Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SjMIbKjuDL.exe

Overview

General Information

Sample name:SjMIbKjuDL.exe
renamed because original name is a hash value
Original sample name:21d48723fd950d9b624103ee4dd625f8.exe
Analysis ID:1425839
MD5:21d48723fd950d9b624103ee4dd625f8
SHA1:c8464eb2e1c60294cc2130143802dde486cfe215
SHA256:b28b6fb51ad601426665371ccd212a0038865c40f73b76cc1adba27da491cebf
Tags:exenjratRAT
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Njrat
.NET source code contains potential unpacker
.NET source code contains process injector
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Creates multiple autostart registry keys
Disables zone checking for all users
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Uses netsh to modify the Windows network and firewall settings
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • SjMIbKjuDL.exe (PID: 6696 cmdline: "C:\Users\user\Desktop\SjMIbKjuDL.exe" MD5: 21D48723FD950D9B624103EE4DD625F8)
    • chargeable.exe (PID: 2836 cmdline: "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" MD5: 8333797879EB8B484866624323C08DE3)
      • chargeable.exe (PID: 6472 cmdline: C:\Users\user\AppData\Roaming\confuse\chargeable.exe MD5: 8333797879EB8B484866624323C08DE3)
        • netsh.exe (PID: 1544 cmdline: netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
          • conhost.exe (PID: 2144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • chargeable.exe (PID: 6740 cmdline: "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" MD5: 8333797879EB8B484866624323C08DE3)
    • chargeable.exe (PID: 7112 cmdline: C:\Users\user\AppData\Roaming\confuse\chargeable.exe MD5: 8333797879EB8B484866624323C08DE3)
  • SjMIbKjuDL.exe (PID: 2496 cmdline: "C:\Users\user\Desktop\SjMIbKjuDL.exe" MD5: 21D48723FD950D9B624103EE4DD625F8)
  • chargeable.exe (PID: 344 cmdline: "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" MD5: 8333797879EB8B484866624323C08DE3)
    • chargeable.exe (PID: 6160 cmdline: C:\Users\user\AppData\Roaming\confuse\chargeable.exe MD5: 8333797879EB8B484866624323C08DE3)
  • SjMIbKjuDL.exe (PID: 7156 cmdline: "C:\Users\user\Desktop\SjMIbKjuDL.exe" MD5: 21D48723FD950D9B624103EE4DD625F8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Host": "doddyfire.linkpc.net", "Port": "10000", "Version": "0.7d", "Campaign ID": "neuf", "Install Name": "softcontrol.exe", "Install Dir": "TEMP", "Network Seprator": "|'|'|"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Njrat_1Yara detected NjratJoe Security
    SourceRuleDescriptionAuthorStrings
    00000006.00000002.1907772846.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
      00000006.00000002.1907772846.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
      • 0x3a9a:$a1: get_Registry
      • 0x4b76:$a2: SEE_MASK_NOZONECHECKS
      • 0x4c72:$a3: Download ERROR
      • 0x4b38:$a4: cmd.exe /c ping 0 -n 2 & del "
      • 0x4aca:$a5: netsh firewall delete allowedprogram "
      00000006.00000002.1907772846.0000000000402000.00000040.00000400.00020000.00000000.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
      • 0x4ba6:$a1: netsh firewall add allowedprogram
      • 0x4b76:$a2: SEE_MASK_NOZONECHECKS
      • 0x4e20:$b1: [TAP]
      • 0x4b38:$c3: cmd.exe /c ping
      00000006.00000002.1907772846.0000000000402000.00000040.00000400.00020000.00000000.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
      • 0x4b76:$reg: SEE_MASK_NOZONECHECKS
      • 0x4c4e:$msg: Execute ERROR
      • 0x4caa:$msg: Execute ERROR
      • 0x4b38:$ping: cmd.exe /c ping 0 -n 2 & del
      00000002.00000002.1791120819.0000000003661000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
        Click to see the 12 entries
        SourceRuleDescriptionAuthorStrings
        12.2.chargeable.exe.330da70.0.raw.unpackJoeSecurity_NjratYara detected NjratJoe Security
          12.2.chargeable.exe.330da70.0.raw.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
          • 0x3c9a:$a1: get_Registry
          • 0x4d76:$a2: SEE_MASK_NOZONECHECKS
          • 0x4e72:$a3: Download ERROR
          • 0x4d38:$a4: cmd.exe /c ping 0 -n 2 & del "
          • 0x4cca:$a5: netsh firewall delete allowedprogram "
          6.2.chargeable.exe.400000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
            12.2.chargeable.exe.330da70.0.raw.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
            • 0x4d38:$x1: cmd.exe /c ping 0 -n 2 & del "
            • 0x4e90:$s3: Executed As
            • 0x4e72:$s6: Download ERROR
            6.2.chargeable.exe.400000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
            • 0x3c9a:$a1: get_Registry
            • 0x4d76:$a2: SEE_MASK_NOZONECHECKS
            • 0x4e72:$a3: Download ERROR
            • 0x4d38:$a4: cmd.exe /c ping 0 -n 2 & del "
            • 0x4cca:$a5: netsh firewall delete allowedprogram "
            Click to see the 25 entries

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\confuse\chargeable.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\SjMIbKjuDL.exe, ProcessId: 6696, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\confuse
            Timestamp:04/15/24-00:32:20.305773
            SID:2033132
            Source Port:49740
            Destination Port:10000
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/15/24-00:36:04.171156
            SID:2814860
            Source Port:49740
            Destination Port:10000
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/15/24-00:36:00.040896
            SID:2825564
            Source Port:49740
            Destination Port:10000
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: SjMIbKjuDL.exeAvira: detected
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: 00000003.00000002.4134329459.00000000032D1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Njrat {"Host": "doddyfire.linkpc.net", "Port": "10000", "Version": "0.7d", "Campaign ID": "neuf", "Install Name": "softcontrol.exe", "Install Dir": "TEMP", "Network Seprator": "|'|'|"}
            Source: SjMIbKjuDL.exeVirustotal: Detection: 82%Perma Link
            Source: SjMIbKjuDL.exeReversingLabs: Detection: 89%
            Source: Yara matchFile source: 12.2.chargeable.exe.330da70.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.chargeable.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.chargeable.exe.330da70.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.chargeable.exe.369da74.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.chargeable.exe.369da74.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.1907772846.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1791120819.0000000003661000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.2045369556.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4134329459.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: chargeable.exe PID: 2836, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: chargeable.exe PID: 6472, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: chargeable.exe PID: 7112, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: chargeable.exe PID: 344, type: MEMORYSTR
            Source: Yara matchFile source: dump.pcap, type: PCAP
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeJoe Sandbox ML: detected
            Source: SjMIbKjuDL.exeJoe Sandbox ML: detected
            Source: SjMIbKjuDL.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
            Source: SjMIbKjuDL.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49740 -> 41.248.119.194:10000
            Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.4:49740 -> 41.248.119.194:10000
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49740 -> 41.248.119.194:10000
            Source: Malware configuration extractorURLs: doddyfire.linkpc.net
            Source: global trafficTCP traffic: 192.168.2.4:49740 -> 41.248.119.194:10000
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownDNS traffic detected: queries for: doddyfire.linkpc.net
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmp, SjMIbKjuDL.exe, 00000000.00000002.1756553383.0000000000BC7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: 2.2.chargeable.exe.369da74.0.raw.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 12.2.chargeable.exe.330da70.0.raw.unpack, kl.cs.Net Code: VKCodeToUnicode

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 12.2.chargeable.exe.330da70.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.chargeable.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.chargeable.exe.330da70.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.chargeable.exe.369da74.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.chargeable.exe.369da74.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.1907772846.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1791120819.0000000003661000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.2045369556.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4134329459.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: chargeable.exe PID: 2836, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: chargeable.exe PID: 6472, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: chargeable.exe PID: 7112, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: chargeable.exe PID: 344, type: MEMORYSTR
            Source: Yara matchFile source: dump.pcap, type: PCAP

            System Summary

            barindex
            Source: 12.2.chargeable.exe.330da70.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 12.2.chargeable.exe.330da70.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 6.2.chargeable.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 12.2.chargeable.exe.330da70.0.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 6.2.chargeable.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 12.2.chargeable.exe.330da70.0.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 12.2.chargeable.exe.330da70.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 6.2.chargeable.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 6.2.chargeable.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 6.2.chargeable.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 12.2.chargeable.exe.330da70.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 12.2.chargeable.exe.330da70.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 12.2.chargeable.exe.330da70.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 12.2.chargeable.exe.330da70.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 12.2.chargeable.exe.330da70.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 2.2.chargeable.exe.369da74.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 2.2.chargeable.exe.369da74.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 2.2.chargeable.exe.369da74.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 2.2.chargeable.exe.369da74.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 2.2.chargeable.exe.369da74.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 2.2.chargeable.exe.369da74.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 2.2.chargeable.exe.369da74.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 2.2.chargeable.exe.369da74.0.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 2.2.chargeable.exe.369da74.0.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 2.2.chargeable.exe.369da74.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 00000006.00000002.1907772846.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 00000006.00000002.1907772846.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000006.00000002.1907772846.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000002.00000002.1791120819.0000000003661000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 00000002.00000002.1791120819.0000000003661000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000002.00000002.1791120819.0000000003661000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 0000000C.00000002.2045369556.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 0000000C.00000002.2045369556.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0000000C.00000002.2045369556.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeCode function: 2_2_05930E3E NtResumeThread,2_2_05930E3E
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeCode function: 2_2_05930EE6 NtWriteVirtualMemory,2_2_05930EE6
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeCode function: 2_2_05930EB9 NtWriteVirtualMemory,2_2_05930EB9
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeCode function: 2_2_05930DFA NtResumeThread,2_2_05930DFA
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeCode function: 4_2_05260E3E NtResumeThread,4_2_05260E3E
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeCode function: 4_2_05260EE6 NtWriteVirtualMemory,4_2_05260EE6
