID: 6886ad2de6e890044629e8800a55b7967b4c11c4e8fb20933892d8c7e926973c
                                                              • Opcode Fuzzy Hash: 53f6adec33aba65f71d8f75e71b738be334103bb60783db4557e728d3e41ccd3
                                                              • Instruction Fuzzy Hash: E1116D718093C4AFDB138B259C54A62BFB4DF47624F0880CAED848B663D265A918D762
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(?,00000E24), ref: 01912193
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: fc7a2ba9a5a5543242cec6ac3e0d4af9c3b4a792fb36045396cdf4a98ea3cd3a
                                                              • Instruction ID: 3f4908cb8524b74ca16d1c2b77767931cb7a913871e4cf223c42ed51b265a8da
                                                              • Opcode Fuzzy Hash: fc7a2ba9a5a5543242cec6ac3e0d4af9c3b4a792fb36045396cdf4a98ea3cd3a
                                                              • Instruction Fuzzy Hash: 0D112575500204AFF720DB15CC81FA6F7A8EF15724F14C05AFE085A781D2B4F448CAB2
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 019104B6
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: 71be83ccc5fdbb3ee5f9edf59ed70c3c417201df20ed689f8df4f98271df995c
                                                              • Instruction ID: 0dd74219b1d989b16ef572e5c66a911ad4214d8be7e32c2b430b6171d2a72ccc
                                                              • Opcode Fuzzy Hash: 71be83ccc5fdbb3ee5f9edf59ed70c3c417201df20ed689f8df4f98271df995c
                                                              • Instruction Fuzzy Hash: EB119331504380AFDB228F55DD44B56FFF4EF49320F08889EED898B562D27AA458CB61
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: select
                                                              • String ID:
                                                              • API String ID: 1274211008-0
                                                              • Opcode ID: 6924fedcf6d959f8758ce75a54b96840585fe4bc1d319c73dd3ddc2fe8b7a169
                                                              • Instruction ID: 3234da393acc698fbaaf014d9fd76740ad9fa95963ede55f8a9cdfc44ef9513d
                                                              • Opcode Fuzzy Hash: 6924fedcf6d959f8758ce75a54b96840585fe4bc1d319c73dd3ddc2fe8b7a169
                                                              • Instruction Fuzzy Hash: 41113D756042049FEB20CF59D884BA2FBF8FF05621F0884AADD49CB656D375E548CB62
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: send
                                                              • String ID:
                                                              • API String ID: 2809346765-0
                                                              • Opcode ID: 76768d67f49d390028e99152363f91a4e834d40b9e14437f786a70b49b1876ce
                                                              • Instruction ID: 6db8e1e03b5fdafb70d2a8f9496d1147c914c5505446196b1dfc9b9850834bc4
                                                              • Opcode Fuzzy Hash: 76768d67f49d390028e99152363f91a4e834d40b9e14437f786a70b49b1876ce
                                                              • Instruction Fuzzy Hash: A1119171509380AFDB22CF55DC44B62FFB4EF46224F08849EED848F553D275A918CB62
                                                              APIs
                                                              • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 011CBA6A
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: LookupPrivilegeValue
                                                              • String ID:
                                                              • API String ID: 3899507212-0
                                                              • Opcode ID: 8129feb0cb805d2c1d91577dd8ec2f295d6f826cb51de6d54e4d9d5cccabd546
                                                              • Instruction ID: 46360cdef83fc49e21cacd1b4a78e0b28b8a2bbe6bdcdfa2e6950a31458366e3
                                                              • Opcode Fuzzy Hash: 8129feb0cb805d2c1d91577dd8ec2f295d6f826cb51de6d54e4d9d5cccabd546
                                                              • Instruction Fuzzy Hash: 2011C271A042008FEB14CF1DC882762FBD8EF54621F08C46EDD85CB642D335D404CA76
                                                              APIs
                                                              • CopyFileW.KERNEL32(?,?,?,859D76D7,00000000,?,?,?,?,?,?,?,?,6C963C58), ref: 011CAE1E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CopyFile
                                                              • String ID:
                                                              • API String ID: 1304948518-0
                                                              • Opcode ID: 8129feb0cb805d2c1d91577dd8ec2f295d6f826cb51de6d54e4d9d5cccabd546
                                                              • Instruction ID: 5c1f6d05c0fc828bb7438de4487caa87d3eea9fe5945397ee046a0b0582fab4d
                                                              • Opcode Fuzzy Hash: 8129feb0cb805d2c1d91577dd8ec2f295d6f826cb51de6d54e4d9d5cccabd546
                                                              • Instruction Fuzzy Hash: CF1152B16002148FEB55CF59E885766FBD8EF64A20F08C46EDD49CB642E375E404CEA2
                                                              APIs
                                                              • GetFileType.KERNEL32(?,00000E24,859D76D7,00000000,00000000,00000000,00000000), ref: 011CB009
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: FileType
                                                              • String ID:
                                                              • API String ID: 3081899298-0
                                                              • Opcode ID: 07f13547679bb0b939a198a637400e95af6aebc3ee84be72f09b46488e4af7fc
                                                              • Instruction ID: d60a74406521d8abcc86a5335f5d08830d418095c1c3a91b2a314058d7247ae6
                                                              • Opcode Fuzzy Hash: 07f13547679bb0b939a198a637400e95af6aebc3ee84be72f09b46488e4af7fc
                                                              • Instruction Fuzzy Hash: 9D01D271504600AFE721CB05DC85FA6FBA8DF65B24F04C09AEE049B781D375E508CAB6
                                                              APIs
                                                              • FindClose.KERNEL32(?,859D76D7,00000000,?,?,?,?,?,?,?,?,6C963C58), ref: 011CB1FC
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CloseFind
                                                              • String ID:
                                                              • API String ID: 1863332320-0
                                                              • Opcode ID: 2c77a73e09af7dbdb3d1f54d05fbe47d86d758fe072cc159f3f615b0bf8c4c37
                                                              • Instruction ID: f8bc8efe40f8af024944c209a7fa4e523bf5986904810a1dfbac0bd5cf07a00f
                                                              • Opcode Fuzzy Hash: 2c77a73e09af7dbdb3d1f54d05fbe47d86d758fe072cc159f3f615b0bf8c4c37
                                                              • Instruction Fuzzy Hash: 461182755093809FDB128F15DC45B66FFB4DF46220F0880DAED858B693D265A918CB62
                                                              APIs
                                                              • WaitForInputIdle.USER32(?,?), ref: 011CAA3B
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: IdleInputWait
                                                              • String ID:
                                                              • API String ID: 2200289081-0
                                                              • Opcode ID: 855cee371cd0280605538dfdcc5caf66d428e92c65b30277adb34e731f280631
                                                              • Instruction ID: 3c2e9573209561c7988e848aeb6279d951f255c06f2f470f2cea1cfaa477a16c
                                                              • Opcode Fuzzy Hash: 855cee371cd0280605538dfdcc5caf66d428e92c65b30277adb34e731f280631
                                                              • Instruction Fuzzy Hash: 8E11A0714083849FDB128F55DD84B62FFA4EF46220F0884DEED858F263D279A909CB62
                                                              APIs
                                                              • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 01911DEE
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: Connect
                                                              • String ID:
                                                              • API String ID: 3144859779-0
                                                              • Opcode ID: 8f33d77fdd48b3a9354116228b2a0f35a6f0510a9f9d71190306986b0528fb59
                                                              • Instruction ID: e946e689aabefa884f5f092d2b0384b6852a8c5ea2852c06e07eec83c4d5b159
                                                              • Opcode Fuzzy Hash: 8f33d77fdd48b3a9354116228b2a0f35a6f0510a9f9d71190306986b0528fb59
                                                              • Instruction Fuzzy Hash: 89118235500604AFEB21CF55D844B62FBE4EF48311F08C86ADE498B666D335E458CF62
                                                              APIs
                                                              • K32EnumProcesses.KERNEL32(?,?,?,859D76D7,00000000,?,?,?,?,?,?,?,?,6C963C58), ref: 0191013E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: EnumProcesses
                                                              • String ID:
                                                              • API String ID: 84517404-0
                                                              • Opcode ID: 238252a164b7f47b1548495fcdaa52d6995044efb2f00376740c40c299f4149b
                                                              • Instruction ID: e8bbee2f6d4531efbad748a2eff8a3cddb4e24aa4c579b35e0b638290e81d284
                                                              • Opcode Fuzzy Hash: 238252a164b7f47b1548495fcdaa52d6995044efb2f00376740c40c299f4149b
                                                              • Instruction Fuzzy Hash: 3C1161716002049FEB50CF59D885B66FBE8FF45320F08C4AAED49CB656D27AE588CB61
                                                              APIs
                                                              • SetFileAttributesW.KERNEL32(?,?,859D76D7,00000000,?,?,?,?,?,?,?,?,6C963C58), ref: 011CAC97
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: AttributesFile
                                                              • String ID:
                                                              • API String ID: 3188754299-0
                                                              • Opcode ID: 627c1b3fc1059f7d613563850076bb222e6f17aff6df5ac4ecda85f017f529d7
                                                              • Instruction ID: e0e2798a205dbb74b52fe768e4f98e238588344f8a655364e10bd4e8e3bf4740
                                                              • Opcode Fuzzy Hash: 627c1b3fc1059f7d613563850076bb222e6f17aff6df5ac4ecda85f017f529d7
                                                              • Instruction Fuzzy Hash: 8001B571A002448FEB55CF2AE885766FBD8EF14620F08C4AEDD45CBB42E375D404CBA2
                                                              APIs
                                                              • GetVolumeInformationA.KERNEL32(?,00000E24,?,?), ref: 01911EEE
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: InformationVolume
                                                              • String ID:
                                                              • API String ID: 2039140958-0
                                                              • Opcode ID: 7cfd1932efd45497e6806036410695b0394cd2899acd16f4567ad72a949a62a8
                                                              • Instruction ID: f907ea7b71f3d494a5a59b227a756baf2f71ae450fb5c3fa589e8404f969d79f
                                                              • Opcode Fuzzy Hash: 7cfd1932efd45497e6806036410695b0394cd2899acd16f4567ad72a949a62a8
                                                              • Instruction Fuzzy Hash: E7019E71A00600ABD310DF16CC46B66FBA8EB88A20F14851AED089BB41D731F915CBE2
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 019104B6
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: 25c05554e57771e6014f9761567e88044a9f66d178721157cbaf3234a2c9936f
                                                              • Instruction ID: cb547ec30ddc68af15168a229b899d8fbff8d7880d4fb517dfd272bf59f6059f
                                                              • Opcode Fuzzy Hash: 25c05554e57771e6014f9761567e88044a9f66d178721157cbaf3234a2c9936f
                                                              • Instruction Fuzzy Hash: 7601C431500304DFDB218F55D984B66FFE4EF08720F08C85AEE494AA56D336E458CF62
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: :@k
                                                              • API String ID: 0-2277858631
                                                              • Opcode ID: 8612fb96aa52b9c593f932cd731c46e88c94d66ee3dd22832ffe606e85cc3378
                                                              • Instruction ID: a4da5dd675689e1cbad2172b82507eb12ba4e8c292a7e513442c345be6dd74b3
                                                              • Opcode Fuzzy Hash: 8612fb96aa52b9c593f932cd731c46e88c94d66ee3dd22832ffe606e85cc3378
                                                              • Instruction Fuzzy Hash: A6B15E31A01304AFEF09EFB4E4506AEB7B6FB89244B20806AD516977A5DF39DC45CF90
                                                              APIs
                                                              • RegQueryValueExW.KERNEL32(?,00000E24,?,?), ref: 0191103A
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: QueryValue
                                                              • String ID:
                                                              • API String ID: 3660427363-0
                                                              • Opcode ID: 26959eef010650bcec611fc6c0189326d2e3a232a627ae1aca1f540b4061de75
                                                              • Instruction ID: ae233470911853d49c28c919f76894408b929d4940fd4e23ff496f6c3a2b154a
                                                              • Opcode Fuzzy Hash: 26959eef010650bcec611fc6c0189326d2e3a232a627ae1aca1f540b4061de75
                                                              • Instruction Fuzzy Hash: 63018F71500600ABD310DF16CC46B66FBE8FB89A20F14C11AED089BB41D771F915CAE6
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: send
                                                              • String ID:
                                                              • API String ID: 2809346765-0
                                                              • Opcode ID: 30ff00f33acaf2b60246c3a773e39ab12ff6506dbccedb7d2f34888894c2776b
                                                              • Instruction ID: 7031b0acc828d83189ecc25185080c84cd8787991a12665e4e04f2d9b2c50d8e
                                                              • Opcode Fuzzy Hash: 30ff00f33acaf2b60246c3a773e39ab12ff6506dbccedb7d2f34888894c2776b
                                                              • Instruction Fuzzy Hash: A701B1319002449FEB21CF55E844B65FBE4EF54724F08C49EDD498BA52E375E418CB62
                                                              APIs
                                                              • WaitForInputIdle.USER32(?,?), ref: 011CAA3B
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: IdleInputWait
                                                              • String ID:
                                                              • API String ID: 2200289081-0
                                                              • Opcode ID: 2cb01c25d84554e5f7ac6cbefec21d851f8127c38e4b6ec59a6a1a4fb4223033
                                                              • Instruction ID: 14c3f93e109e0ce1fba73de6cad8c4a144f010399b2960bc0504d992d1dff925
                                                              • Opcode Fuzzy Hash: 2cb01c25d84554e5f7ac6cbefec21d851f8127c38e4b6ec59a6a1a4fb4223033
                                                              • Instruction Fuzzy Hash: AC018F719002449FEB11CF19E984766FBE4EF54620F08C8AADD498F656E379E508CAA2
                                                              APIs
                                                              • FindClose.KERNEL32(?,859D76D7,00000000,?,?,?,?,?,?,?,?,6C963C58), ref: 011CB1FC
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CloseFind
                                                              • String ID:
                                                              • API String ID: 1863332320-0
                                                              • Opcode ID: 6e9252cabbb4aff1f28a2f954d5ad067499cf6a6bc48319db753fae581b630b1
                                                              • Instruction ID: 9b4acc2685fb8a23f788e5ad9bb20da415c383adf47752399bc4a73b372af0bf
                                                              • Opcode Fuzzy Hash: 6e9252cabbb4aff1f28a2f954d5ad067499cf6a6bc48319db753fae581b630b1
                                                              • Instruction Fuzzy Hash: 3F01D6355042008FDB148F1AE885765FBE4EF15630F08C09EDD058BB52D375E848CA66
                                                              APIs
                                                              • CoGetObjectContext.COMBASE(?,?), ref: 019120C7