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeCode function: 4_2_05260EB9 NtWriteVirtualMemory,4_2_05260EB9
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeCode function: 4_2_05260DFA NtResumeThread,4_2_05260DFA
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeCode function: 12_2_054E0EE6 NtWriteVirtualMemory,12_2_054E0EE6
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeCode function: 12_2_054E0E3E NtResumeThread,12_2_054E0E3E
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeCode function: 12_2_054E0DFA NtResumeThread,12_2_054E0DFA
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeCode function: 12_2_054E0EB9 NtWriteVirtualMemory,12_2_054E0EB9
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeCode function: 3_2_054D22D83_2_054D22D8
            Source: SjMIbKjuDL.exe, 00000000.00000002.1756943945.00000000028C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameriched20.dllp( vs SjMIbKjuDL.exe
            Source: SjMIbKjuDL.exe, 00000000.00000002.1756943945.00000000028C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs SjMIbKjuDL.exe
            Source: SjMIbKjuDL.exe, 00000000.00000002.1756943945.00000000028C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: lU,\\StringFileInfo\\000004B0\\OriginalFilenameL. vs SjMIbKjuDL.exe
            Source: SjMIbKjuDL.exe, 00000000.00000002.1756943945.00000000028C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameb6052.dll4 vs SjMIbKjuDL.exe
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757088773.00000000038C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename1.exe0 vs SjMIbKjuDL.exe
            Source: SjMIbKjuDL.exe, 00000000.00000002.1756265050.000000000083E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs SjMIbKjuDL.exe
            Source: SjMIbKjuDL.exe, 00000000.00000000.1659084051.00000000000BE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename1.exe0 vs SjMIbKjuDL.exe
            Source: SjMIbKjuDL.exe, 00000000.00000000.1659060144.00000000000A2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename1.exe0 vs SjMIbKjuDL.exe
            Source: SjMIbKjuDL.exe, 00000000.00000002.1757965777.0000000007C00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameb6052.dll4 vs SjMIbKjuDL.exe
            Source: SjMIbKjuDL.exe, 0000000B.00000002.1937787978.0000000002C86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameriched20.dllp( vs SjMIbKjuDL.exe
            Source: SjMIbKjuDL.exe, 0000000B.00000002.1937787978.0000000002C86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs SjMIbKjuDL.exe
            Source: SjMIbKjuDL.exe, 0000000B.00000002.1937787978.0000000002C86000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: lU,\\StringFileInfo\\000004B0\\OriginalFilenameL. vs SjMIbKjuDL.exe
            Source: SjMIbKjuDL.exe, 0000000E.00000002.2125322171.00000000028A6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameriched20.dllp( vs SjMIbKjuDL.exe
            Source: SjMIbKjuDL.exe, 0000000E.00000002.2125322171.00000000028A6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs SjMIbKjuDL.exe
            Source: SjMIbKjuDL.exe, 0000000E.00000002.2125322171.00000000028A6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: lU,\\StringFileInfo\\000004B0\\OriginalFilenameL. vs SjMIbKjuDL.exe
            Source: SjMIbKjuDL.exeBinary or memory string: OriginalFilename1.exe0 vs SjMIbKjuDL.exe
            Source: SjMIbKjuDL.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 12.2.chargeable.exe.330da70.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 12.2.chargeable.exe.330da70.0.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 6.2.chargeable.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 12.2.chargeable.exe.330da70.0.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 6.2.chargeable.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 12.2.chargeable.exe.330da70.0.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 12.2.chargeable.exe.330da70.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 6.2.chargeable.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 6.2.chargeable.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 6.2.chargeable.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 12.2.chargeable.exe.330da70.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 12.2.chargeable.exe.330da70.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 12.2.chargeable.exe.330da70.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 12.2.chargeable.exe.330da70.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 12.2.chargeable.exe.330da70.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 2.2.chargeable.exe.369da74.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 2.2.chargeable.exe.369da74.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 2.2.chargeable.exe.369da74.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 2.2.chargeable.exe.369da74.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 2.2.chargeable.exe.369da74.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 2.2.chargeable.exe.369da74.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 2.2.chargeable.exe.369da74.0.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 2.2.chargeable.exe.369da74.0.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 2.2.chargeable.exe.369da74.0.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 2.2.chargeable.exe.369da74.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 00000006.00000002.1907772846.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 00000006.00000002.1907772846.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000006.00000002.1907772846.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000002.00000002.1791120819.0000000003661000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 00000002.00000002.1791120819.0000000003661000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000002.00000002.1791120819.0000000003661000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 0000000C.00000002.2045369556.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 0000000C.00000002.2045369556.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0000000C.00000002.2045369556.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: SjMIbKjuDL.exe, MusicExpressMain.csBase64 encoded string: 'H7rrlW34uZ4g7TG29m695QHDWNDM6maH760RUMe2fvs6fBSV9ArU3xwZc58t79bYW92J4Kch8bJvQTXR7ZSLOpr16aCx9Y9b8sq08YK78X7af00cL6y1OAAaRhD2nS8883jy033am604F33HjHR2N4DSNOFX55eN2ArGi81FaNmmYUdOT0DytcGnj0PgMQ04e0wiA616'
            Source: chargeable.exe.0.dr, MusicExpressMain.csBase64 encoded string: 'H7rrlW34uZ4g7TG29m695QHDWNDM6maH760RUMe2fvs6fBSV9ArU3xwZc58t79bYW92J4Kch8bJvQTXR7ZSLOpr16aCx9Y9b8sq08YK78X7af00cL6y1OAAaRhD2nS8883jy033am604F33HjHR2N4DSNOFX55eN2ArGi81FaNmmYUdOT0DytcGnj0PgMQ04e0wiA616'
            Source: 0.2.SjMIbKjuDL.exe.38c7ef0.1.raw.unpack, MusicExpressMain.csBase64 encoded string: 'H7rrlW34uZ4g7TG29m695QHDWNDM6maH760RUMe2fvs6fBSV9ArU3xwZc58t79bYW92J4Kch8bJvQTXR7ZSLOpr16aCx9Y9b8sq08YK78X7af00cL6y1OAAaRhD2nS8883jy033am604F33HjHR2N4DSNOFX55eN2ArGi81FaNmmYUdOT0DytcGnj0PgMQ04e0wiA616'
            Source: 0.2.SjMIbKjuDL.exe.38e3110.2.raw.unpack, MusicExpressMain.csBase64 encoded string: 'H7rrlW34uZ4g7TG29m695QHDWNDM6maH760RUMe2fvs6fBSV9ArU3xwZc58t79bYW92J4Kch8bJvQTXR7ZSLOpr16aCx9Y9b8sq08YK78X7af00cL6y1OAAaRhD2nS8883jy033am604F33HjHR2N4DSNOFX55eN2ArGi81FaNmmYUdOT0DytcGnj0PgMQ04e0wiA616'
            Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@16/4@1/1
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeCode function: 3_2_05622912 AdjustTokenPrivileges,3_2_05622912
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeCode function: 3_2_056228DB AdjustTokenPrivileges,3_2_056228DB
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeFile created: C:\Users\user\AppData\Roaming\confuseJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2144:120:WilError_03
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeMutant created: NULL
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMutant created: \Sessions\1\BaseNamedObjects\e1a87040f2026369a233f9ae76301b7b
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: SjMIbKjuDL.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: SjMIbKjuDL.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: SjMIbKjuDL.exeVirustotal: Detection: 82%
            Source: SjMIbKjuDL.exeReversingLabs: Detection: 89%
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeFile read: C:\Users\user\Desktop\SjMIbKjuDL.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\SjMIbKjuDL.exe "C:\Users\user\Desktop\SjMIbKjuDL.exe"
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess created: C:\Users\user\AppData\Roaming\confuse\chargeable.exe "C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess created: C:\Users\user\AppData\Roaming\confuse\chargeable.exe C:\Users\user\AppData\Roaming\confuse\chargeable.exe
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\confuse\chargeable.exe "C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess created: C:\Users\user\AppData\Roaming\confuse\chargeable.exe C:\Users\user\AppData\Roaming\confuse\chargeable.exe
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
            Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Users\user\Desktop\SjMIbKjuDL.exe "C:\Users\user\Desktop\SjMIbKjuDL.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\confuse\chargeable.exe "C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess created: C:\Users\user\AppData\Roaming\confuse\chargeable.exe C:\Users\user\AppData\Roaming\confuse\chargeable.exe
            Source: unknownProcess created: C:\Users\user\Desktop\SjMIbKjuDL.exe "C:\Users\user\Desktop\SjMIbKjuDL.exe"
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess created: C:\Users\user\AppData\Roaming\confuse\chargeable.exe "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" Jump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess created: C:\Users\user\AppData\Roaming\confuse\chargeable.exe C:\Users\user\AppData\Roaming\confuse\chargeable.exeJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLEJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess created: C:\Users\user\AppData\Roaming\confuse\chargeable.exe C:\Users\user\AppData\Roaming\confuse\chargeable.exeJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess created: C:\Users\user\AppData\Roaming\confuse\chargeable.exe C:\Users\user\AppData\Roaming\confuse\chargeable.exeJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: mscoree.dll
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: kernel.appcore.dll
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: version.dll
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: windows.storage.dll
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: wldp.dll
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: profapi.dll
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeSection loaded: uxtheme.dll
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: mscoree.dll
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: kernel.appcore.dll
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: version.dll
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: windows.storage.dll
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: wldp.dll
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: profapi.dll
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: uxtheme.dll
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: dwrite.dll
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: riched20.dll
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: usp10.dll
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: msls31.dll
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: textshaping.dll
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeSection loaded: shfolder.dll
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
            Source: SjMIbKjuDL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
            Source: SjMIbKjuDL.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: 2.2.chargeable.exe.369da74.0.raw.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: 12.2.chargeable.exe.330da70.0.raw.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: SjMIbKjuDL.exeStatic PE information: section name: .l2
            Source: chargeable.exe.0.drStatic PE information: section name: .l2
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeCode function: 2_2_017BCDBC push ebx; retf 2_2_017BCDC3
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeCode function: 2_2_017BCDF1 push ebx; retf 2_2_017BCDF8
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeCode function: 2_2_017BCDAA push ebx; retf 2_2_017BCDB1
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeCode function: 2_2_017BCDE2 push ebx; retf 2_2_017BCDE6
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeCode function: 2_2_017BCDCE push ebx; retf 2_2_017BCDD5
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeFile created: C:\Users\user\AppData\Roaming\confuse\chargeable.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run confuseJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SysMainJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run confuseJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run confuseJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SysMainJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SysMainJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeMemory allocated: 800000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeMemory allocated: 28C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeMemory allocated: D90000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory allocated: 14E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory allocated: 35D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory allocated: 17F0000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory allocated: 16D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory allocated: 32D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory allocated: 52D0000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory allocated: 1240000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory allocated: 2EC0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory allocated: 4EC0000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory allocated: 16C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory allocated: 3590000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory allocated: 1710000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeMemory allocated: FD0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeMemory allocated: 2C60000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeMemory allocated: 4C60000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory allocated: 1220000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory allocated: 3240000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory allocated: 13D0000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory allocated: 1270000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory allocated: 2F80000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory allocated: 4F80000 memory commit | memory reserve | memory write watch
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeMemory allocated: B10000 memory reserve | memory write watch
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeMemory allocated: 2880000 memory reserve | memory write watch
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeMemory allocated: BB0000 memory commit | memory reserve | memory write watch
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeWindow / User API: threadDelayed 353Jump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeWindow / User API: threadDelayed 3739Jump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeWindow / User API: threadDelayed 5372Jump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeWindow / User API: foregroundWindowGot 1767Jump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exe TID: 6764Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exe TID: 6160Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exe TID: 6644Thread sleep count: 353 > 30Jump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exe TID: 6644Thread sleep time: -353000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exe TID: 5804Thread sleep count: 3739 > 30Jump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exe TID: 6644Thread sleep count: 5372 > 30Jump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exe TID: 6644Thread sleep time: -5372000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exe TID: 5216Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exe TID: 4312Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exe TID: 2500Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exe TID: 4564Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exe TID: 1016Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exe TID: 7076Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeThread delayed: delay time: 922337203685477
            Source: chargeable.exe, 00000003.00000002.4132563437.0000000001353000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWnt, System.Ser
            Source: netsh.exe, 00000007.00000002.1866596442.00000000010BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllI
            Source: chargeable.exe, 00000003.00000002.4132563437.0000000001353000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: 0.2.SjMIbKjuDL.exe.7c00000.3.raw.unpack, D.cs.Net Code: Run contains injection code
            Source: 0.2.SjMIbKjuDL.exe.291c09c.0.raw.unpack, D.cs.Net Code: Run contains injection code
            Source: 2.2.chargeable.exe.362c2fc.1.raw.unpack, D.cs.Net Code: Run contains injection code
            Source: 12.2.chargeable.exe.329c2f8.1.raw.unpack, D.cs.Net Code: Run contains injection code
            Source: 0.2.SjMIbKjuDL.exe.7c00000.3.raw.unpack, D.csReference to suspicious API methods: VirtualAllocEx((IntPtr)array4[0], intPtr, *(uint*)(ptr2 + 80), 12288u, 64u)
            Source: 0.2.SjMIbKjuDL.exe.7c00000.3.raw.unpack, D.csReference to suspicious API methods: NtWriteVirtualMemory((IntPtr)array4[0], intPtr, (IntPtr)ptr5, *(uint*)(ptr2 + 84), IntPtr.Zero)
            Source: 0.2.SjMIbKjuDL.exe.7c00000.3.raw.unpack, D.csReference to suspicious API methods: NtSetContextThread((IntPtr)array4[1], (IntPtr)ptr4)
            Source: 2.2.chargeable.exe.369da74.0.raw.unpack, kl.csReference to suspicious API methods: MapVirtualKey(a, 0u)
            Source: 2.2.chargeable.exe.369da74.0.raw.unpack, kl.csReference to suspicious API methods: GetAsyncKeyState(num2)
            Source: 2.2.chargeable.exe.369da74.0.raw.unpack, OK.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, 100, ref lpszVer, 100)
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory written: C:\Users\user\AppData\Roaming\confuse\chargeable.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory written: C:\Users\user\AppData\Roaming\confuse\chargeable.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeMemory written: C:\Users\user\AppData\Roaming\confuse\chargeable.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeProcess created: C:\Users\user\AppData\Roaming\confuse\chargeable.exe "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" Jump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess created: C:\Users\user\AppData\Roaming\confuse\chargeable.exe C:\Users\user\AppData\Roaming\confuse\chargeable.exeJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess created: C:\Users\user\AppData\Roaming\confuse\chargeable.exe C:\Users\user\AppData\Roaming\confuse\chargeable.exeJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess created: C:\Users\user\AppData\Roaming\confuse\chargeable.exe C:\Users\user\AppData\Roaming\confuse\chargeable.exeJump to behavior
            Source: chargeable.exe, 00000003.00000002.4134329459.000000000334A000.00000004.00000800.00020000.00000000.sdmp, chargeable.exe, 00000003.00000002.4134329459.000000000371D000.00000004.00000800.00020000.00000000.sdmp, chargeable.exe, 00000003.00000002.4134329459.000000000380E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: chargeable.exe, 00000003.00000002.4134329459.000000000334A000.00000004.00000800.00020000.00000000.sdmp, chargeable.exe, 00000003.00000002.4134329459.000000000371D000.00000004.00000800.00020000.00000000.sdmp, chargeable.exe, 00000003.00000002.4134329459.000000000380E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@9
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\OFFSYMXL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\OFFSYML.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\OFFSYMB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SjMIbKjuDL.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeRegistry value created: HKEY_CURRENT_USER\Environment SEE_MASK_NOZONECHECKSJump to behavior
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
            Source: C:\Users\user\AppData\Roaming\confuse\chargeable.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 12.2.chargeable.exe.330da70.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.chargeable.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.chargeable.exe.330da70.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.chargeable.exe.369da74.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.chargeable.exe.369da74.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.1907772846.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1791120819.0000000003661000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.2045369556.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4134329459.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: chargeable.exe PID: 2836, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: chargeable.exe PID: 6472, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: chargeable.exe PID: 7112, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: chargeable.exe PID: 344, type: MEMORYSTR
            Source: Yara matchFile source: dump.pcap, type: PCAP

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 12.2.chargeable.exe.330da70.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.chargeable.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.chargeable.exe.330da70.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.chargeable.exe.369da74.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.chargeable.exe.369da74.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.1907772846.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1791120819.0000000003661000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.2045369556.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4134329459.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: chargeable.exe PID: 2836, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: chargeable.exe PID: 6472, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: chargeable.exe PID: 7112, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: chargeable.exe PID: 344, type: MEMORYSTR
            Source: Yara matchFile source: dump.pcap, type: PCAP
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            11
            Registry Run Keys / Startup Folder
            1
            Access Token Manipulation
            1
            Masquerading
            1
            Input Capture
            1
            Security Software Discovery
            Remote Services1
            Input Capture
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            212
            Process Injection
            31
            Disable or Modify Tools
            LSASS Memory1
            Process Discovery
            Remote Desktop Protocol1
            Archive Collected Data
            1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
            Registry Run Keys / Startup Folder
            31
            Virtualization/Sandbox Evasion
            Security Account Manager31
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            1
            Access Token Manipulation
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture11
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script212
            Process Injection
            LSA Secrets1
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
            Obfuscated Files or Information
            Cached Domain Credentials12
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Software Packing
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1425839 Sample: SjMIbKjuDL.exe Startdate: 15/04/2024 Architecture: WINDOWS Score: 100 37 doddyfire.linkpc.net 2->37 41 Snort IDS alert for network traffic 2->41 43 Found malware configuration 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 9 other signatures 2->47 10 SjMIbKjuDL.exe 2 6 2->10         started        14 chargeable.exe 2 2->14         started        16 chargeable.exe 2 2->16         started        18 2 other processes 2->18 signatures3 process4 file5 35 C:\Users\user\AppData\...\chargeable.exe, PE32 10->35 dropped 57 Creates multiple autostart registry keys 10->57 20 chargeable.exe 3 10->20         started        59 Injects a PE file into a foreign processes 14->59 23 chargeable.exe 2 14->23         started        25 chargeable.exe 16->25         started        signatures6 process7 signatures8 49 Antivirus detection for dropped file 20->49 51 Machine Learning detection for dropped file 20->51 53 Uses netsh to modify the Windows network and firewall settings 20->53 55 2 other signatures 20->55 27 chargeable.exe 3 4 20->27         started        process9 dnsIp10 39 doddyfire.linkpc.net 41.248.119.194, 10000, 49740 MT-MPLSMA Morocco 27->39 61 Disables zone checking for all users 27->61 31 netsh.exe 2 27->31         started        signatures11 process12 process13 33 conhost.exe 31->33         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            SjMIbKjuDL.exe82%VirustotalBrowse