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101331892.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1910000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: ContextObject
                                                              • String ID:
                                                              • API String ID: 3343934925-0
                                                              • Opcode ID: 1bd5ef285cc3e10f02dac4187b7016363676a11cd0f691166f0264951daa1fec
                                                              • Instruction ID: dfda60976d9b3ea88386c9c728fe3e553c26d434f5a5ff82bdbf982e517f79a5
                                                              • Opcode Fuzzy Hash: 1bd5ef285cc3e10f02dac4187b7016363676a11cd0f691166f0264951daa1fec
                                                              • Instruction Fuzzy Hash: A8F0F431800204CFEB109F06D884B61FBE4EF05320F18C19ADD480F756D375E488CEA2
                                                              APIs
                                                              • SetErrorMode.KERNEL32(?,859D76D7,00000000,?,?,?,?,?,?,?,?,6C963C58), ref: 011CA330
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode
                                                              • String ID:
                                                              • API String ID: 2340568224-0
                                                              • Opcode ID: 69b1f1bd3cdac965d5d4e20c0b2e322576081a18ae3031440546ca33b1609b0e
                                                              • Instruction ID: 0a7623afacb8a0cbc350ca2f231bea46f2cb404772137abf874bf905de8a8f1a
                                                              • Opcode Fuzzy Hash: 69b1f1bd3cdac965d5d4e20c0b2e322576081a18ae3031440546ca33b1609b0e
                                                              • Instruction Fuzzy Hash: DDF0A435908248CFDB118F09E884761FBE4EF15720F08C09ADD494F752E3B5E408CAA2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 2l
                                                              • API String ID: 0-4246365110
                                                              • Opcode ID: 41a188e46aed0aabfe7458b321e10637e4df960dffd97806c5f14bfbcba2af80
                                                              • Instruction ID: f2b163edf920326db67eeaff2c9c834854d1be5be268dbb8d658fa4d9919028c
                                                              • Opcode Fuzzy Hash: 41a188e46aed0aabfe7458b321e10637e4df960dffd97806c5f14bfbcba2af80
                                                              • Instruction Fuzzy Hash: 81A1E131B003028BEF14DB39E944BADB7A6AB85364FA84668D512DB3D1DF78DC18CB51
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: :@k
                                                              • API String ID: 0-2277858631
                                                              • Opcode ID: 468258f045a31de0e4a9ecc94040acffc8cbfe3d962caea27d009f0eb6e0e2e2
                                                              • Instruction ID: c3191f708dbe6e76f316da465e03dd5dd5fe6488b6d9add38c6a4220f4dfeb03
                                                              • Opcode Fuzzy Hash: 468258f045a31de0e4a9ecc94040acffc8cbfe3d962caea27d009f0eb6e0e2e2
                                                              • Instruction Fuzzy Hash: F4914C35A01304AFEF09AFB4E4506AEB7B6FF88208B20846AD516977A5DF39DC45CF50
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: :@k
                                                              • API String ID: 0-2277858631
                                                              • Opcode ID: f83045573c756ae736d564a640eac6d679cffd638c7b3f7ae746ae141c4d9498
                                                              • Instruction ID: d42f67c1600b9bfd049e14249bbea3b2eccb926a7efc95d0013e28d6e0068a01
                                                              • Opcode Fuzzy Hash: f83045573c756ae736d564a640eac6d679cffd638c7b3f7ae746ae141c4d9498
                                                              • Instruction Fuzzy Hash: E8814C31A01304AFEF09AFB4E4506AEB3B6FB88208B20846AD516977A5DF79DC05CF50
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: :@k
                                                              • API String ID: 0-2277858631
                                                              • Opcode ID: df05080e1dc29210c837bfa7905ef0a083726737b0da1415152131ae28495255
                                                              • Instruction ID: 558e85fba2b5883538f6f21b41dcbab6dd89162525b4d579725ea4166a13931a
                                                              • Opcode Fuzzy Hash: df05080e1dc29210c837bfa7905ef0a083726737b0da1415152131ae28495255
                                                              • Instruction Fuzzy Hash: 27814C35A01304EFEF09AFB4E4506AEB3B6FB88208B20846AD516977A5DF79DC45CF40
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: :@k
                                                              • API String ID: 0-2277858631
                                                              • Opcode ID: af71672f85eb23c71f8cbbd943e2d5f6fecc4e9d1c08bbe94fb51aa13b11e0f3
                                                              • Instruction ID: 6af798bf52238b2deb14570ba114de93fdea192f661f4c206bc9e67234fec79b
                                                              • Opcode Fuzzy Hash: af71672f85eb23c71f8cbbd943e2d5f6fecc4e9d1c08bbe94fb51aa13b11e0f3
                                                              • Instruction Fuzzy Hash: 8271AC357013108FEF19DB74E4507AD77ABFB88208B1040A9E5168B7A6DF7AEC46CB51
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: :@k
                                                              • API String ID: 0-2277858631
                                                              • Opcode ID: dabf6b33f9fe3490df9042a8cdd02e05aae175a1fa016f06d491386ed6ea5cf4
                                                              • Instruction ID: 6d55d36fb2cc0a01bd33734009023b5c5fa6e3b73645fe75481832b81be3d572
                                                              • Opcode Fuzzy Hash: dabf6b33f9fe3490df9042a8cdd02e05aae175a1fa016f06d491386ed6ea5cf4
                                                              • Instruction Fuzzy Hash: D1716F31A01304DFEF09AFB4E45066EB3B6FB88209B20846AD516977A5DF79DC45CF50
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: :@k
                                                              • API String ID: 0-2277858631
                                                              • Opcode ID: 20fe158dbdda4f54b110968a5a9cb1be3de9ea356d5153ecf0317a54e31080ec
                                                              • Instruction ID: 166ffe23d32e12194780ee068f5626a9e7553b0c3a21e9a401bf54ea4db65ba1
                                                              • Opcode Fuzzy Hash: 20fe158dbdda4f54b110968a5a9cb1be3de9ea356d5153ecf0317a54e31080ec
                                                              • Instruction Fuzzy Hash: CA517535A01214AFEF08AFB5E4507AEB3A6FF84248F10846AD516977A5DF38DC05CF90
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: :@k
                                                              • API String ID: 0-2277858631
                                                              • Opcode ID: 1b8321e78e87431938b8d786384519a44f80e6e057908ad9bdeb903aaf1a03f2
                                                              • Instruction ID: 3f9f6db360cd35febbb259fd3ba99214dec222d1d5681c93c57ce83bd990d50d
                                                              • Opcode Fuzzy Hash: 1b8321e78e87431938b8d786384519a44f80e6e057908ad9bdeb903aaf1a03f2
                                                              • Instruction Fuzzy Hash: 99315435B002149BEF09ABB5E4117ADB3AAFF98248F20806AD40657B95CF39DC06CF91
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: L.l
                                                              • API String ID: 0-872349773
                                                              • Opcode ID: d6813cd7562f5e4f84ca5842982744d9daa626ffa550cd896280e4e017b51260
                                                              • Instruction ID: d1e3158a4d9986b726220a8721ff2cebe0f619e4d337ea6146e6244b63b96ced
                                                              • Opcode Fuzzy Hash: d6813cd7562f5e4f84ca5842982744d9daa626ffa550cd896280e4e017b51260
                                                              • Instruction Fuzzy Hash: 73119035F00209ABDF18EA75D851BEEB7E6AF98614F108529D105BB681EF349C04C7E0
                                                              APIs
                                                              • CloseHandle.KERNEL32(?,859D76D7,00000000,?,?,?,?,?,?,?,?,6C963C58), ref: 011CBCA4
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle
                                                              • String ID:
                                                              • API String ID: 2962429428-0
                                                              • Opcode ID: c799fb05ef75ac6a2e15113b57516fd727cb9e214876c376ea307d7e073847a7
                                                              • Instruction ID: f12b81dbb5b43ff45eb86f1776b9b27ccad22679d6fad85baeeb4d7e11c89565
                                                              • Opcode Fuzzy Hash: c799fb05ef75ac6a2e15113b57516fd727cb9e214876c376ea307d7e073847a7
                                                              • Instruction Fuzzy Hash: 3B21C37150D3C05FDB028B25DC55792BFB4AF47724F0984DAEC858F663D2659908CB62
                                                              APIs
                                                              • CloseHandle.KERNEL32(?,859D76D7,00000000,?,?,?,?,?,?,?,?,6C963C58), ref: 011CA780
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle
                                                              • String ID:
                                                              • API String ID: 2962429428-0
                                                              • Opcode ID: d911c5ea848e99664d464d18261d6932e4aa3cc35eeabc35d5ecf39c300c73c6
                                                              • Instruction ID: 1517e574ba2c77619089db69e2b6156aa8564fdd37c4375379157c93fd79bf0a
                                                              • Opcode Fuzzy Hash: d911c5ea848e99664d464d18261d6932e4aa3cc35eeabc35d5ecf39c300c73c6
                                                              • Instruction Fuzzy Hash: 0F2124B19043809FDB02CF15EC85B52BFB4FF02324F0884AAED858B653D335A909DB62
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: \Ol
                                                              • API String ID: 0-720631493
                                                              • Opcode ID: 71500514559c616c31634c6cfcfb0597d7a2726256b6375125b9bf2a89d493a4
                                                              • Instruction ID: 10d0e55f16d540c21e55e66e9ec3da1c6b0e3eb3c4468ecce465a3708729bfa4
                                                              • Opcode Fuzzy Hash: 71500514559c616c31634c6cfcfb0597d7a2726256b6375125b9bf2a89d493a4
                                                              • Instruction Fuzzy Hash: 3A216D34B111149FCF04DBA8E454AADB3F7FF88618B1080A9E40AAB761DF70AC05CB91
                                                              APIs
                                                              • CloseHandle.KERNEL32(?,859D76D7,00000000,?,?,?,?,?,?,?,?,6C963C58), ref: 011CAAE0
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle
                                                              • String ID:
                                                              • API String ID: 2962429428-0
                                                              • Opcode ID: 8911cb7f4c3a99eef1b45c3f1119066fd48dc97608c0ffac3927e8ea53a78188
                                                              • Instruction ID: ce6c86bdc6bc65f980a5639235471ddab0f266ed6e156e372f5471b473488abd
                                                              • Opcode Fuzzy Hash: 8911cb7f4c3a99eef1b45c3f1119066fd48dc97608c0ffac3927e8ea53a78188
                                                              • Instruction Fuzzy Hash: 541182715093C09FDB128B65DC44B92BFB4EF47220F0888DBED848F553D275A948CB62
                                                              APIs
                                                              • CloseHandle.KERNEL32(?,859D76D7,00000000,?,?,?,?,?,?,?,?,6C963C58), ref: 011CA780
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle
                                                              • String ID:
                                                              • API String ID: 2962429428-0
                                                              • Opcode ID: 755fc17bdded7fdbcfd44b9c485ad036f942c5a2c3fe57e7ce7069feadceefa5
                                                              • Instruction ID: c6bcf961852a62078fa22e7e3bf704a4ad551676d9f0f3924fc1955a591e21a9
                                                              • Opcode Fuzzy Hash: 755fc17bdded7fdbcfd44b9c485ad036f942c5a2c3fe57e7ce7069feadceefa5
                                                              • Instruction Fuzzy Hash: C601D4719007448FEB158F19E984765FBE4EF14620F08C4ABDD46CFB42E376E408CAA2
                                                              APIs
                                                              • CloseHandle.KERNEL32(?,859D76D7,00000000,?,?,?,?,?,?,?,?,6C963C58), ref: 011CBCA4
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle
                                                              • String ID:
                                                              • API String ID: 2962429428-0
                                                              • Opcode ID: ae604ac984c72038afd1246d8077a9060e1b19d124463b806b110cbebdba0ffd
                                                              • Instruction ID: 2afa9eb1f8ee527eedc6aa5cd941115de7e63be427ae1981256a208370fbaf00
                                                              • Opcode Fuzzy Hash: ae604ac984c72038afd1246d8077a9060e1b19d124463b806b110cbebdba0ffd
                                                              • Instruction Fuzzy Hash: BE01D4759042408FEB14CF19D885766FBE4EF64620F08C0AADD49CFB42D775E808CA66
                                                              APIs
                                                              • CloseHandle.KERNEL32(?,859D76D7,00000000,?,?,?,?,?,?,?,?,6C963C58), ref: 011CAAE0
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100418563.00000000011CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11ca000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle
                                                              • String ID:
                                                              • API String ID: 2962429428-0
                                                              • Opcode ID: 3fa86e8a670a591a4172d64d36bb4031a0210ee123d29c6af979998faee5f5d6
                                                              • Instruction ID: 583f00571b3a9cdbfb162d1beb1ef79f9f8795847d2eb57a0c7cda516630a6a3
                                                              • Opcode Fuzzy Hash: 3fa86e8a670a591a4172d64d36bb4031a0210ee123d29c6af979998faee5f5d6
                                                              • Instruction Fuzzy Hash: 0E01D6719002449FEB11CF59E984765FBE4EF54720F08C4AADD488F746E379E448CEA2
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2d689bc9ed602410a4169e1b3a4321115e8d8c308459b3a12f0a9d4879d7cc70
                                                              • Instruction ID: 210fe3d81f001f78eeb656a7644db45787a1d660edfe0a7be76d6cbeaf49e4ec
                                                              • Opcode Fuzzy Hash: 2d689bc9ed602410a4169e1b3a4321115e8d8c308459b3a12f0a9d4879d7cc70
                                                              • Instruction Fuzzy Hash: 1E61B872D005209BEF2D767CE0643EDF6F1AB48344F2904B9C952A76A6DB288C8DC7D1
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2776c3ee50dfed95935b4f5aefb3de533ff8c0a73a4ace95cdfbe732d55981a2
                                                              • Instruction ID: 7ace85c604c3180a2117a3704996393885743765c868d7b76537fe6e3165a2f3
                                                              • Opcode Fuzzy Hash: 2776c3ee50dfed95935b4f5aefb3de533ff8c0a73a4ace95cdfbe732d55981a2
                                                              • Instruction Fuzzy Hash: DF71A83151B3818FEF06DB34E45058A7BB6FFA220830585AAD044CB6A7D77CDC09CB92
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c13a063a4aa0c4d2b759f93b298cf645f9b38fbce5706a7457da162d6667b109
                                                              • Instruction ID: 5ed7f1cabe239879a7fc5f0ecd2df6267b693403f9b53cfc6d469165c68fc3ec
                                                              • Opcode Fuzzy Hash: c13a063a4aa0c4d2b759f93b298cf645f9b38fbce5706a7457da162d6667b109
                                                              • Instruction Fuzzy Hash: 3E617D36B01300CFEF199B74E45066DB7AAFB89208B1540AAD9029B3A6DF79DC46CB50
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e74d3a7aacdf3bac6a6d49ac0e03fb45f2dd06c09397c4dc3d3cb39ed627deb2
                                                              • Instruction ID: 691415986d36fafecbb2598e10b24ba4a6e3fb051c1eac4ab7ab3f7a906f621b
                                                              • Opcode Fuzzy Hash: e74d3a7aacdf3bac6a6d49ac0e03fb45f2dd06c09397c4dc3d3cb39ed627deb2
                                                              • Instruction Fuzzy Hash: 3151AD35B01300CFEF19DB74E45076D77AAFB89208B1040A9E5168B7AADF7AEC46CB51
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 942a13c3f77b0d5c8132f32ea1eba35458d465c21e420bc81e8aed59d6f9ac7c