            SjMIbKjuDL.exe89%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
            SjMIbKjuDL.exe100%AviraTR/Dropper.Gen
            SjMIbKjuDL.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\confuse\chargeable.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Roaming\confuse\chargeable.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.tiro.com0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%Avira URL Cloudsafe
            http://www.zhongyicts.com.cn0%Avira URL Cloudsafe
            http://www.founder.com.cn/cn/cThe0%Avira URL Cloudsafe
            http://www.founder.com.cn/cn0%Avira URL Cloudsafe
            http://www.founder.com.cn/cn/bThe0%VirustotalBrowse
            http://www.founder.com.cn/cn0%VirustotalBrowse
            http://www.zhongyicts.com.cn1%VirustotalBrowse
            http://www.founder.com.cn/cn/cThe0%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            doddyfire.linkpc.net
            41.248.119.194
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              doddyfire.linkpc.netfalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.apache.org/licenses/LICENSE-2.0SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.comSjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designersGSjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designers/?SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/bTheSjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.com/designers?SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.tiro.comSjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersSjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.goodfont.co.krSjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comlSjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sajatypeworks.comSjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netDSjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/cabarga.htmlNSjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/cTheSjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.galapagosdesign.com/staff/dennis.htmSjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmp, SjMIbKjuDL.exe, 00000000.00000002.1756553383.0000000000BC7000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnSjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.com/designers/frere-user.htmlSjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.jiyu-kobo.co.jp/SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.galapagosdesign.com/DPleaseSjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers8SjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fonts.comSjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.sandoll.co.krSjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.urwpp.deDPleaseSjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.zhongyicts.com.cnSjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • 1%, Virustotal, Browse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.sakkal.comSjMIbKjuDL.exe, 00000000.00000002.1757449158.0000000005CD2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    41.248.119.194
                                    doddyfire.linkpc.netMorocco
                                    36903MT-MPLSMAfalse
                                    Joe Sandbox version:40.0.0 Tourmaline
                                    Analysis ID:1425839
                                    Start date and time:2024-04-15 00:31:06 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 9m 36s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:16
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:SjMIbKjuDL.exe
                                    renamed because original name is a hash value
                                    Original Sample Name:21d48723fd950d9b624103ee4dd625f8.exe
                                    Detection:MAL
                                    Classification:mal100.phis.troj.spyw.evad.winEXE@16/4@1/1
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 229
                                    • Number of non-executed functions: 1
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    TimeTypeDescription
                                    00:32:51API Interceptor992254x Sleep call for process: chargeable.exe modified
                                    23:32:02AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run confuse C:\Users\user\AppData\Roaming\confuse\chargeable.exe
                                    23:32:11AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run SysMain C:\Users\user\Desktop\SjMIbKjuDL.exe
                                    23:32:20AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run confuse C:\Users\user\AppData\Roaming\confuse\chargeable.exe
                                    23:32:30AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run SysMain C:\Users\user\Desktop\SjMIbKjuDL.exe
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    doddyfire.linkpc.netctVXvVgUrO.exeGet hashmaliciousNjratBrowse
                                    • 41.249.48.248
                                    j76l1AiIHm.exeGet hashmaliciousNjratBrowse
                                    • 41.249.48.248
                                    QpcOa13BU1.exeGet hashmaliciousNjratBrowse
                                    • 41.249.108.177
                                    z9gxPEpWws.exeGet hashmaliciousNjratBrowse
                                    • 41.249.108.177
                                    7Hr9O6jK2l.exeGet hashmaliciousNjratBrowse
                                    • 41.249.108.177
                                    tuYTv9rjMX.exeGet hashmaliciousNjratBrowse
                                    • 160.178.39.123
                                    eDafoy5XIk.exeGet hashmaliciousNjratBrowse
                                    • 160.178.39.123
                                    KSqpu62vE4.exeGet hashmaliciousNjratBrowse
                                    • 160.178.39.123
                                    VDPIYNN1uz.exeGet hashmaliciousNjratBrowse
                                    • 160.178.39.123
                                    hzapnLzS07.exeGet hashmaliciousNjratBrowse
                                    • 105.154.98.75
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    MT-MPLSMAEYhvUxUIsT.elfGet hashmaliciousMiraiBrowse
                                    • 41.248.235.159
                                    2EFEN3j6ml.elfGet hashmaliciousUnknownBrowse
                                    • 41.143.59.124
                                    ye7FfR856w.elfGet hashmaliciousMiraiBrowse
                                    • 41.248.235.170
                                    mBUFKJts6X.elfGet hashmaliciousMiraiBrowse
                                    • 41.251.244.103
                                    ctVXvVgUrO.exeGet hashmaliciousNjratBrowse
                                    • 41.249.48.248
                                    j76l1AiIHm.exeGet hashmaliciousNjratBrowse
                                    • 41.249.48.248
                                    QpcOa13BU1.exeGet hashmaliciousNjratBrowse
                                    • 41.249.108.177
                                    z9gxPEpWws.exeGet hashmaliciousNjratBrowse
                                    • 41.249.108.177
                                    7Hr9O6jK2l.exeGet hashmaliciousNjratBrowse
                                    • 41.249.108.177
                                    7m7X62tiZr.elfGet hashmaliciousMiraiBrowse
                                    • 41.140.123.140
                                    No context
                                    No context
                                    Process:C:\Users\user\Desktop\SjMIbKjuDL.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):388
                                    Entropy (8bit):5.20595142366915
                                    Encrypted:false
                                    SSDEEP:12:Q3LaJU2C9XAn10U29xtUz1B0U2uk71K6xhk7v:MLF2CpI329Iz52Ve
                                    MD5:2452328391F7A0B3C56DDF0E6389513E
                                    SHA1:6FE308A325AE8BFB17DE5CAAF54432E5301987B6
                                    SHA-256:2BC0F7D1CBD869EF4FD93B95495C8081B01B3FD627890B006B6A531D8C050AA2
                                    SHA-512:AC65283B0959E112B73160BB4322D0725C7D0EC79E3BB93555B1412204AA72F1F66BB9EB8D8B24B6570EC8717A1A4A129454588C3EA9ACE206B6E9CCB7F2ABDC
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                    Process:C:\Users\user\AppData\Roaming\confuse\chargeable.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):388
                                    Entropy (8bit):5.20595142366915
                                    Encrypted:false
                                    SSDEEP:12:Q3LaJU2C9XAn10U29xtUz1B0U2uk71K6xhk7v:MLF2CpI329Iz52Ve
                                    MD5:2452328391F7A0B3C56DDF0E6389513E
                                    SHA1:6FE308A325AE8BFB17DE5CAAF54432E5301987B6
                                    SHA-256:2BC0F7D1CBD869EF4FD93B95495C8081B01B3FD627890B006B6A531D8C050AA2
                                    SHA-512:AC65283B0959E112B73160BB4322D0725C7D0EC79E3BB93555B1412204AA72F1F66BB9EB8D8B24B6570EC8717A1A4A129454588C3EA9ACE206B6E9CCB7F2ABDC
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                    Process:C:\Users\user\Desktop\SjMIbKjuDL.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):111168
                                    Entropy (8bit):5.9284213075577155
                                    Encrypted:false
                                    SSDEEP:1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBhe:w5eznsjsguGDFqGx8egoxmO3e
                                    MD5:8333797879EB8B484866624323C08DE3
                                    SHA1:25E956F7CBFCC14309ACDF4260F8E9DB620681DF
                                    SHA-256:78ED27EEE3C675F089ED40CDB61B77A948CF0DF847144A2BA4F9D0AB9B83870A
                                    SHA-512:40F5632827FA9644D61501F54647621DD0899322010783CA75A3AC007B0BD667A66E476DD88B4191A99E526EBFE963F944A3E05CED09C88105AA2CE9A3C1DA1F
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...S..[.................x..........^.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...dv... ...x.................. ..`.rsrc...H............|..............@..@.reloc..............................@..B.l2.................................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\SysWOW64\netsh.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):313
                                    Entropy (8bit):4.971939296804078
                                    Encrypted:false
                                    SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
                                    MD5:689E2126A85BF55121488295EE068FA1
                                    SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
                                    SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
                                    SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
                                    Malicious:false
                                    Reputation:high, very likely benign file
                                    Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):5.9266803370249095
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:SjMIbKjuDL.exe
                                    File size:111'104 bytes
                                    MD5:21d48723fd950d9b624103ee4dd625f8
                                    SHA1:c8464eb2e1c60294cc2130143802dde486cfe215
                                    SHA256:b28b6fb51ad601426665371ccd212a0038865c40f73b76cc1adba27da491cebf
                                    SHA512:cbd41075d567da7351430300c1c9c9aed45d865e3ff7cbf3da68a9d268a724dc80be90836df004618d15cd3e106d2a855fd4f8dd940adf790c43ed0d3538431f
                                    SSDEEP:1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBhp:w5eznsjsguGDFqGx8egoxmO3p
                                    TLSH:96B3FB387D952133C67EC1F689E50A8AEB69223F3191E9ED4CA742C418B2F166DC1D1F
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...S..[.................x..........^.... ........@.. ....................................@................................