                                                              • Instruction ID: 4baf0115f5e8b4f99724aa5d4a4d8dcd7748cf0403b3b2ca3039825a869d882c
                                                              • Opcode Fuzzy Hash: 942a13c3f77b0d5c8132f32ea1eba35458d465c21e420bc81e8aed59d6f9ac7c
                                                              • Instruction Fuzzy Hash: E8510631A05302CFEF16CB3AE9007A9BBE6BF45264F9841A5D111CB2D2DB39CD59CB21
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4fe8783675f57a089a6ddacc214eb568553e4e72241f7cb390fa4552dd9e4c9e
                                                              • Instruction ID: 502ce5260ca38b6a114b398fccf676d0b055d85654d39680411bf5ff72fa2688
                                                              • Opcode Fuzzy Hash: 4fe8783675f57a089a6ddacc214eb568553e4e72241f7cb390fa4552dd9e4c9e
                                                              • Instruction Fuzzy Hash: AF51F531A05302CFEF15CB36E9047A9BBE6BB85364F9842A9D111DA2D1DF38DC59CB21
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 749a30ea4774c50b7fe65f91f0e0045789f095935be663e2c27ee8a7f48c2bcb
                                                              • Instruction ID: 0c1647457411871e132347866901b097b851c2cf09b487ce7b3a7dcf4666fc05
                                                              • Opcode Fuzzy Hash: 749a30ea4774c50b7fe65f91f0e0045789f095935be663e2c27ee8a7f48c2bcb
                                                              • Instruction Fuzzy Hash: C4514A36B01301CFEF199B74E450A6EB7ABFB8920871540A9D9029B3A5DF79EC46CF50
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ae887d027a9bfe9f6904f06ef3d06d66373135a50d4c81abb5291b9e93d29bcf
                                                              • Instruction ID: c55effa285d0f6a31dd0a89cefb5f8632add605d90d39fa73b4c83e31cf8fa97
                                                              • Opcode Fuzzy Hash: ae887d027a9bfe9f6904f06ef3d06d66373135a50d4c81abb5291b9e93d29bcf
                                                              • Instruction Fuzzy Hash: 6341E331A05302CBFF15CB36E9003A876E6BB85364F9842A9D121DA2D1DF78CD59CB20
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ecd2009850bf3183af17e1a56835341a49908dd4734a097cf399f387b11d221d
                                                              • Instruction ID: 2db61a92569698d1734d694e9612fcfdfa21771b89cf80fd6d160c989bf9528c
                                                              • Opcode Fuzzy Hash: ecd2009850bf3183af17e1a56835341a49908dd4734a097cf399f387b11d221d
                                                              • Instruction Fuzzy Hash: 02419D35B013108FEF19DB78E4507AD77EAFB88208B104069E51A8B79ADF79EC45CB51
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5cd2c735b80debbffe3def305797ff001e38247f07b17d8994edf0bcefb2a16f
                                                              • Instruction ID: 41243349742885c4bf84585091e36b26a9ecfe73be03bc391e13674929cb9c2f
                                                              • Opcode Fuzzy Hash: 5cd2c735b80debbffe3def305797ff001e38247f07b17d8994edf0bcefb2a16f
                                                              • Instruction Fuzzy Hash: A041A431A012018FDF04EF75D8845ADB7E6EF84214B548479D909DB799DB38DD8ACBA0
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 838fd32553329cb840d70df4cb1368073337615b137c09534e9c75c91a86cbb7
                                                              • Instruction ID: a036664acc18c9aea515cc1709540de557ab15fad6c756383ee70ca90ce022ae
                                                              • Opcode Fuzzy Hash: 838fd32553329cb840d70df4cb1368073337615b137c09534e9c75c91a86cbb7
                                                              • Instruction Fuzzy Hash: 9441C6316012028FDB04DF74D9846AEB7F6EF88214B588479D809DB799DB38DD86CBE0
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1debdafddc10cef47dfef148ac6853f3540c2361bb2b0760712435310a708912
                                                              • Instruction ID: 36541e77d052ee7376632a8264301135fbc5b1f4e0d41e019b7ee5bf29c3a162
                                                              • Opcode Fuzzy Hash: 1debdafddc10cef47dfef148ac6853f3540c2361bb2b0760712435310a708912
                                                              • Instruction Fuzzy Hash: 9B31DD70B002059FEF14CB79E954BAEBBF6BF88204F148079E015EB3A1DB709C098B91
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: aae8b9d71b888d5e4fdb0c4087d2e41a5c0ce85ccfcf7deaadb5920ddcb2ac33
                                                              • Instruction ID: 8d323d407237fac213d6f4894e5d5fb2ea94c1afcc286c56d93aff2fa8789216
                                                              • Opcode Fuzzy Hash: aae8b9d71b888d5e4fdb0c4087d2e41a5c0ce85ccfcf7deaadb5920ddcb2ac33
                                                              • Instruction Fuzzy Hash: 6C31B234B012108FEF18EBB8E4507AD77EAFB88208B144069E529CB795DF79DC45CB51
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9721e9e581f3954a8e5a61078ddf51b0e32cf1b750bd4888180281ae612beb31
                                                              • Instruction ID: 0d1ed5e68bd03be054b16a5b1650c6f4d949d1a353e4f1d0c38e10f07b90dad2
                                                              • Opcode Fuzzy Hash: 9721e9e581f3954a8e5a61078ddf51b0e32cf1b750bd4888180281ae612beb31
                                                              • Instruction Fuzzy Hash: D8210836B01301CFEF099B74E450A6D73ABFB8960871540A9D9029B7A5DF7EEC46CB41
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a761e4100b0c1f29d77f241984846f7481517be9cbd7bdd6367396d5cba1c4e7
                                                              • Instruction ID: d7a7b564cc55039f99d5a39c58103b0cad2ad0ae60026d443c22ad2df5e8c364
                                                              • Opcode Fuzzy Hash: a761e4100b0c1f29d77f241984846f7481517be9cbd7bdd6367396d5cba1c4e7
                                                              • Instruction Fuzzy Hash: 9611AF74B012108FEF18EBB9E4506ADBBB6BB88218B14807DE125D7385DB39D885CB50
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4103822910.0000000005CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_5cc0000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fe8b114cad8957fcc7f70b6deda805576d9c1e23c7009daf6e932dbf2faaccba
                                                              • Instruction ID: 2fa953e1bfee185d8202eb67412637047528c263a6ea867bbee1620d824aa162
                                                              • Opcode Fuzzy Hash: fe8b114cad8957fcc7f70b6deda805576d9c1e23c7009daf6e932dbf2faaccba
                                                              • Instruction Fuzzy Hash: 7D11B8B5908341AFD340CF19D840A5BFBE4FB98664F04895EF99897711D231E9188FA2
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101405995.0000000001960000.00000040.00000020.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1960000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dc6464983aa4a618e880e73273219eb19a4dc7137d2c597b497326466dc122c1
                                                              • Instruction ID: fb4ecb2eeeab8ca5ff5eeb314a9fa87630478c5f9909b7f9c55a9a5c2a768b80
                                                              • Opcode Fuzzy Hash: dc6464983aa4a618e880e73273219eb19a4dc7137d2c597b497326466dc122c1
                                                              • Instruction Fuzzy Hash: 6311B4312442809FE715CB14D580F26FBAAAB89718F28C99DF94D4B793C77BD842CA61
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f2a56552eb3456213479de01ee754856bdb39fec37aee7733f2adf0ab24509d9
                                                              • Instruction ID: eb5f3172b2f71de8993190bcaa99da890da6378b4bc3fdf66b274dbe7292264a
                                                              • Opcode Fuzzy Hash: f2a56552eb3456213479de01ee754856bdb39fec37aee7733f2adf0ab24509d9
                                                              • Instruction Fuzzy Hash: 30112B32F102055AEF00EF79ED006EEF7A7EBC4214F040265D508E7285DB36D94942A1
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 423c881ce40b68520abf51b6d38cc0cc7426fde11f41a05d4297bcddff4c2d78
                                                              • Instruction ID: 0e4e9bbc940483ca20c430fec04679ebe1078fca1463d5021c2c2a1c13e9326e
                                                              • Opcode Fuzzy Hash: 423c881ce40b68520abf51b6d38cc0cc7426fde11f41a05d4297bcddff4c2d78
                                                              • Instruction Fuzzy Hash: FC110832E001159B9F04EB78E9045EEB7F6EB88114B0508A5D500EB215EB29DE09C7E1
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d7982a51c8c355a3670385e1c58d518a640b5f83531dbb65d8634333caa58ec9
                                                              • Instruction ID: d96df322d27f1b701572ec2427aa974bb522a902877b5d735765f48eab56c1f8
                                                              • Opcode Fuzzy Hash: d7982a51c8c355a3670385e1c58d518a640b5f83531dbb65d8634333caa58ec9
                                                              • Instruction Fuzzy Hash: ED111272D01108BFDF08DFE9E8859DEFBF9EB89354F10816AE605A7211D7305945CB50
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100463403.00000000011DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11da000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 66a57a7e3131dfadb19d06bf1598226a31440eaaa5fe6cf997aa192ad6f0b9de
                                                              • Instruction ID: 4535f6d88d814e80de817ed9520a67cb8a9003f0357404cdf0cb08d09160f23f
                                                              • Opcode Fuzzy Hash: 66a57a7e3131dfadb19d06bf1598226a31440eaaa5fe6cf997aa192ad6f0b9de
                                                              • Instruction Fuzzy Hash: 4611E8B5908301AFD350CF09D840A5BFBE8EB98660F04891EF99897711D231E9088BA2
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 844705759040e2c6295e86650803c51e1db00e0ece1cf8847f920762893dc3f6
                                                              • Instruction ID: d6ffc790e8a641122b4515d8b8894ea8bfb51b13e041f707d3dd49ef64625ae1
                                                              • Opcode Fuzzy Hash: 844705759040e2c6295e86650803c51e1db00e0ece1cf8847f920762893dc3f6
                                                              • Instruction Fuzzy Hash: 0D118B32E002058FCF54DFB899412EEB7F6EF9A25472545BAC409E7354EB399E06CB90
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 286a501185a7f358dbdc3893fa7ebe33d0dce42ba130aaff470e91723c02d73b
                                                              • Instruction ID: 59349dcae5befd41a76951849045faacf57df48fb17372f9480d58e2f57adc48
                                                              • Opcode Fuzzy Hash: 286a501185a7f358dbdc3893fa7ebe33d0dce42ba130aaff470e91723c02d73b
                                                              • Instruction Fuzzy Hash: 2B019E72E002058FCF54DBB8D8011AEB7FAEF9E25472040BAC509E3354EB359E01CBA0
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 213344b477ea230a289f048cb83d8bcfddda5ed057974e6662095fbe7854af83
                                                              • Instruction ID: 3aeb5725410fa3a5970448f6ddfaa64bca905e40bf88e8f98c1f76dd80b2527d
                                                              • Opcode Fuzzy Hash: 213344b477ea230a289f048cb83d8bcfddda5ed057974e6662095fbe7854af83
                                                              • Instruction Fuzzy Hash: 08015A74A02314CFEF19EFB9E0445ACBBB2FF88219B50806DE01597345DB39C985CB50
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 549c3f866a1510b2dd8ec5f64fd1b93066909fb33f8e07e2ace4b923fffbee08
                                                              • Instruction ID: 9cf0a949856e15616e8c91ab371ba99a39d9311f3aab96170abca6649acaa2d1
                                                              • Opcode Fuzzy Hash: 549c3f866a1510b2dd8ec5f64fd1b93066909fb33f8e07e2ace4b923fffbee08
                                                              • Instruction Fuzzy Hash: A1017170606303CFDB08EB74D15845DB7F2EFA0208B54C82DE59987798EB7AD858CB42
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101405995.0000000001960000.00000040.00000020.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1960000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0b6e4d9588c8b3b536dc49aa3ff0406202024c598795a04b4f4794c20a664ee6
                                                              • Instruction ID: ece80367561f4809dd4f926f2461b985d6ad93f0308751b5eb6c56afeb3578ca
                                                              • Opcode Fuzzy Hash: 0b6e4d9588c8b3b536dc49aa3ff0406202024c598795a04b4f4794c20a664ee6
                                                              • Instruction Fuzzy Hash: 71F01D35144644DFC316CF04D580B15FBA6EB89718F28CAADE94907752C737D813DB91
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101405995.0000000001960000.00000040.00000020.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1960000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 00bdb0eb486b6a6b356fd63609a67f9024eddcbda81cf8e4c1be316d958fa1e3
                                                              • Instruction ID: ee015ce1b3d9c81f14dc47d2f32dad7f68ef8a1cb863d51fe67b8c4c27d68cc2
                                                              • Opcode Fuzzy Hash: 00bdb0eb486b6a6b356fd63609a67f9024eddcbda81cf8e4c1be316d958fa1e3
                                                              • Instruction Fuzzy Hash: 6FE092B6A006008B9750CF0AEC41462F7D8EB84630B08C07FDC0D8BB01E276B509CAA6
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100463403.00000000011DA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11da000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d88f88082e5ac22f9652fb372985ab2d7b26f034dc47666461c9d0cc971f33e7
                                                              • Instruction ID: 58340bec339b4f498b55140085a6ad9dd21d9a439e06704e9e78df34b79c725a
                                                              • Opcode Fuzzy Hash: d88f88082e5ac22f9652fb372985ab2d7b26f034dc47666461c9d0cc971f33e7
                                                              • Instruction Fuzzy Hash: ECE0D8B295020467D2108F06DC45F62F798DB50A71F04C55BED085B751E172B514C9F6
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4103822910.0000000005CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_5cc0000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5cd2514094db61d69f8c2e5fb3cd78a56adb32295a586fe1ea596f481f47e1b1
                                                              • Instruction ID: e7630e69c3344a26e75cef5b1ffc13df7c1ea027b3fcf809c5ee4ea15b8562c5
                                                              • Opcode Fuzzy Hash: 5cd2514094db61d69f8c2e5fb3cd78a56adb32295a586fe1ea596f481f47e1b1
                                                              • Instruction Fuzzy Hash: ACE0D8B291020067D2109F069C45F63FB98DB90A70F04C45BEE081B741E172B514CDE6
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4103822910.0000000005CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CC0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_5cc0000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bb41f181b4f771dff7d5767766b24bce3f1cb8d906ce9681e92098e541b0455f
                                                              • Instruction ID: ef11a06a41aac803d84da3bcf646c318caa1f14f9c3ae623d0a9402ca6d1982e
                                                              • Opcode Fuzzy Hash: bb41f181b4f771dff7d5767766b24bce3f1cb8d906ce9681e92098e541b0455f
                                                              • Instruction Fuzzy Hash: 40E0D8B295020467D3108F069C45F62FB98DB94A71F04C46BED081B741E172B518C9E6
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4101170762.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_1790000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 92178518b73998279d11062bf635fa5dd9cd387524533bab7bd970b4aaaf6a31
                                                              • Instruction ID: 77e33f209ec25b605a175ee9dc22b2c332040714718cd6cf82b98736782361d6
                                                              • Opcode Fuzzy Hash: 92178518b73998279d11062bf635fa5dd9cd387524533bab7bd970b4aaaf6a31
                                                              • Instruction Fuzzy Hash: 72D05E71901308AFCF1AEFB0B9181EE7FB4EB66214B110EEEE40583255E6381E159B50
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100403739.00000000011C2000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C2000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11c2000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d07d05518e52d8fca13b09fb7c3ffbaf59185fe1def24ed300e4e19b1466f91b
                                                              • Instruction ID: 05f29d801409b847b54d7f209b46a65fa18f50053db92f3ce98ae852d5c03600
                                                              • Opcode Fuzzy Hash: d07d05518e52d8fca13b09fb7c3ffbaf59185fe1def24ed300e4e19b1466f91b
                                                              • Instruction Fuzzy Hash: E9D05E7A3056C14FE31A9A1CC1A4B957BE4AB65B14F5A44FDA8008B763C778D581D600
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.4100403739.00000000011C2000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C2000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_11c2000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 776b454e38701c312b95298514c91e463e32d21815bd4662dc0894e8ec9f14b5
                                                              • Instruction ID: 74205f62dfbeec08f8e28b30079c2fd444bd598804be18c3a54c5a100245b3f6
                                                              • Opcode Fuzzy Hash: 776b454e38701c312b95298514c91e463e32d21815bd4662dc0894e8ec9f14b5
                                                              • Instruction Fuzzy Hash: D7D05E343042814BE719DA0CC6D4F593BD4AB68B14F0A54ECAC108B762C7B4D8C0DA00