                                    Icon Hash:90cececece8e8eb0
                                    Entrypoint:0x41965e
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x5B1EAC53 [Mon Jun 11 17:07:31 2018 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x196080x53.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1e0000x400.l2
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1c0000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x176640x178007acd957f3266ee65ab01391ebf758013False0.46648520611702127data5.649987526076151IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0x1a0000x3480x4002f8c2571ca02df8c52b2a03fcee90517False0.37109375data2.7512174114856074IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x1c0000xc0x2005219651ec1890b5711996a05a6f4ed37False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    .l20x1e0000x4000x4008821bc5ab10b630550f47d3029855e20False0.3720703125data2.7512174114856074IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_VERSION0x1e0600x2ecdata0.4625668449197861
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                    04/15/24-00:32:20.305773TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4974010000192.168.2.441.248.119.194
                                    04/15/24-00:36:04.171156TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4974010000192.168.2.441.248.119.194
                                    04/15/24-00:36:00.040896TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4974010000192.168.2.441.248.119.194
                                    TimestampSource PortDest PortSource IPDest IP
                                    Apr 15, 2024 00:32:19.877422094 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:32:20.217927933 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:32:20.218251944 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:32:20.305773020 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:32:21.006227970 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:32:21.346715927 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:32:25.725377083 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:32:26.283598900 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:32:27.635157108 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:32:27.640268087 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:32:28.381161928 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:32:28.722165108 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:32:44.649530888 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:32:44.649914026 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:32:45.396894932 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:32:45.736490011 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:02.712505102 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:02.713047981 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:03.257575989 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:12.866864920 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:13.407227039 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:15.288610935 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:15.827260017 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:20.776421070 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:20.776979923 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:21.315165043 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:22.959937096 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:23.502255917 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:23.502352953 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:24.046363115 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:25.647464037 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:26.190455914 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:26.190697908 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:26.722229004 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:26.724423885 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:26.998186111 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:27.067553997 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:27.067802906 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:27.340095997 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:27.340246916 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:27.606024027 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:27.606189966 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:27.874710083 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:27.889003992 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:27.889224052 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:28.156188965 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:28.156380892 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:28.215668917 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:28.215818882 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:28.428986073 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:28.429133892 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:28.560489893 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:28.560877085 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:28.901045084 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:28.901199102 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:29.146326065 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:29.420344114 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:29.446902037 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:29.447017908 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:29.489757061 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:29.489891052 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:29.721014977 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:29.768799067 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:29.768934011 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:29.830224991 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:29.830471992 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:30.081312895 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:30.081427097 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:30.178641081 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:30.178764105 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:30.375000000 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:30.518518925 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:30.518656969 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:30.723563910 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:30.723735094 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:30.928268909 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:31.051491022 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:31.051717997 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:31.269572020 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:31.269726992 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:31.392437935 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:31.392575026 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:31.586678982 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:31.741128922 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:31.741319895 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:31.931366920 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:31.931606054 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:32.128515005 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:32.282759905 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:32.282886982 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:32.469352007 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:32.469579935 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:32.622801065 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:32.622898102 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:32.888463020 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:32.963335991 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:32.963665009 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:33.151644945 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:33.267741919 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:33.268740892 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:33.495563030 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:33.557110071 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:33.560681105 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:33.693991899 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:33.696805954 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:33.909658909 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:33.957928896 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:33.960864067 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:34.083502054 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:34.083612919 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:34.292151928 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:34.435115099 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:34.435229063 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:34.436868906 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:34.634453058 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:34.634562969 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:34.841805935 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:34.842011929 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:35.040781975 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:35.240386963 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:35.240510941 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:35.405539036 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:35.405649900 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:35.606880903 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:35.831913948 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:35.832062006 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:35.973186016 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:35.973315001 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:36.214688063 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:36.376101971 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:36.376271009 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:36.557339907 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:36.560822010 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:36.756906986 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:36.760720015 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:36.956649065 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:36.956790924 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:37.160947084 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:37.304702997 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:37.304819107 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:37.502835989 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:37.502947092 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:37.535780907 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:37.535974026 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:37.804763079 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:37.844364882 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:37.844469070 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:38.078488111 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:38.078615904 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:38.261137009 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:38.262736082 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:38.475569963 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:38.479182959 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:38.705035925 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:38.798309088 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:38.800770998 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:38.842660904 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:38.848781109 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:39.027302980 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:39.029045105 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:39.154944897 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:39.156743050 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:39.190732002 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:39.192815065 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:39.425170898 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:39.508443117 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:39.508555889 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:39.734971046 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:39.735088110 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:39.865449905 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:39.865595102 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:40.073045969 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:40.197830915 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:40.200731039 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:40.438056946 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:40.596256971 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:40.600780964 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:40.774312019 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:40.774547100 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:40.888267994 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:40.890784979 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:41.323542118 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:41.570580959 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:41.570806980 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:42.256057024 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:42.256176949 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:42.527318954 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:42.641710997 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:42.641935110 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:42.881581068 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:43.109409094 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:43.332391977 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:43.555252075 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:43.715540886 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:43.715708017 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:44.000488997 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:44.284013987 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:44.562129021 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:44.785124063 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:44.887358904 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:44.888763905 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:45.113961935 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:45.310039043 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:45.358444929 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:45.358444929 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:45.519125938 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:45.519227028 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:45.602205038 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:45.602205992 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:45.841404915 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:45.841406107 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.065994978 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.065994978 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.102792978 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.102919102 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.104675055 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.104675055 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.104690075 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.277956009 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.277956009 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.331130028 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.332751989 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.332751989 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.335098982 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.425762892 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.426698923 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.458627939 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.461478949 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.474426031 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.474426031 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.510231018 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.511754990 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.511754990 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.537429094 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.537611961 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.537611961 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.538691044 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.539266109 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.558293104 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.559241056 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.559484959 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.590118885 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.591133118 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.623236895 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.625027895 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.625273943 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.625273943 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.631927967 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.632874966 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.633888960 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.665683985 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.666933060 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.705656052 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.705753088 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.705753088 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.707680941 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.851001024 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.854422092 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.872251034 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.873156071 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.900051117 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.901942015 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.902961016 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.915760040 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.917406082 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.917407036 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:46.965836048 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.967787027 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:46.973139048 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:47.053498983 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:47.056934118 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:47.273617983 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:47.273716927 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:47.402147055 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:47.402312994 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:47.680118084 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:47.744934082 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:47.745023966 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:48.000817060 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:48.025738955 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:48.025856018 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:48.285028934 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:48.288734913 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:48.349809885 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:48.350120068 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:48.584990025 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:48.596820116 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:48.599832058 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:48.692491055 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:48.692748070 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:48.927922010 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:48.932744980 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:49.033324957 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:49.034748077 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:49.297740936 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:49.375025988 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:49.375231028 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:49.695764065 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:49.695869923 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:49.990535021 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:50.038619041 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:50.038841963 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:50.296576977 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:50.331440926 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:50.331672907 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:50.580585957 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:50.580756903 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:50.647218943 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:50.647358894 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:50.910095930 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:50.910198927 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:50.991987944 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:50.992311954 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:51.265847921 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:51.337764978 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:51.337985992 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:51.587179899 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:51.605849028 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:51.605967999 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:51.887846947 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:51.887962103 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:51.946580887 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:51.946674109 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:52.222384930 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:52.226486921 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:52.286271095 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:52.288784981 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:52.528913021 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:52.571311951 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:52.572846889 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:52.846498013 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:52.847246885 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:52.887183905 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:52.888849020 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:53.111387968 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:53.112765074 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:53.193829060 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:53.196883917 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:53.423353910 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:53.423510075 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:53.545895100 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:53.546068907 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:53.804917097 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:53.885523081 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:53.885621071 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:54.147680044 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:54.147943974 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:54.429649115 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:54.432724953 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:54.674671888 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:54.703443050 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:54.704777002 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:54.977261066 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:54.985588074 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:54.988737106 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:55.130019903 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:55.130165100 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:55.327411890 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:55.327555895 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:55.329267025 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:55.647347927 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:55.668056011 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:55.668371916 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:55.959534883 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:55.989101887 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:55.989238977 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:56.202069044 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:56.202249050 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:56.303520918 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:56.303656101 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:56.520776033 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:56.520905018 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:56.659288883 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:56.659527063 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:56.946712971 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:57.000051022 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:57.000276089 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:57.289438963 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:57.289726973 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:57.544116974 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:57.544274092 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:57.925693035 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:57.925822020 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:58.261450052 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:58.390284061 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:58.390409946 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:58.770548105 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:58.807732105 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:59.283806086 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:59.578231096 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:59.852639914 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:59.852756023 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:33:59.918360949 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:33:59.918586016 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:00.247817993 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:00.259140015 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:00.263446093 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:00.549783945 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:00.592983961 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:00.593086958 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:00.805169106 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:00.808756113 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:00.890943050 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:00.895797014 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:01.136073112 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:01.136903048 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:01.235742092 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:01.235918045 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:01.481048107 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:01.481168985 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:01.665760040 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:01.777714014 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:01.777815104 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:01.968733072 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:02.007019043 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:02.007172108 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:02.117765903 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:02.117925882 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:02.301090956 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:02.308805943 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:02.462551117 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:02.462682009 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:02.642518044 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:02.642851114 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:02.828819036 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:02.937784910 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:02.937884092 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:03.168661118 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:03.168823004 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:03.278356075 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:03.280790091 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:03.526691914 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:03.620083094 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:03.622865915 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:03.847753048 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:03.867928028 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:03.868851900 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:04.164530993 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:04.171964884 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:04.206653118 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:04.207745075 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:04.423559904 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:04.430862904 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:04.430949926 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:04.508811951 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:04.508946896 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:04.748719931 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:04.748825073 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:04.765675068 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:04.765743017 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:04.892328024 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:04.892435074 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:05.111603975 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:05.111707926 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:05.352650881 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:05.441561937 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:05.441672087 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:05.668665886 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:05.668776035 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:05.696571112 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:05.696664095 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:05.886934996 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:05.989474058 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:05.989572048 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:06.035062075 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:06.035180092 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:06.227592945 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:06.227732897 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:06.398881912 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:06.399022102 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:06.640286922 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:06.737684011 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:06.737824917 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:06.989037991 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:06.995549917 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:07.266860962 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:07.279964924 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:07.283513069 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:07.435064077 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:07.435657978 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:07.612606049 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:07.615639925 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:07.787676096 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:07.787796974 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:08.066159010 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:08.129296064 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:08.131071091 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:08.407124043 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:08.407234907 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:08.622230053 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:08.669565916 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:08.669668913 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:08.946413994 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:08.946541071 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:08.965312004 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:08.965491056 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:08.966165066 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:09.241766930 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:09.287187099 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:09.288781881 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:09.506478071 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:09.508775949 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:09.582159996 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:09.582365036 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:09.856684923 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:09.857189894 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:10.088377953 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:10.136183977 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:10.136846066 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:10.198128939 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:10.199078083 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:10.429204941 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:10.429450035 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:10.537792921 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:10.538012028 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:10.799949884 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:10.883409977 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:10.883621931 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:11.140266895 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:11.140522957 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:11.392790079 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:11.430459976 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:11.430551052 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:11.680571079 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:11.680813074 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:11.734127045 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:11.734401941 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:11.971484900 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:11.971627951 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:12.073061943 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:12.073167086 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:12.314868927 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:12.424665928 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:12.424812078 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:12.656033993 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:12.656208038 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:12.909384012 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:12.968755007 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:12.968836069 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:13.199775934 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:13.199886084 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:13.249535084 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:13.249660015 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:13.503288984 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:13.511548996 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:13.512756109 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:13.588376999 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:13.590816975 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:13.846210003 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:13.848773956 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:13.934053898 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:13.935770035 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:14.175892115 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:14.275857925 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:14.276000977 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:14.517832994 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:14.517960072 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:14.801873922 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:14.818670988 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:14.818768024 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:14.979438066 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:14.979551077 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:15.144542933 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:15.144644976 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:15.320091009 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:15.320172071 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:15.659827948 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:15.659919977 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:16.248747110 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:16.286751986 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:16.508765936 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:16.695856094 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:16.829561949 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:16.829770088 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:16.850667953 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:16.850869894 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:17.036771059 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:17.037010908 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:17.236774921 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:17.240869045 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:17.240966082 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:17.434341908 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:17.576688051 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:17.577020884 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:17.593626976 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:17.593821049 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:17.778036118 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:17.778343916 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:17.934495926 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:17.934581041 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:17.992060900 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:17.992130041 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:18.238351107 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:18.275173903 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:18.276896000 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:18.476483107 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:18.539114952 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:18.543145895 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:18.579191923 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:18.582789898 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:18.809808969 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:18.821428061 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:18.823306084 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:18.889939070 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:18.890178919 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:19.093497038 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:19.172175884 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:19.172979116 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:19.179840088 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:19.402288914 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:19.449942112 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:19.450067043 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:19.520591021 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:19.520699024 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:19.744033098 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:19.744174004 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:19.861303091 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:19.861411095 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:20.082360983 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:20.202233076 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:20.202395916 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:20.410130978 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:20.423319101 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:20.423423052 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:20.655841112 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:20.745184898 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:20.745312929 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:20.752235889 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:20.968401909 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:20.968632936 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:20.995261908 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:20.995446920 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:21.259977102 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:21.375204086 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:21.375427961 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:21.384768963 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:21.601914883 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:21.602022886 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:21.945724010 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:21.945982933 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:22.287269115 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:22.487019062 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:22.487339973 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:22.634260893 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:22.634525061 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:22.974956036 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:22.975157022 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:23.330151081 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:23.514224052 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:23.514609098 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:23.670460939 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:23.670594931 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:24.009282112 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:24.009434938 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:24.544433117 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:24.544534922 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:24.958914995 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:25.089632034 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:25.089724064 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:25.299649954 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:25.299875021 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:25.623878002 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:25.627255917 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:25.837658882 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:25.840104103 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:25.967946053 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:25.968350887 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:26.313570976 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:26.321810961 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:26.655065060 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:26.655396938 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:27.006030083 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:27.201706886 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:27.201884031 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:27.353245974 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:27.353431940 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:27.692933083 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:27.693037987 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:28.023360968 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:28.239629984 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:28.239731073 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:28.369504929 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:28.369637012 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:28.710092068 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:28.780090094 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:28.780842066 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:29.051055908 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:29.052840948 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:29.383466959 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:29.394587994 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:29.747641087 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:29.759196997 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:30.096832037 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:30.128845930 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:30.128959894 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:30.440557957 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:30.440671921 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:30.748900890 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:30.749010086 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:31.071516991 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:31.079585075 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:31.379224062 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:31.379350901 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:31.413311958 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:31.413407087 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:31.767848015 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:31.767977953 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:32.139317989 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:32.340729952 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:32.341176033 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:32.483282089 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:32.483377934 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:32.821826935 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:32.822185040 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:33.181222916 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:33.356108904 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:33.356719017 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:33.523806095 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:33.523943901 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:33.863352060 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:33.863495111 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:34.210743904 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:34.406222105 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:34.406493902 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:34.555608988 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:34.555871010 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:34.841579914 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:34.896617889 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:34.896728992 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:35.182406902 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:35.182514906 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:35.449162960 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:35.477397919 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:35.477473974 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:35.697304964 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:35.726536989 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:35.726639986 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:35.792140007 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:35.792265892 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:36.004735947 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:36.016133070 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:36.016206980 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:36.038314104 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:36.038532019 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:36.049129009 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:36.049210072 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:36.132941008 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:36.133033991 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:36.344118118 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:36.344269991 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:36.379297018 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:36.379379988 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:36.482566118 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:36.482889891 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:36.727674007 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:36.727812052 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:37.019679070 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:37.019933939 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:37.261913061 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:37.262022018 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:37.555244923 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:37.555356026 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:37.805141926 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:37.805313110 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:38.099899054 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:38.100008965 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:38.348861933 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:38.349001884 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:38.638847113 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:38.640820980 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:38.882818937 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:38.883868933 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:39.174881935 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:39.176881075 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:39.428766966 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:39.429018021 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:39.714922905 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:39.715171099 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:39.966037989 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:39.966141939 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:40.253864050 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:40.253973007 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:40.504700899 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:40.504798889 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:40.799932003 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:40.800101995 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:41.058931112 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:41.059425116 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:41.341202021 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:41.341502905 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:41.597026110 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:41.597183943 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:41.879997969 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:41.880357981 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:42.078401089 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:42.078929901 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:42.421895027 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:42.422058105 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:42.768898010 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:42.960983992 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:42.961131096 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:43.110583067 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:43.110712051 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:43.451132059 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:43.452965975 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:43.839171886 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:43.995316029 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:43.995584011 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:44.179395914 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:44.181896925 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:44.522099972 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:44.522245884 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:44.857948065 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:45.059073925 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:45.059171915 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:45.088227987 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:45.088321924 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:45.197743893 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:45.197892904 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:45.427025080 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:45.427535057 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:45.741539955 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:45.741667986 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:45.971060991 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:45.971153021 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:46.286788940 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:46.286890984 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:46.522907019 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:46.527165890 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:46.826828003 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:46.826984882 