                                                              Execution Graph

                                                              Execution Coverage:17.7%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:12
                                                              Total number of Limit Nodes:0
                                                              execution_graph 589 121a361 591 121a392 RegQueryValueExW 589->591 592 121a41b 591->592 585 121a612 587 121a646 CreateMutexW 585->587 588 121a6c1 587->588 593 121a462 595 121a486 RegSetValueExW 593->595 596 121a507 595->596 581 121a646 582 121a67e CreateMutexW 581->582 584 121a6c1 582->584

                                                              Callgraph

                                                              • Executed
                                                              • Not Executed
                                                              • Opacity -> Relevance
                                                              • Disassembly available
                                                              callgraph 0 Function_016B066A 1 Function_012125A0 2 Function_0121A120 3 Function_01212A24 4 Function_016B026D 5 Function_01212528 6 Function_0121A02E 7 Function_01212430 8 Function_052F07BE 9 Function_052F03BD 10 Function_016B067F 11 Function_012122B4 12 Function_01212639 13 Function_0121253D 14 Function_0121213C 15 Function_012123BC 16 Function_0121A23C 17 Function_016B0074 18 Function_052F0630 19 Function_01212681 20 Function_016B0648 20->0 21 Function_0121A005 22 Function_0121A486 23 Function_01212909 24 Function_052F0006 24->9 25 Function_016B05C0 24->25 27 Function_052F0301 24->27 39 Function_052F0310 24->39 69 Function_016B0606 24->69 26 Function_016B0740 28 Function_052F0080 29 Function_01212891 30 Function_0121A710 31 Function_0121A392 32 Function_0121A612 33 Function_052F069B 34 Function_01212194 35 Function_01212098 36 Function_0121A09A 37 Function_0121289D 38 Function_0121201C 40 Function_012126E1 41 Function_01212761 42 Function_0121A361 43 Function_0121A462 44 Function_012125E5 45 Function_052F076B 46 Function_01212264 47 Function_01212364 48 Function_01212A69 49 Function_0121276D 50 Function_052F0761 51 Function_0121A56E 52 Function_012121F0 53 Function_012127F3 54 Function_0121A172 55 Function_01212675 56 Function_012123F4 57 Function_0121A1F4 58 Function_01212978 59 Function_0121A078 60 Function_0121247C 61 Function_0121A2FE 62 Function_052F084F 63 Function_012126C0 64 Function_0121A540 65 Function_0121A646 66 Function_016B000C 67 Function_01212A4B 68 Function_016B0000 70 Function_012126CF 71 Function_0121A74E 72 Function_012120D0 73 Function_0121A2D2 74 Function_01212755 75 Function_01212556 76 Function_01212458 77 Function_016B0711 78 Function_0121A45C 79 Function_0121A25E

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 52f0310-52f0334 2 52f033e-52f0346 0->2 3 52f0336-52f0338 0->3 4 52f034e-52f0391 2->4 5 52f0348-52f034d 2->5 3->2 8 52f03d8-52f0418 4->8 9 52f0393-52f03ce 4->9 16 52f041f-52f0434 8->16 17 52f041a 8->17 9->8 19 52f046b-52f0523 16->19 20 52f0436-52f0460 16->20 17->16 39 52f0525-52f0569 19->39 40 52f0570-52f0587 19->40 20->19 39->40 41 52f058d-52f05bf 40->41 42 52f0880 40->42 41->42
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.1951934152.00000000052F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_52f0000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: [sk^$-[sk^$2l$2l$2l$=[sk^
                                                              • API String ID: 0-1536799710
                                                              • Opcode ID: e4135b34224fb6d48e2678d70bce0a89ea4581b61c4a0b7cb3bc463853eac88e
                                                              • Instruction ID: 5b21a3bb3fdffde9472d39473a4086f75554ae1cba31f27fcfbe9fe99018a06d
                                                              • Opcode Fuzzy Hash: e4135b34224fb6d48e2678d70bce0a89ea4581b61c4a0b7cb3bc463853eac88e
                                                              • Instruction Fuzzy Hash: AF517530724201ABC718DB7AA414ABEB7E3AF99204B144129E106EB7D4DF3DDC4AC7A1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 53 52f03bd-52f0418 61 52f041f-52f0434 53->61 62 52f041a 53->62 64 52f046b-52f0523 61->64 65 52f0436-52f0460 61->65 62->61 84 52f0525-52f0569 64->84 85 52f0570-52f0587 64->85 65->64 84->85 86 52f058d-52f05bf 85->86 87 52f0880 85->87 86->87
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.1951934152.00000000052F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_52f0000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: [sk^$-[sk^$2l$2l$2l$=[sk^
                                                              • API String ID: 0-1536799710
                                                              • Opcode ID: 4f0009a3035f57b37e1391e98840095b479e008bbb6c213e227b156cde2f265b
                                                              • Instruction ID: 4105ee86c1e80a052b36f395a5ac4d68c643035445a9819796072f26cf965a79
                                                              • Opcode Fuzzy Hash: 4f0009a3035f57b37e1391e98840095b479e008bbb6c213e227b156cde2f265b
                                                              • Instruction Fuzzy Hash: CC412B307241119BDB18EB7690147BDB2D3AFE92487144129E507EBBD4DF7DCD0A87A2