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:47.066059113 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:47.068839073 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:47.369749069 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:47.369859934 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:47.607156992 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:47.607245922 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:47.910768032 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:47.910893917 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:48.099280119 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:48.099411011 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:48.463861942 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:48.895369053 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:49.431294918 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:49.436225891 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:49.436302900 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:49.634671926 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:49.770772934 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:49.770878077 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:49.976634979 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:49.976763964 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:50.122729063 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:50.122827053 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:50.389537096 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:50.463438988 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:50.463560104 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:50.667315960 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:50.729554892 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:50.729677916 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:50.980950117 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:51.037211895 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:51.037322044 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:51.070199966 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:51.070281982 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:51.111999989 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:51.112092018 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:51.323338985 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:51.323553085 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:51.409977913 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:51.410258055 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:51.647121906 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:51.647217035 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:51.748778105 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:51.748884916 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:51.989022970 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:52.088452101 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:52.088540077 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:52.329463959 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:52.329711914 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:52.538788080 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:52.632646084 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:52.636837006 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:52.862512112 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:52.872351885 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:52.872447968 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:52.880244017 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:52.880793095 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:53.090080023 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:53.178544998 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:53.180896044 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:53.202619076 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:53.204910994 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:53.220031977 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:53.224879026 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:53.435370922 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:53.435491085 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:53.544069052 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:53.544281960 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:53.768248081 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:53.768321991 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:53.884951115 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:53.885165930 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:54.100629091 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:54.126213074 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:54.126343012 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:54.329822063 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:54.427866936 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:54.428410053 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:54.439563990 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:54.439811945 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:54.670387030 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:54.671895027 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:54.671937943 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:54.791574955 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:54.791925907 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:55.002229929 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:55.132325888 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:55.133405924 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:55.341698885 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:55.341928005 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:55.572789907 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:55.678147078 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:55.678378105 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:55.892585039 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:55.892715931 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:55.913609982 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:55.913716078 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:56.112301111 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:56.230247974 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:56.230408907 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:56.254426003 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:56.254564047 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:56.452667952 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:56.452822924 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:56.593255997 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:56.593458891 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:56.811952114 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:56.933031082 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:56.933156967 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:57.132143021 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:57.132246017 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:57.154748917 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:57.154836893 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:57.361978054 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:57.474090099 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:57.474293947 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:57.699785948 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:57.699959993 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:57.701632977 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:57.919826984 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:58.019798994 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:58.019975901 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:58.232167959 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:58.234885931 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:58.259830952 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:58.260035038 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:58.468364000 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:58.565239906 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:58.565395117 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:58.575656891 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:58.575778961 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:58.794724941 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:58.794816971 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:58.808952093 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:58.809041023 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:58.916497946 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:58.916580915 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:59.150569916 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:59.150902987 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:59.359709978 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:59.460633039 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:59.460753918 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:59.671544075 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:59.702805996 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:59.704639912 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:34:59.704926968 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:34:59.929491997 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:00.001827002 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:00.004375935 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:00.012381077 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:00.012823105 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:00.196677923 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:00.252868891 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:00.256617069 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:00.269601107 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:00.272332907 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:00.358222008 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:00.358335972 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:00.548599005 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:00.548718929 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:00.611644983 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:00.611732006 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:00.827341080 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:00.888324976 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:00.888480902 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:01.153897047 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:01.159279108 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:01.159382105 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:01.170106888 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:01.170248985 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:01.402926922 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:01.429316044 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:01.432800055 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:01.494051933 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:01.494184017 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:01.508840084 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:01.739204884 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:01.746129036 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:01.832964897 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:01.834866047 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:02.076524973 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:02.093962908 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:02.094727039 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:02.369259119 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:02.375989914 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:02.376070023 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:02.417648077 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:02.417737007 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:02.634916067 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:02.635016918 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:02.708620071 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:02.708734035 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:02.758424997 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:02.758579016 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:03.037592888 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:03.048309088 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:03.048484087 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:03.296557903 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:03.296717882 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:03.377294064 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:03.380857944 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:03.585434914 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:03.587820053 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:03.722044945 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:03.722894907 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:03.980895042 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:04.068536043 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:04.069034100 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:04.293222904 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:04.322726965 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:04.322818041 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:04.608835936 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:04.608920097 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:04.639482975 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:04.639686108 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:04.829556942 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:04.859757900 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:04.859847069 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:04.979278088 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:04.979528904 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:05.174587965 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:05.174696922 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:05.320214033 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:05.320389032 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:05.660751104 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:05.661043882 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:06.197899103 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:06.365494013 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:06.606451988 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:06.801009893 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:06.909320116 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:06.909435987 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:06.948127031 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:06.948357105 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:07.144685030 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:07.144948006 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:07.288852930 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:07.288983107 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:07.530414104 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:07.632386923 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:07.632496119 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:07.839174032 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:07.871686935 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:07.871808052 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:08.164737940 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:08.164920092 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:08.179418087 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:08.179501057 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:08.404943943 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:08.405034065 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:08.518178940 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:08.518312931 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:08.785917997 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:08.858263016 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:08.858462095 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:09.096081972 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:09.130182028 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:09.130306959 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:09.399238110 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:09.399332047 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:09.435930967 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:09.436038971 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:09.658240080 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:09.668967009 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:09.669096947 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:09.779867887 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:09.780107021 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:09.997980118 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:09.998128891 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:10.122620106 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:10.122751951 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:10.355871916 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:10.463785887 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:10.463917971 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:10.697125912 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:10.697273016 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:10.932687044 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:11.022100925 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:11.022193909 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:11.237410069 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:11.273231030 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:11.273417950 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:11.384026051 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:11.384294033 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:11.582050085 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:11.582330942 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:11.728616953 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:11.728748083 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:12.015712976 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:12.069365025 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:12.069528103 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:12.356518030 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:12.356739044 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:12.609477997 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:12.609652042 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:12.899645090 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:12.900124073 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:13.150532007 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:13.150656939 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:13.441081047 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:13.449297905 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:13.685225010 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:13.685348034 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:13.782054901 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:13.782180071 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:14.086308956 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:14.121330023 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:14.121742964 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:14.426883936 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:14.427191019 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:14.652848959 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:14.653017044 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:14.963660002 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:14.963778973 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:15.190056086 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:15.190500975 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:15.506851912 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:15.507003069 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:15.726972103 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:15.727144957 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:16.001730919 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:16.043975115 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:16.044457912 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:16.273740053 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:16.273936987 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:16.344595909 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:16.344718933 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:16.593914986 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:16.594106913 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:16.688447952 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:16.688590050 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:17.012296915 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:17.029431105 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:17.029649973 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:17.352874041 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:17.352984905 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:17.568351030 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:17.568547964 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:17.887706041 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:17.899945021 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:17.900094986 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:18.110194921 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:18.110341072 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:18.228780985 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:18.228931904 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:18.439894915 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:18.440031052 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:18.569785118 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:18.569931030 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:18.882313013 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:18.913129091 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:18.913266897 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:19.215918064 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:19.223057985 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:19.223212004 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:19.453315020 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:19.453927040 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:19.556936026 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:19.557219028 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:19.762128115 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:19.762325048 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:19.903649092 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:19.903764009 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:20.242434978 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:20.242739916 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:20.584481001 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:20.786567926 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:20.786725044 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:20.930772066 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:20.931016922 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:21.219930887 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:21.220315933 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:21.465061903 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:21.465361118 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:21.762840033 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:21.762984991 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:22.009056091 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:22.009243965 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:22.302104950 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:22.302517891 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:22.556982994 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:22.557148933 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:22.838085890 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:22.838198900 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:23.146646976 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:23.146749973 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:23.382091999 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:23.382292032 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:23.689753056 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:23.689874887 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:23.916941881 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:23.920587063 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:24.207927942 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:24.227581978 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:24.228882074 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:24.458040953 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:24.458494902 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:24.547610998 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:24.548156023 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:24.767604113 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:24.767733097 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:24.889362097 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:24.889621973 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:25.228308916 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:25.228517056 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:25.707138062 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:25.767155886 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:25.767362118 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:26.053333044 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:26.053601027 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:26.306482077 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:26.307028055 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:26.602895975 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:26.603121996 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:26.872972965 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:26.873209000 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:27.152797937 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:27.153044939 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:27.245402098 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:27.245618105 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:27.584791899 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:27.584995985 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:27.909008980 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:28.132584095 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:28.132685900 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:28.248924017 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:28.249229908 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:28.589844942 