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 98 121a612-121a695 102 121a697 98->102 103 121a69a-121a6a3 98->103 102->103 104 121a6a5 103->104 105 121a6a8-121a6b1 103->105 104->105 106 121a6b3-121a6d7 CreateMutexW 105->106 107 121a702-121a707 105->107 110 121a709-121a70e 106->110 111 121a6d9-121a6ff 106->111 107->106 110->111
                                                              APIs
                                                              • CreateMutexW.KERNELBASE(?,?), ref: 0121A6B9
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.1950871927.000000000121A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0121A000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_121a000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CreateMutex
                                                              • String ID:
                                                              • API String ID: 1964310414-0
                                                              • Opcode ID: 152acaa331ef1c70752bda97789cbaa1b0a2175cc1e50263c61f57b780c2a739
                                                              • Instruction ID: dbf915de185d2822c9d7264301656cd0258ebd629ed36592e44a5544dac2196d
                                                              • Opcode Fuzzy Hash: 152acaa331ef1c70752bda97789cbaa1b0a2175cc1e50263c61f57b780c2a739
                                                              • Instruction Fuzzy Hash: 9331C4B15097805FE712CB25CC85B96BFF8EF16210F08849AE984CF293D375E909C761

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 114 121a361-121a3cf 117 121a3d1 114->117 118 121a3d4-121a3dd 114->118 117->118 119 121a3e2-121a3e8 118->119 120 121a3df 118->120 121 121a3ea 119->121 122 121a3ed-121a404 119->122 120->119 121->122 124 121a406-121a419 RegQueryValueExW 122->124 125 121a43b-121a440 122->125 126 121a442-121a447 124->126 127 121a41b-121a438 124->127 125->124 126->127
                                                              APIs
                                                              • RegQueryValueExW.KERNELBASE(?,00000E24,4D6098B7,00000000,00000000,00000000,00000000), ref: 0121A40C
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.1950871927.000000000121A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0121A000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_121a000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: QueryValue
                                                              • String ID:
                                                              • API String ID: 3660427363-0
                                                              • Opcode ID: 776da54e897565d0b8194e2efc0ada1fa143c2bb31152d20480b20198e89009a
                                                              • Instruction ID: cf705962833836f73dd07f0388860a7a54d2f8c8df37adbfeb8c8e3841ffa8f0
                                                              • Opcode Fuzzy Hash: 776da54e897565d0b8194e2efc0ada1fa143c2bb31152d20480b20198e89009a
                                                              • Instruction Fuzzy Hash: BC3184755057805FE722CF15CC84F92BFF8EF16210F08849AEA45DB692D364E909CB61

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 131 121a462-121a4c3 134 121a4c5 131->134 135 121a4c8-121a4d4 131->135 134->135 136 121a4d6 135->136 137 121a4d9-121a4f0 135->137 136->137 139 121a4f2-121a505 RegSetValueExW 137->139 140 121a527-121a52c 137->140 141 121a507-121a524 139->141 142 121a52e-121a533 139->142 140->139 142->141
                                                              APIs
                                                              • RegSetValueExW.KERNELBASE(?,00000E24,4D6098B7,00000000,00000000,00000000,00000000), ref: 0121A4F8
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.1950871927.000000000121A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0121A000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_121a000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: 8504a8c0191dbfb0924f809998ec112ea7e3d1adce13eb37aaef1ec8cc5b4479
                                                              • Instruction ID: 5d75919fa75814697f6c2ab12e820463274da2e2133265f862d9c83a5a25b356
                                                              • Opcode Fuzzy Hash: 8504a8c0191dbfb0924f809998ec112ea7e3d1adce13eb37aaef1ec8cc5b4479
                                                              • Instruction Fuzzy Hash: A62171B65057806FE722CA15DC44F66BFB8DF56210F08849AE945DB652D364E408C771

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 146 121a646-121a695 149 121a697 146->149 150 121a69a-121a6a3 146->150 149->150 151 121a6a5 150->151 152 121a6a8-121a6b1 150->152 151->152 153 121a6b3-121a6bb CreateMutexW 152->153 154 121a702-121a707 152->154 155 121a6c1-121a6d7 153->155 154->153 157 121a709-121a70e 155->157 158 121a6d9-121a6ff 155->158 157->158
                                                              APIs
                                                              • CreateMutexW.KERNELBASE(?,?), ref: 0121A6B9
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.1950871927.000000000121A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0121A000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_121a000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CreateMutex
                                                              • String ID:
                                                              • API String ID: 1964310414-0
                                                              • Opcode ID: ed25a7a586f83826b96321d26ebc36973f1d0bdc290ad8513e2057b05490899d
                                                              • Instruction ID: 150f9bf7929aea6adc72bdabd89c834df038fce1806bdf62d999b51a6e3ecf32
                                                              • Opcode Fuzzy Hash: ed25a7a586f83826b96321d26ebc36973f1d0bdc290ad8513e2057b05490899d
                                                              • Instruction Fuzzy Hash: 8221D3716012409FFB11CF25CD45BA6FBE8EF25210F04886AEA45CB745D371E505CB61

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 161 121a392-121a3cf 163 121a3d1 161->163 164 121a3d4-121a3dd 161->164 163->164 165 121a3e2-121a3e8 164->165 166 121a3df 164->166 167 121a3ea 165->167 168 121a3ed-121a404 165->168 166->165 167->168 170 121a406-121a419 RegQueryValueExW 168->170 171 121a43b-121a440 168->171 172 121a442-121a447 170->172 173 121a41b-121a438 170->173 171->170 172->173
                                                              APIs
                                                              • RegQueryValueExW.KERNELBASE(?,00000E24,4D6098B7,00000000,00000000,00000000,00000000), ref: 0121A40C
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.1950871927.000000000121A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0121A000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_121a000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: QueryValue
                                                              • String ID:
                                                              • API String ID: 3660427363-0
                                                              • Opcode ID: 9854adcdf3ba92b1ae50c2ee390acf1ae1c34cbd90a4f40c2df5ed7febba8ff8
                                                              • Instruction ID: 30c700dd8c44c505e1c3a1fd16e28c268c9716cf880413db28c6894235f05f43
                                                              • Opcode Fuzzy Hash: 9854adcdf3ba92b1ae50c2ee390acf1ae1c34cbd90a4f40c2df5ed7febba8ff8
                                                              • Instruction Fuzzy Hash: 4221AEB16106409FE721CF15CC84FA6BBECEF24610F08C45AEA459B692D360E808CA71

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 177 121a486-121a4c3 179 121a4c5 177->179 180 121a4c8-121a4d4 177->180 179->180 181 121a4d6 180->181 182 121a4d9-121a4f0 180->182 181->182 184 121a4f2-121a505 RegSetValueExW 182->184 185 121a527-121a52c 182->185 186 121a507-121a524 184->186 187 121a52e-121a533 184->187 185->184 187->186
                                                              APIs
                                                              • RegSetValueExW.KERNELBASE(?,00000E24,4D6098B7,00000000,00000000,00000000,00000000), ref: 0121A4F8
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.1950871927.000000000121A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0121A000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_121a000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: 51c4783ad86cce5caafcfe868d9ab8fad53c9a598f0399de00dbafcfe3959e9d
                                                              • Instruction ID: 286b4cc300331c36af27dadb335f381dfc11d3d14ebce6939978beba5b61826c
                                                              • Opcode Fuzzy Hash: 51c4783ad86cce5caafcfe868d9ab8fad53c9a598f0399de00dbafcfe3959e9d
                                                              • Instruction Fuzzy Hash: 1011B1B6510640AFE721CE15DC45FA6BBECEF24620F08845AEE459BA86D370E408CA71

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 191 52f0080-52f00ad 194 52f00b8-52f02f9 191->194
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.1951934152.00000000052F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_52f0000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 72845ef5539a488dd5fc70152cd552d610eee9a10230c70b0ec5c3316802b217
                                                              • Instruction ID: 9352ef1a0be0f87ec08eb6ad70098b6eb8d1adbedaff2e503422a069f80f0569
                                                              • Opcode Fuzzy Hash: 72845ef5539a488dd5fc70152cd552d610eee9a10230c70b0ec5c3316802b217
                                                              • Instruction Fuzzy Hash: DB5161302062439FD704DF37E68498AB7B2FFA92087408668D1048B7B9DB7C9D8DCB91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 232 16b05c0-16b0620 234 16b0626-16b0643 232->234
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.1951659358.00000000016B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_16b0000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1b7cba5a40f7ee5f2f3d8dcc319685e88b1efc2f7c2b9cd78625f150f03f6a31
                                                              • Instruction ID: 62b6859db66c4917945ee5076a7c0635fa3a44d13469a7d7c425cb1c01082b4e
                                                              • Opcode Fuzzy Hash: 1b7cba5a40f7ee5f2f3d8dcc319685e88b1efc2f7c2b9cd78625f150f03f6a31
                                                              • Instruction Fuzzy Hash: 420188B69097406FD7118F06EC41462FBF8FF86234718849FE84987652D27A7818CB65

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 235 52f0006-52f006a 237 52f0070 call 52f03bd 235->237 238 52f0070 call 16b05c0 235->238 239 52f0070 call 16b0606 235->239 240 52f0070 call 52f0301 235->240 241 52f0070 call 52f0310 235->241 236 52f0076 237->236 238->236 239->236 240->236 241->236
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.1951934152.00000000052F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_52f0000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 31ea575c9a81d8418dc997c05f27a5d26f5613a715e3b9d3e3b744929c31aedb
                                                              • Instruction ID: 24bf4952671f458a69b6b24645636a8deb333fb205a2fa1513aa37d5d5b30293
                                                              • Opcode Fuzzy Hash: 31ea575c9a81d8418dc997c05f27a5d26f5613a715e3b9d3e3b744929c31aedb
                                                              • Instruction Fuzzy Hash: 930168A681E3D18FD7138774AC666807FB0AE2721570F44D7C081CA1A3E04D895AC736

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 242 16b0606-16b0620 243 16b0626-16b0643 242->243
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.1951659358.00000000016B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_16b0000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bfb1b1fd06de18eaa6159b1a142e8dfba63d3e7dd473a77d6ad657fe9d474493
                                                              • Instruction ID: fafffe43f291ce03ebd40fd0ca86a5086c0d119ebb326de4f2c862dc7209c027
                                                              • Opcode Fuzzy Hash: bfb1b1fd06de18eaa6159b1a142e8dfba63d3e7dd473a77d6ad657fe9d474493
                                                              • Instruction Fuzzy Hash: 4EE092B66006004B9754CF0AEC41462F7E8EB88630B08C47FDC0D8BB01D276B508CEA5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 244 12123f4-12123ff 245 1212401-121240e 244->245 246 1212412-1212417 244->246 245->246 247 1212419 246->247 248 121241a 246->248 249 1212420-1212421 248->249
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.1950822498.0000000001212000.00000040.00000800.00020000.00000000.sdmp, Offset: 01212000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1212000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 52acbdeb34e0389884042f68b72f8d74ef3d4bbd46c2bc6ef184fbc2c265ec95
                                                              • Instruction ID: f60e28373057eb88f62c3999349c408df7e01ea2df79fd2825742a3b74171717
                                                              • Opcode Fuzzy Hash: 52acbdeb34e0389884042f68b72f8d74ef3d4bbd46c2bc6ef184fbc2c265ec95
                                                              • Instruction Fuzzy Hash: 71D02E792406D28FE312CA0CC1A4B853BE4AB60704F0A00F9A8008B767C728E480C200

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 250 12123bc-12123c3 251 12123c5-12123d2 250->251 252 12123d6-12123db 250->252 251->252 253 12123e1 252->253 254 12123dd-12123e0 252->254 255 12123e7-12123e8 253->255
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.1950822498.0000000001212000.00000040.00000800.00020000.00000000.sdmp, Offset: 01212000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_1212000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fa4fe6337bce17fcc1d135a662dffb7ec75bc141cbdd9d88981cb9840b3db1e7
                                                              • Instruction ID: ca0a68d1bd549b944d71eb71942f80e0f753b93d2ca673ff242132eedd03e718
                                                              • Opcode Fuzzy Hash: fa4fe6337bce17fcc1d135a662dffb7ec75bc141cbdd9d88981cb9840b3db1e7
                                                              • Instruction Fuzzy Hash: 0DD05E342002828FE715DB0CC6D4F993BD4AB64B14F2A44E8BD108B766C7A4D8C0DA00

                                                              Execution Graph

                                                              Execution Coverage:11%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:19
                                                              Total number of Limit Nodes:1
                                                              execution_graph 558 14fa74e 559 14fa77a CloseHandle 558->559 560 14fa7b9 558->560 561 14fa788 559->561 560->559 562 14fa646 563 14fa67e CreateMutexW 562->563 565 14fa6c1 563->565 574 14fa462 576 14fa486 RegSetValueExW 574->576 577 14fa507 576->577 582 14fa612 584 14fa646 CreateMutexW 582->584 585 14fa6c1 584->585 578 14fa361 579 14fa392 RegQueryValueExW 578->579 581 14fa41b 579->581 586 14fa710 588 14fa74e CloseHandle 586->588 589 14fa788 588->589

                                                              Callgraph

                                                              • Executed
                                                              • Not Executed
                                                              • Opacity -> Relevance
                                                              • Disassembly available
                                                              callgraph 0 Function_014FA74E 1 Function_01C705C5 2 Function_014F2A4B 3 Function_014E0648 21 Function_014E066A 3->21 4 Function_014FA646 5 Function_014E0740 6 Function_014E05C0 7 Function_014FA540 8 Function_014F26C0 9 Function_014FA25E 10 Function_014FA45C 11 Function_014F2458 12 Function_014F2556 13 Function_014F2755 14 Function_014FA2D2 15 Function_014E05D0 16 Function_014F20D0 17 Function_014FA56E 18 Function_014F276D 19 Function_01C70864 20 Function_014E026D 22 Function_01C70761 23 Function_014F2A69 24 Function_014F25E5 25 Function_014F2264 26 Function_014F2364 27 Function_01C7076B 28 Function_014FA462 29 Function_014FA361 30 Function_014F2761 31 Function_014F26E1 32 Function_014E05E1 33 Function_014FA2FE 34 Function_014E067F 35 Function_014F247C 36 Function_014FA078 37 Function_014F2978 38 Function_014E0074 39 Function_014F2675 40 Function_014FA1F4 41 Function_014F23F4 42 Function_014F27F3 43 Function_014FA172 44 Function_014F21F0 45 Function_01C70301 46 Function_014F2909 47 Function_014E0606 48 Function_014FA486 49 Function_014F2006 50 Function_014FA005 51 Function_01C7050A 52 Function_014F2681 53 Function_014E0001 54 Function_014F289D 55 Function_01C70014 56 Function_014FA09A 57 Function_01C70310 58 Function_014F2098 59 Function_014F2194 60 Function_014FA392 61 Function_01C7069A 62 Function_014FA612 63 Function_014F2891 64 Function_014FA710 65 Function_014E0711 66 Function_014FA02E 67 Function_014F2528 68 Function_014F2A24 69 Function_014FA120 70 Function_014F25A0 71 Function_01C70635 72 Function_014F253D 73 Function_014FA23C 74 Function_014F23BC 75 Function_014F213C 76 Function_014F2639 77 Function_01C703BD 78 Function_014F2430

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 1c70310-1c70334 2 1c70336-1c70338 0->2 3 1c7033e-1c70346 0->3 2->3 4 1c7034e-1c70391 3->4 5 1c70348-1c7034d 3->5 8 1c70393-1c703bb 4->8 9 1c703d8-1c703ff 4->9 14 1c703ce 8->14 15 1c7040a-1c70418 9->15 14->9 16 1c7041f-1c70434 15->16 17 1c7041a 15->17 19 1c70436-1c70460 16->19 20 1c7046b-1c70523 16->20 17->16 19->20 39 1c70525-1c70569 20->39 40 1c70570-1c70587 20->40 39->40 41 1c70880 40->41 42 1c7058d-1c705bf 40->42 42->41
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2032001723.0000000001C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 01C70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_1c70000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: [Ek^$-[Ek^$2l$2l$2l$=[Ek^
                                                              • API String ID: 0-961668885
                                                              • Opcode ID: daf7724d5d4828327d999d3c0f57f24f44c002f855e08bf51ab37903909bc4c9
                                                              • Instruction ID: ca45becae8ee292921f443d4eb32a5bb1eb1d573680528156cd4304b3703f743
                                                              • Opcode Fuzzy Hash: daf7724d5d4828327d999d3c0f57f24f44c002f855e08bf51ab37903909bc4c9
                                                              • Instruction Fuzzy Hash: DD51F1307002018FD71ADBBA8410ABE76E6BB95204B15416DE506EB7E4DF79DC0AD7A1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 53 1c703bd-1c70418 61 1c7041f-1c70434 53->61 62 1c7041a 53->62 64 1c70436-1c70460 61->64 65 1c7046b-1c70523 61->65 62->61 64->65 84 1c70525-1c70569 65->84 85 1c70570-1c70587 65->85 84->85 86 1c70880 85->86 87 1c7058d-1c705bf 85->87 87->86
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2032001723.0000000001C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 01C70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_1c70000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: [Ek^$-[Ek^$2l$2l$2l$=[Ek^
                                                              • API String ID: 0-961668885
                                                              • Opcode ID: 1042aec7d1908c7989c35c5e7d3a08b2f708e11129fc27ff46b959222b6d13a4
                                                              • Instruction ID: 68cfc342e603680843c6584df66ab8ed0ac82fe71e425a784bcb7ef7ea258538
                                                              • Opcode Fuzzy Hash: 1042aec7d1908c7989c35c5e7d3a08b2f708e11129fc27ff46b959222b6d13a4
                                                              • Instruction Fuzzy Hash: 6C41D4307001118FD759A7BA8010ABD76D3AFD6248B05446DE106EFBD4DF79CD0A97A2

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 98 14fa612-14fa695 102 14fa69a-14fa6a3 98->102 103 14fa697 98->103 104 14fa6a8-14fa6b1 102->104 105 14fa6a5 102->105 103->102 106 14fa6b3-14fa6d7 CreateMutexW 104->106 107 14fa702-14fa707 104->107 105->104 110 14fa709-14fa70e 106->110 111 14fa6d9-14fa6ff 106->111 107->106 110->111
                                                              APIs
                                                              • CreateMutexW.KERNELBASE(?,?), ref: 014FA6B9
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2031496065.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_14fa000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CreateMutex
                                                              • String ID:
                                                              • API String ID: 1964310414-0
                                                              • Opcode ID: cce33bc1084e0ab1524175fba5d767cfe475b36de1b0c9695ee30fd226756d42
                                                              • Instruction ID: 790353943131101472c1894449c84c62689f99017b9dc40628ccaa06d5c878d2
                                                              • Opcode Fuzzy Hash: cce33bc1084e0ab1524175fba5d767cfe475b36de1b0c9695ee30fd226756d42
                                                              • Instruction Fuzzy Hash: 5431D1B15093806FE712CB25CC84B96BFF8EF06210F18849AE988CF392D334E909C761

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 114 14fa361-14fa3cf 117 14fa3d4-14fa3dd 114->117 118 14fa3d1 114->118 119 14fa3df 117->119 120 14fa3e2-14fa3e8 117->120 118->117 119->120 121 14fa3ed-14fa404 120->121 122 14fa3ea 120->122 124 14fa43b-14fa440 121->124 125 14fa406-14fa419 RegQueryValueExW 121->125 122->121 124->125 126 14fa41b-14fa438 125->126 127 14fa442-14fa447 125->127 127->126
                                                              APIs
                                                              • RegQueryValueExW.KERNELBASE(?,00000E24,BE13E695,00000000,00000000,00000000,00000000), ref: 014FA40C
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2031496065.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_14fa000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: QueryValue
                                                              • String ID:
                                                              • API String ID: 3660427363-0
                                                              • Opcode ID: 36ad849af2faa173f0d7a36d12f151638983e681329c3c692eea8df81f5f5f20
                                                              • Instruction ID: 40853f6f5589080d6dd37c8028484de57f8e14115c046c4a030d869bd29decce
                                                              • Opcode Fuzzy Hash: 36ad849af2faa173f0d7a36d12f151638983e681329c3c692eea8df81f5f5f20
                                                              • Instruction Fuzzy Hash: 813182B55057406FE722CF15CC84F93BFF8EF05210F18849AE945DB6A2D364E909CB61

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 131 14fa462-14fa4c3 134 14fa4c8-14fa4d4 131->134 135 14fa4c5 131->135 136 14fa4d9-14fa4f0 134->136 137 14fa4d6 134->137 135->134 139 14fa527-14fa52c 136->139 140 14fa4f2-14fa505 RegSetValueExW 136->140 137->136 139->140 141 14fa52e-14fa533 140->141 142 14fa507-14fa524 140->142 141->142
                                                              APIs
                                                              • RegSetValueExW.KERNELBASE(?,00000E24,BE13E695,00000000,00000000,00000000,00000000), ref: 014FA4F8
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2031496065.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_14fa000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: 373205ae771988a94dfda1798da97dc60a02527d6145d9c5e563c0591bb6dc51
                                                              • Instruction ID: b8c281e67df5615ed80d74238bbc27bbec8627aa0463c37869ff1c57913b2d61
                                                              • Opcode Fuzzy Hash: 373205ae771988a94dfda1798da97dc60a02527d6145d9c5e563c0591bb6dc51
                                                              • Instruction Fuzzy Hash: A621B5B25047806FD7228F15CC44FA7BFB8DF46214F18849AE945DB652D364E408C771

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 146 14fa646-14fa695 149 14fa69a-14fa6a3 146->149 150 14fa697 146->150 151 14fa6a8-14fa6b1 149->151 152 14fa6a5 149->152 150->149 153 14fa6b3-14fa6bb CreateMutexW 151->153 154 14fa702-14fa707 151->154 152->151 156 14fa6c1-14fa6d7 153->156 154->153 157 14fa709-14fa70e 156->157 158 14fa6d9-14fa6ff 156->158 157->158
                                                              APIs
                                                              • CreateMutexW.KERNELBASE(?,?), ref: 014FA6B9
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2031496065.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_14fa000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CreateMutex
                                                              • String ID:
                                                              • API String ID: 1964310414-0
                                                              • Opcode ID: b407d3ed0171e2221e39424e58cd3082421c695457893fb15658a9c381c00d33
                                                              • Instruction ID: 88400a6e614104dfc02201f4cb8dc80794646fdf20bffdbeae0579adde23341c
                                                              • Opcode Fuzzy Hash: b407d3ed0171e2221e39424e58cd3082421c695457893fb15658a9c381c00d33
                                                              • Instruction Fuzzy Hash: FA21B0B56002009FF710CB65CD45BA6FBE8EF14224F14846EEA899B751D375E809CB71

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 161 14fa392-14fa3cf 163 14fa3d4-14fa3dd 161->163 164 14fa3d1 161->164 165 14fa3df 163->165 166 14fa3e2-14fa3e8 163->166 164->163 165->166 167 14fa3ed-14fa404 166->167 168 14fa3ea 166->168 170 14fa43b-14fa440 167->170 171 14fa406-14fa419 RegQueryValueExW 167->171 168->167 170->171 172 14fa41b-14fa438 171->172 173 14fa442-14fa447 171->173 173->172
                                                              APIs
                                                              • RegQueryValueExW.KERNELBASE(?,00000E24,BE13E695,00000000,00000000,00000000,00000000), ref: 014FA40C
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2031496065.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_14fa000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: QueryValue
                                                              • String ID:
                                                              • API String ID: 3660427363-0
                                                              • Opcode ID: 3b32934d01b7da41d645d509b325b947031f999e81275e96b2f42efe00dd308b
                                                              • Instruction ID: f1862c4953141af7e0f1fe9f0d16ecd726ee37c1994b39562ea28029ebe30e4c
                                                              • Opcode Fuzzy Hash: 3b32934d01b7da41d645d509b325b947031f999e81275e96b2f42efe00dd308b
                                                              • Instruction Fuzzy Hash: 36216DB5600604AEE721CE15CC84FA7BBECEF14614F18C46AEA499B7A1D374E809CA71

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 177 14fa486-14fa4c3 179 14fa4c8-14fa4d4 177->179 180 14fa4c5 177->180 181 14fa4d9-14fa4f0 179->181 182 14fa4d6 179->182 180->179 184 14fa527-14fa52c 181->184 185 14fa4f2-14fa505 RegSetValueExW 181->185 182->181 184->185 186 14fa52e-14fa533 185->186 187 14fa507-14fa524 185->187 186->187
                                                              APIs
                                                              • RegSetValueExW.KERNELBASE(?,00000E24,BE13E695,00000000,00000000,00000000,00000000), ref: 014FA4F8
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2031496065.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_14fa000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: 0b655de54e43b1efe2ec0a42b9cbb1c66f7bc1833ba7f37bf4c9709b8da03aa1
                                                              • Instruction ID: c269a319bdd76fd2279dd484bde5e9d894df5a8b507c4349e6a13bdf09483eef
                                                              • Opcode Fuzzy Hash: 0b655de54e43b1efe2ec0a42b9cbb1c66f7bc1833ba7f37bf4c9709b8da03aa1
                                                              • Instruction Fuzzy Hash: 7D1181B6500700AFEB218E15DC45FA7BBECEF14614F14845AEE499BB91D374E448CA71

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 191 14fa710-14fa778 193 14fa77a-14fa79a CloseHandle 191->193 194 14fa7b9-14fa7be 191->194 197 14fa79c-14fa7b8 193->197 198 14fa7c0-14fa7c5 193->198 194->193 198->197
                                                              APIs
                                                              • CloseHandle.KERNELBASE(?), ref: 014FA780
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2031496065.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_14fa000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle
                                                              • String ID:
                                                              • API String ID: 2962429428-0
                                                              • Opcode ID: 5ad19e8e1ce88d772a023b3ef013b9ddd7e3f236b726016b7dbf73501be293ff
                                                              • Instruction ID: 1a9cefbdb7a311d87abca317f438a3bf4e147dcbade17ae53c273d23a2a29d0e
                                                              • Opcode Fuzzy Hash: 5ad19e8e1ce88d772a023b3ef013b9ddd7e3f236b726016b7dbf73501be293ff
                                                              • Instruction Fuzzy Hash: 582105B55083809FDB028F25DC85B52BFB4EF02324F1884DBED858F6A3D235A909DB61

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 200 14fa74e-14fa778 201 14fa77a-14fa782 CloseHandle 200->201 202 14fa7b9-14fa7be 200->202 203 14fa788-14fa79a 201->203 202->201 205 14fa79c-14fa7b8 203->205 206 14fa7c0-14fa7c5 203->206 206->205
                                                              APIs
                                                              • CloseHandle.KERNELBASE(?), ref: 014FA780
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2031496065.00000000014FA000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_14fa000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle
                                                              • String ID:
                                                              • API String ID: 2962429428-0
                                                              • Opcode ID: d8a8aa3f511dd75aa22909d72adc6c037701234948c410cd903eb9f49d2637d8
                                                              • Instruction ID: 8ed126129494107ce383a91a883eb96d7ce4d70bd0c4c734d0da9b2162388b2c
                                                              • Opcode Fuzzy Hash: d8a8aa3f511dd75aa22909d72adc6c037701234948c410cd903eb9f49d2637d8
                                                              • Instruction Fuzzy Hash: 7D0184755002409FEB10CF15D985B66FBE4DF05220F18C4ABDD4A8F756D275E448CAA1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 208 1c70014-1c700ad 211 1c700b8-1c702f9 208->211
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2032001723.0000000001C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 01C70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_1c70000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4fc4ae098359e5e8d5445ffa887c96d4b725983d9ef5ffa7fb7ec838fcffa6b5
                                                              • Instruction ID: 43e46ebb513cc68e96c24880b1531913ca7e8fbc64a1d55344f5f4df572e4776
                                                              • Opcode Fuzzy Hash: 4fc4ae098359e5e8d5445ffa887c96d4b725983d9ef5ffa7fb7ec838fcffa6b5
                                                              • Instruction Fuzzy Hash: AC713030106782CFD702DB75E9544897BB2FFA2208705949ED0449F6AADF7C9D0EEB61

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 249 14e05e1-14e0603 250 14e0606-14e0620 249->250 251 14e0626-14e0643 250->251
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2031463391.00000000014E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_14e0000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c5bd3fa026d5b499ca6b802d111e472dda671db64bdad6b7957351ddeb2ac3ee
                                                              • Instruction ID: 0488d3cb26c612b9d27f59cc6cf24eb5be4da605e02a622ec1afc9c1bb33a25a
                                                              • Opcode Fuzzy Hash: c5bd3fa026d5b499ca6b802d111e472dda671db64bdad6b7957351ddeb2ac3ee
                                                              • Instruction Fuzzy Hash: 24F0F9B55493806FC7118B16AC40893BFE8EF8623071984ABFC488B712D165B908CBB1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 252 14e0606-14e0620 253 14e0626-14e0643 252->253
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2031463391.00000000014E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_14e0000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ebe7bb77fab4974a01209e0aa41c53cc413522d384341b251ccb76980c9cbbc0
                                                              • Instruction ID: 9952f387f985a7f0f386f1900ed88323df2c9d98e2c1a68f8b77fab9574e401f
                                                              • Opcode Fuzzy Hash: ebe7bb77fab4974a01209e0aa41c53cc413522d384341b251ccb76980c9cbbc0
                                                              • Instruction Fuzzy Hash: 7FE092B66017005B9750CF0AEC45452FBD8EB84630B18C07FEC0D8BB01E276F508CAB5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 254 14f23f4-14f23ff 255 14f2412-14f2417 254->255 256 14f2401-14f240e 254->256 257 14f241a 255->257 258 14f2419 255->258 256->255 259 14f2420-14f2421 257->259
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2031480598.00000000014F2000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F2000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_14f2000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 760123a35d0c376783c1528617d216a7ac02a71ced239e1df4c22f45aeeab6eb
                                                              • Instruction ID: 63780c3176621834efa57e92c4c8fcca1a1e24accdd0092ae93f371bd775af3a
                                                              • Opcode Fuzzy Hash: 760123a35d0c376783c1528617d216a7ac02a71ced239e1df4c22f45aeeab6eb
                                                              • Instruction Fuzzy Hash: 52D05E792056D14FE3179A1CC1A4F963BE4AB65714F4A44FEA9008B773C7A8D581D610

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 260 14f23bc-14f23c3 261 14f23d6-14f23db 260->261 262 14f23c5-14f23d2 260->262 263 14f23dd-14f23e0 261->263 264 14f23e1 261->264 262->261 265 14f23e7-14f23e8 264->265
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2031480598.00000000014F2000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F2000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_14f2000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8149f91a3fa5f03bdb15ae57d47f1d5c253f2c7595f2f78d967ba14737a27099
                                                              • Instruction ID: 532c78061af1f9a62992ac56dd8615b0fb2695f69a29d5102912160672f7bd55
                                                              • Opcode Fuzzy Hash: 8149f91a3fa5f03bdb15ae57d47f1d5c253f2c7595f2f78d967ba14737a27099
                                                              • Instruction Fuzzy Hash: 53D05E742006814BE715DA1CC6D4F5A3BD4AB54B14F0A44EDAD108B772C7B4D8C4DA00

                                                              Execution Graph

                                                              Execution Coverage:10.9%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:19
                                                              Total number of Limit Nodes:1
                                                              execution_graph 578 9ea74e 579 9ea77a CloseHandle 578->579 580 9ea7b9 578->580 581 9ea788 579->581 580->579 586 9ea646 587 9ea67e CreateMutexW 586->587 589 9ea6c1 587->589 594 9ea612 597 9ea646 CreateMutexW 594->597 596 9ea6c1 597->596 602 9ea462 604 9ea486 RegSetValueExW 602->604 605 9ea507 604->605 598 9ea710 600 9ea74e CloseHandle 598->600 601 9ea788 600->601 606 9ea361 607 9ea392 RegQueryValueExW 606->607 609 9ea41b 607->609

                                                              Callgraph

                                                              • Executed
                                                              • Not Executed
                                                              • Opacity -> Relevance
                                                              • Disassembly available
                                                              callgraph 0 Function_009E289D 1 Function_01050606 2 Function_009EA09A 3 Function_01050000 4 Function_009E2098 5 Function_009E2194 6 Function_009EA392 7 Function_009EA612 8 Function_009E2310 9 Function_009EA710 10 Function_009E2891 11 Function_01050710 12 Function_009E2909 13 Function_009E2006 14 Function_009EA486 15 Function_009EA005 16 Function_00FE07E0 17 Function_009E2681 18 Function_009E23BC 19 Function_009E213C 20 Function_009EA23C 21 Function_009E253D 22 Function_00FE075B 23 Function_009E2639 24 Function_009E22B4 25 Function_009E2430 26 Function_009EA02E 27 Function_009E2528 28 Function_009E2A24 29 Function_010505BF 30 Function_009E25A0 31 Function_009EA120 32 Function_0105003A 33 Function_009EA25E 34 Function_009EA45C 35 Function_00FE03BD 36 Function_01050740 37 Function_009E2458 38 Function_009E2556 39 Function_010505CF 40 Function_009E2755 41 Function_01050649 65 Function_0105066A 41->65 42 Function_009EA2D2 43 Function_009E20D0 44 Function_009EA74E 45 Function_009E2A4B 46 Function_009EA646 47 Function_009E2044 48 Function_009E26C0 49 Function_009EA540 50 Function_009EA2FE 51 Function_009E247C 52 Function_010505E0 53 Function_009E2978 54 Function_009EA078 55 Function_00FE0699 56 Function_0105026D 57 Function_009E23F4 58 Function_009EA1F4 59 Function_009E2675 60 Function_00FE0015 61 Function_009EA172 62 Function_009E27F3 63 Function_009E21F0 64 Function_00FE0310 66 Function_009EA56E 67 Function_01050074 68 Function_009E276D 69 Function_009E2A69 70 Function_00FE0707 71 Function_0105067F 72 Function_009E2264 73 Function_009E2364 74 Function_009E25E5 75 Function_009EA462 76 Function_009E26E1 77 Function_009E2761 78 Function_00FE0301 79 Function_009EA361

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 fe0310-fe0334 2 fe033e-fe0346 0->2 3 fe0336-fe0338 0->3 4 fe034e-fe035c 2->4 5 fe0348-fe034d 2->5 3->2 7 fe035e-fe0360 4->7 8 fe0362-fe0391 4->8 7->8 10 fe03d8-fe03ff 8->10 11 fe0393-fe03bb 8->11 17 fe040a-fe0418 10->17 16 fe03ce 11->16 16->10 18 fe041f-fe0434 17->18 19 fe041a 17->19 21 fe046b-fe0523 18->21 22 fe0436-fe0460 18->22 19->18 41 fe0525-fe0569 21->41 42 fe0570-fe0587 21->42 22->21 41->42 43 fe058d-fe05bf 42->43 44 fe0880 42->44 43->44
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2113234846.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_fe0000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 2l$2l$2l
                                                              • API String ID: 0-3036608467
                                                              • Opcode ID: 73107e34b47a1a737e5d93738343f58521d51142f9667c7b087fb5b52c774f5f
                                                              • Instruction ID: db98be15cb283407c057612684584b255a7a418f91219b7d0e6909f5342c2721
                                                              • Opcode Fuzzy Hash: 73107e34b47a1a737e5d93738343f58521d51142f9667c7b087fb5b52c774f5f
                                                              • Instruction Fuzzy Hash: F9610330B002408FDB09EB7AD410BBE76E6ABC5308B144069E406DBBE5DF79DD46D7A6

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 55 fe03bd-fe0418 63 fe041f-fe0434 55->63 64 fe041a 55->64 66 fe046b-fe0523 63->66 67 fe0436-fe0460 63->67 64->63 86 fe0525-fe0569 66->86 87 fe0570-fe0587 66->87 67->66 86->87 88 fe058d-fe05bf 87->88 89 fe0880 87->89 88->89
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2113234846.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_fe0000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 2l$2l$2l
                                                              • API String ID: 0-3036608467
                                                              • Opcode ID: 2520ee6428b237cd60f5ea7b8abe984b5218920c38cfec262c8c9a71ee0fb0fd
                                                              • Instruction ID: b5d6ddc289ffb08484651c6684619f711580d9fa4eca5af87a4dfaa0692dac4b
                                                              • Opcode Fuzzy Hash: 2520ee6428b237cd60f5ea7b8abe984b5218920c38cfec262c8c9a71ee0fb0fd
                                                              • Instruction Fuzzy Hash: 3C412430B002904BDB09E77A9410BBE32D7AFD5349708402DE406EBBE5DF79CD4A97A6

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 100 9ea612-9ea695 104 9ea69a-9ea6a3 100->104 105 9ea697 100->105 106 9ea6a8-9ea6b1 104->106 107 9ea6a5 104->107 105->104 108 9ea702-9ea707 106->108 109 9ea6b3-9ea6d7 CreateMutexW 106->109 107->106 108->109 112 9ea709-9ea70e 109->112 113 9ea6d9-9ea6ff 109->113 112->113
                                                              APIs
                                                              • CreateMutexW.KERNELBASE(?,?), ref: 009EA6B9
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2112602081.00000000009EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 009EA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_9ea000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CreateMutex
                                                              • String ID:
                                                              • API String ID: 1964310414-0
                                                              • Opcode ID: 20ff9612ab58fd566160b973f9fd34b4ee1f564bdd28950718ac6f2f17e75d2d
                                                              • Instruction ID: 3ac23a29087406718f30f3031af697d8f531332b732b8212c72d5587372fa8cb
                                                              • Opcode Fuzzy Hash: 20ff9612ab58fd566160b973f9fd34b4ee1f564bdd28950718ac6f2f17e75d2d
                                                              • Instruction Fuzzy Hash: B431B3B15097805FE712CB25CC85B96BFF8EF16310F08849AE984CF292D375E909C762

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 116 9ea361-9ea3cf 119 9ea3d4-9ea3dd 116->119 120 9ea3d1 116->120 121 9ea3df 119->121 122 9ea3e2-9ea3e8 119->122 120->119 121->122 123 9ea3ed-9ea404 122->123 124 9ea3ea 122->124 126 9ea43b-9ea440 123->126 127 9ea406-9ea419 RegQueryValueExW 123->127 124->123 126->127 128 9ea41b-9ea438 127->128 129 9ea442-9ea447 127->129 129->128
                                                              APIs
                                                              • RegQueryValueExW.KERNELBASE(?,00000E24,CC48A838,00000000,00000000,00000000,00000000), ref: 009EA40C
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2112602081.00000000009EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 009EA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_9ea000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: QueryValue
                                                              • String ID:
                                                              • API String ID: 3660427363-0
                                                              • Opcode ID: 7ab675051a46398f6eb4be6a658de9a1256c3cba88d841e869c69f8ae4af7ae5
                                                              • Instruction ID: ef5296468da1e0b97fe828c9dc6aa467cd5ada307f23362876a7bbe9de3729e7
                                                              • Opcode Fuzzy Hash: 7ab675051a46398f6eb4be6a658de9a1256c3cba88d841e869c69f8ae4af7ae5
                                                              • Instruction Fuzzy Hash: 033171755057805FD722CB15CC84F92BBBCEF15310F08849AE945DB2A2D264E909CB62

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 133 9ea462-9ea4c3 136 9ea4c8-9ea4d4 133->136 137 9ea4c5 133->137 138 9ea4d9-9ea4f0 136->138 139 9ea4d6 136->139 137->136 141 9ea527-9ea52c 138->141 142 9ea4f2-9ea505 RegSetValueExW 138->142 139->138 141->142 143 9ea52e-9ea533 142->143 144 9ea507-9ea524 142->144 143->144
                                                              APIs
                                                              • RegSetValueExW.KERNELBASE(?,00000E24,CC48A838,00000000,00000000,00000000,00000000), ref: 009EA4F8
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2112602081.00000000009EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 009EA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_9ea000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: edcd8abd79a76155d11e60a2af575e0fb5519a3480195384fb32294ebedaec52
                                                              • Instruction ID: 9bbe020cdaf09d49c0551b17017ceb9b3999b6a9fa9058f010c3580c11f0f78a
                                                              • Opcode Fuzzy Hash: edcd8abd79a76155d11e60a2af575e0fb5519a3480195384fb32294ebedaec52
                                                              • Instruction Fuzzy Hash: 352192B25047806FD7228F11DC44FA7BFBCEF56310F08849AE945DB6A2D264E848C771

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 148 9ea646-9ea695 151 9ea69a-9ea6a3 148->151 152 9ea697 148->152 153 9ea6a8-9ea6b1 151->153 154 9ea6a5 151->154 152->151 155 9ea702-9ea707 153->155 156 9ea6b3-9ea6bb CreateMutexW 153->156 154->153 155->156 157 9ea6c1-9ea6d7 156->157 159 9ea709-9ea70e 157->159 160 9ea6d9-9ea6ff 157->160 159->160
                                                              APIs
                                                              • CreateMutexW.KERNELBASE(?,?), ref: 009EA6B9
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2112602081.00000000009EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 009EA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_9ea000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CreateMutex
                                                              • String ID:
                                                              • API String ID: 1964310414-0
                                                              • Opcode ID: fff9e6c970783a5214eb26218e4b0830c45b25645c71347a659dc278b9e5fd28
                                                              • Instruction ID: bd26ff5d6016ab395105c9f58d235d0ab04831bae1acac2717a58872d17b9dc9
                                                              • Opcode Fuzzy Hash: fff9e6c970783a5214eb26218e4b0830c45b25645c71347a659dc278b9e5fd28
                                                              • Instruction Fuzzy Hash: 6D21B0B16002409FE711DB26CD85BA6FBE8EF15724F08886AE944DB751D375F809CB72

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 163 9ea392-9ea3cf 165 9ea3d4-9ea3dd 163->165 166 9ea3d1 163->166 167 9ea3df 165->167 168 9ea3e2-9ea3e8 165->168 166->165 167->168 169 9ea3ed-9ea404 168->169 170 9ea3ea 168->170 172 9ea43b-9ea440 169->172 173 9ea406-9ea419 RegQueryValueExW 169->173 170->169 172->173 174 9ea41b-9ea438 173->174 175 9ea442-9ea447 173->175 175->174
                                                              APIs
                                                              • RegQueryValueExW.KERNELBASE(?,00000E24,CC48A838,00000000,00000000,00000000,00000000), ref: 009EA40C
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2112602081.00000000009EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 009EA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_9ea000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: QueryValue
                                                              • String ID:
                                                              • API String ID: 3660427363-0
                                                              • Opcode ID: bdcd9e8d6722fbe4ddff8d103bf82f99ed050c3840e5abd003502f82230c90c5
                                                              • Instruction ID: 024475c71663d18b4343375e4155731c53a44216042fd79dcbe75c9dd8f98c8a
                                                              • Opcode Fuzzy Hash: bdcd9e8d6722fbe4ddff8d103bf82f99ed050c3840e5abd003502f82230c90c5
                                                              • Instruction Fuzzy Hash: A5218EB56006449FE721CE16CC84FA6B7ECEF24710F04C45AE945DB6A1E364FC09CA72

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 179 9ea486-9ea4c3 181 9ea4c8-9ea4d4 179->181 182 9ea4c5 179->182 183 9ea4d9-9ea4f0 181->183 184 9ea4d6 181->184 182->181 186 9ea527-9ea52c 183->186 187 9ea4f2-9ea505 RegSetValueExW 183->187 184->183 186->187 188 9ea52e-9ea533 187->188 189 9ea507-9ea524 187->189 188->189
                                                              APIs
                                                              • RegSetValueExW.KERNELBASE(?,00000E24,CC48A838,00000000,00000000,00000000,00000000), ref: 009EA4F8
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2112602081.00000000009EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 009EA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_9ea000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: a53ed6fe091761944c54b52a6568ec20bcf1b639be1de2f24150000f47c1b901
                                                              • Instruction ID: 30305e0b8d069099f8cc1f840114193a686ddabad58178ef793f8c8405681346
                                                              • Opcode Fuzzy Hash: a53ed6fe091761944c54b52a6568ec20bcf1b639be1de2f24150000f47c1b901
                                                              • Instruction Fuzzy Hash: 5311B1B6500640AFE7218E12CC44FA6BBECEF24710F04C45AED45DA6A1D764F808CA72

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 193 9ea710-9ea778 195 9ea77a-9ea79a CloseHandle 193->195 196 9ea7b9-9ea7be 193->196 199 9ea79c-9ea7b8 195->199 200 9ea7c0-9ea7c5 195->200 196->195 200->199
                                                              APIs
                                                              • CloseHandle.KERNELBASE(?), ref: 009EA780
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2112602081.00000000009EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 009EA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_9ea000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle
                                                              • String ID:
                                                              • API String ID: 2962429428-0
                                                              • Opcode ID: f4853629753595c5aead41f8472adcd34e4814e3fc5f96dae6921267491a90fe
                                                              • Instruction ID: 7feec31f6f7cd34032ed96941cc76dea165a544b97995e4bf1a8ed0a6de4a95d
                                                              • Opcode Fuzzy Hash: f4853629753595c5aead41f8472adcd34e4814e3fc5f96dae6921267491a90fe
                                                              • Instruction Fuzzy Hash: C72108B19083809FD7028F15DC45751BFB4EF02324F0884DBDC448F653D275A905DB62

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 202 9ea74e-9ea778 203 9ea77a-9ea782 CloseHandle 202->203 204 9ea7b9-9ea7be 202->204 206 9ea788-9ea79a 203->206 204->203 207 9ea79c-9ea7b8 206->207 208 9ea7c0-9ea7c5 206->208 208->207
                                                              APIs
                                                              • CloseHandle.KERNELBASE(?), ref: 009EA780
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2112602081.00000000009EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 009EA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_9ea000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle
                                                              • String ID:
                                                              • API String ID: 2962429428-0
                                                              • Opcode ID: 8de2c9ac007ca2724cb5d16ba3db135af69aabf6d6a118f1b10d39474d7eb97a
                                                              • Instruction ID: 15bf583f4a80e549d49287c481e45cbfa657af3e3ebafa87f280f1631634f767
                                                              • Opcode Fuzzy Hash: 8de2c9ac007ca2724cb5d16ba3db135af69aabf6d6a118f1b10d39474d7eb97a
                                                              • Instruction Fuzzy Hash: E4017C75A002408FEB11CF16D985766FBE8EF15320F08C4ABDD498B656D279E848CAA2

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 210 fe0015-fe00ad 213 fe00b8-fe02f9 210->213
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2113234846.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_fe0000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f280abe5bbfa33c3d2db41987aefba0b3aa2e144a559c399669a4ed31b615f9f
                                                              • Instruction ID: d31419cb20c3b919de692b6ec2e59b912455f848d980a9246cb8f1868df934b7
                                                              • Opcode Fuzzy Hash: f280abe5bbfa33c3d2db41987aefba0b3aa2e144a559c399669a4ed31b615f9f
                                                              • Instruction Fuzzy Hash: 4971873450A3C18FD706EB39EA549893BB27FA220C305859AD0408FBAFDB785D4ECB55

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 251 10505e0-1050603 252 1050606-1050620 251->252 253 1050626-1050643 252->253
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2113283352.0000000001050000.00000040.00000020.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_1050000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9ee1d910e7719ea9231922860d33a02dc8c80ae6f936ceb43427fede78285a57
                                                              • Instruction ID: 12c8d53d12a1faab96f2b0725ac061dd3e368a48b9da1c5f6d7e450971919f4c
                                                              • Opcode Fuzzy Hash: 9ee1d910e7719ea9231922860d33a02dc8c80ae6f936ceb43427fede78285a57
                                                              • Instruction Fuzzy Hash: FA018BB65097805FD7118B169C40862FFF8DF96620749C4DFEC498B653D269A809C772

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 254 1050606-1050620 255 1050626-1050643 254->255
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2113283352.0000000001050000.00000040.00000020.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_1050000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c9c920517b3149c8384a6a091a5684128bedd01f87b559668bd9aa7819ef2e04
                                                              • Instruction ID: 227d65f23a2a279254c7127168d1332619c09de3bb6f4b94ee8a2f8bcedad4b2
                                                              • Opcode Fuzzy Hash: c9c920517b3149c8384a6a091a5684128bedd01f87b559668bd9aa7819ef2e04
                                                              • Instruction Fuzzy Hash: 35E092B66016004B9750CF0BEC41452F7D8EB94630B08C07FDC0D8B701D276B509CAB5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 256 9e23f4-9e23ff 257 9e2412-9e2417 256->257 258 9e2401-9e240e 256->258 259 9e241a 257->259 260 9e2419 257->260 258->257 261 9e2420-9e2421 259->261
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2112580669.00000000009E2000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E2000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_9e2000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fb98bb5d9e6bf2a7bdb9c9ac2105b0ff637753b73ce27969c4985684e75b2cc3
                                                              • Instruction ID: 40de7f2d794e61005366642c2ab7e70dd3a117e0a4eea8aaad3a0a5d7a876d98
                                                              • Opcode Fuzzy Hash: fb98bb5d9e6bf2a7bdb9c9ac2105b0ff637753b73ce27969c4985684e75b2cc3
                                                              • Instruction Fuzzy Hash: BDD05E792096C14FD3179B1DC1A4B9537DCAB65714F4A44F9A8008B7B3C768DD81D600

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 262 9e23bc-9e23c3 263 9e23d6-9e23db 262->263 264 9e23c5-9e23d2 262->264 265 9e23dd-9e23e0 263->265 266 9e23e1 263->266 264->263 267 9e23e7-9e23e8 266->267
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2112580669.00000000009E2000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E2000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_9e2000_MsMpEng.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3cb65e9f525bb7785e2929c375a39c382d2b051c619eecab5ce2a23301d954d0
                                                              • Instruction ID: 6b3cd4ff92cb67ccb2ebf48fc5410333a0d9d52cff8a637a41759e82cfcd06cc
                                                              • Opcode Fuzzy Hash: 3cb65e9f525bb7785e2929c375a39c382d2b051c619eecab5ce2a23301d954d0
                                                              • Instruction Fuzzy Hash: 84D05E342002C14BD716DB0DC6D4F5937DCAB54B14F1A54E8AC108B762C7A8DCC0DE00