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:28.590019941 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:28.928396940 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:29.131197929 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:29.131455898 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:29.270319939 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:29.270428896 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:29.604382992 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:29.611414909 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:29.940083027 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:29.944855928 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:30.252937078 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:30.253194094 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:30.283807993 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:30.284212112 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:30.623534918 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:30.623651028 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:31.002175093 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:31.161674976 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:31.161780119 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:31.345099926 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:31.345226049 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:31.681456089 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:31.685590029 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:32.023305893 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:32.024302959 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:32.371612072 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:32.572365046 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:32.572827101 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:32.712698936 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:32.712838888 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:33.052618027 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:33.052748919 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:33.264086962 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:33.264322996 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:33.590764046 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:33.590898037 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:33.799796104 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:33.800017118 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:34.128678083 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:34.131339073 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:34.339888096 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:34.340008974 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:34.469681978 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:34.471659899 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:34.812504053 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:34.814763069 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:35.159137011 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:35.162955999 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:35.497292042 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:35.701102972 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:35.701292992 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:35.837630987 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:35.837873936 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:36.183317900 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:36.183450937 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:36.280884027 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:36.281044006 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:36.620384932 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:36.620517969 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:37.160473108 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:37.160795927 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:37.699875116 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:37.700015068 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:38.242727995 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:38.542810917 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:38.829673052 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:39.082521915 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:39.082735062 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:39.170316935 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:39.170439005 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:39.283921957 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:39.284138918 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:39.510158062 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:39.510296106 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:39.757229090 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:39.832045078 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:39.832170963 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:40.052958965 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:40.053219080 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:40.097904921 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:40.098016977 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:40.347687960 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:40.383944988 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:40.384025097 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:40.438776016 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:40.440875053 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:40.683185101 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:40.689732075 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:40.692866087 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:40.792601109 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:40.795732975 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:41.002923965 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:41.029570103 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:41.031404018 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:41.136063099 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:41.139189005 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:41.342400074 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:41.342964888 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:41.483110905 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:41.483215094 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:41.717358112 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:41.822715044 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:41.822962046 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:42.046051025 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:42.057467937 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:42.057555914 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:42.357687950 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:42.357815027 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:42.392370939 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:42.392467022 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:42.599930048 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:42.603240967 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:42.735157013 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:42.735306978 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:42.956078053 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:43.077229023 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:43.080168962 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:43.299135923 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:43.299320936 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:43.528763056 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:43.617794991 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:43.617921114 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:43.827991009 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:43.838120937 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:43.872832060 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:43.872984886 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:44.136949062 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:44.158843040 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:44.158916950 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:44.174880981 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:44.174969912 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:44.407874107 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:44.407951117 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:44.480556965 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:44.480665922 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:44.515645981 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:44.515770912 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:44.773888111 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:44.819418907 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:44.819557905 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:45.061717033 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:45.061836958 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:45.114239931 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:45.114413023 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:45.339314938 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:45.362096071 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:45.362293959 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:45.457829952 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:45.458005905 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:45.706110001 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:45.706295013 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:45.813827991 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:45.814021111 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:46.105084896 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:46.156579018 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:46.156704903 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:46.448610067 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:46.448932886 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:46.698529959 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:46.699120045 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:46.988538980 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:46.989367008 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:47.241712093 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:47.245296001 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:47.529488087 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:47.529618979 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:47.789522886 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:47.789791107 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:48.068722010 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:48.068856001 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:48.328829050 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:48.329063892 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:48.608598948 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:48.608707905 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:48.869998932 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:48.870251894 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:49.149775028 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:49.149966002 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:49.409023046 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:49.409147024 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:49.653342962 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:49.694608927 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:49.694946051 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:49.893991947 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:49.963640928 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:49.963762045 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:49.994307995 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:49.994609118 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:50.233944893 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:50.233949900 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:50.234013081 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:50.333241940 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:50.334805012 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:50.575442076 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:50.575576067 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:50.868232965 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:50.883971930 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:50.884131908 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:51.127475977 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:51.127594948 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:51.213197947 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:51.213457108 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:51.439254045 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:51.439395905 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:51.553797960 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:51.555269957 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:51.759093046 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:51.897876978 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:51.898930073 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:52.093856096 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:52.106829882 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:52.111193895 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:52.334605932 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:52.434659958 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:52.435163975 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:52.451503992 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:52.454258919 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:52.678626060 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:52.678744078 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:52.795587063 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:52.795726061 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:53.038140059 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:53.136089087 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:53.136326075 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:53.335870981 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:53.382464886 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:53.382695913 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:53.594734907 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:53.676409960 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:53.676954031 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:53.721927881 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:53.723628044 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:53.935962915 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:53.936934948 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:54.069514990 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:54.069650888 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:54.289509058 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:54.410172939 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:54.410315990 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:54.629501104 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:54.629648924 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:54.849595070 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:54.954415083 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:54.954571962 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:55.152611017 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:55.174911022 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:55.175050974 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:55.202828884 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:55.202941895 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:55.403367043 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:55.499484062 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:55.499664068 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:55.514204979 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:55.514391899 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:55.690284967 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:55.743556023 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:55.743777990 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:55.841887951 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:55.841984034 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:56.029422998 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:56.029653072 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:56.084208965 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:56.084302902 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:56.261368036 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:56.375094891 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:56.375205040 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:56.548331976 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:56.601356983 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:56.602981091 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:56.715814114 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:56.719027042 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:56.884660959 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:56.888098001 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:57.059562922 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:57.063369036 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:57.225830078 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:57.225999117 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:57.229001999 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:57.342331886 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:57.342529058 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:57.565534115 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:57.565665960 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:57.567456961 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:57.794186115 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:57.879992008 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:57.880213022 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:58.095206976 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:58.110542059 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:58.110656023 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:58.134896994 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:58.135010004 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:58.343672991 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:58.429349899 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:58.429481983 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:58.436398983 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:58.436499119 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:58.476553917 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:58.476819992 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:58.685590029 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:58.685744047 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:58.775058031 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:58.775149107 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:59.017457008 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:59.017652988 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:59.120976925 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:59.121087074 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:59.397651911 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:59.459788084 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:59.459924936 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:59.693032026 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:59.739696980 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:59.740917921 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:35:59.995541096 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:35:59.996264935 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:00.036823988 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:00.040895939 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:00.223007917 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:00.275964022 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:00.276896000 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:00.335475922 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:00.336905956 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:00.563884974 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:00.564002991 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:00.617465019 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:00.617613077 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:00.873447895 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:00.876799107 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:00.958321095 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:00.958442926 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:01.215162992 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:01.215250015 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:01.545304060 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:01.545412064 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:01.756418943 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:01.758910894 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:01.948738098 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:02.076561928 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:02.076684952 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:02.267628908 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:02.289531946 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:02.293037891 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:02.417083025 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:02.418979883 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:02.610332012 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:02.610431910 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:02.758147001 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:02.758332968 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:02.927768946 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:03.099631071 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:03.099747896 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:03.267995119 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:03.268167973 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:03.372886896 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:03.373008966 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:03.570080996 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:03.608776093 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:03.608901024 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:03.826659918 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:03.911017895 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:03.912046909 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:03.950638056 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:03.950920105 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:04.166826963 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:04.171155930 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:04.296237946 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:04.711811066 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:06.379605055 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:06.428426027 CEST4974010000192.168.2.441.248.119.194
                                    Apr 15, 2024 00:36:06.854738951 CEST100004974041.248.119.194192.168.2.4
                                    Apr 15, 2024 00:36:06.897175074 CEST4974010000192.168.2.441.248.119.194
                                    TimestampSource PortDest PortSource IPDest IP
                                    Apr 15, 2024 00:32:19.684657097 CEST5845153192.168.2.41.1.1.1
                                    Apr 15, 2024 00:32:19.875444889 CEST53584511.1.1.1192.168.2.4
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Apr 15, 2024 00:32:19.684657097 CEST192.168.2.41.1.1.10x71a6Standard query (0)doddyfire.linkpc.netA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Apr 15, 2024 00:32:19.875444889 CEST1.1.1.1192.168.2.40x71a6No error (0)doddyfire.linkpc.net41.248.119.194A (IP address)IN (0x0001)false

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:00:31:55
                                    Start date:15/04/2024
                                    Path:C:\Users\user\Desktop\SjMIbKjuDL.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\SjMIbKjuDL.exe"
                                    Imagebase:0xa0000
                                    File size:111'104 bytes
                                    MD5 hash:21D48723FD950D9B624103EE4DD625F8
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:2
                                    Start time:00:32:05
                                    Start date:15/04/2024
                                    Path:C:\Users\user\AppData\Roaming\confuse\chargeable.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
                                    Imagebase:0xea0000
                                    File size:111'168 bytes
                                    MD5 hash:8333797879EB8B484866624323C08DE3
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000002.00000002.1791120819.0000000003661000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000002.00000002.1791120819.0000000003661000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: njrat1, Description: Identify njRat, Source: 00000002.00000002.1791120819.0000000003661000.00000004.00000800.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                    • Rule: Njrat, Description: detect njRAT in memory, Source: 00000002.00000002.1791120819.0000000003661000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    Reputation:low
                                    Has exited:true

                                    Target ID:3
                                    Start time:00:32:08
                                    Start date:15/04/2024
                                    Path:C:\Users\user\AppData\Roaming\confuse\chargeable.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\AppData\Roaming\confuse\chargeable.exe
                                    Imagebase:0xd10000
                                    File size:111'168 bytes
                                    MD5 hash:8333797879EB8B484866624323C08DE3
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000003.00000002.4134329459.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:false

                                    Target ID:4
                                    Start time:00:32:11
                                    Start date:15/04/2024
                                    Path:C:\Users\user\AppData\Roaming\confuse\chargeable.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
                                    Imagebase:0x8d0000
                                    File size:111'168 bytes
                                    MD5 hash:8333797879EB8B484866624323C08DE3
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:6
                                    Start time:00:32:15
                                    Start date:15/04/2024
                                    Path:C:\Users\user\AppData\Roaming\confuse\chargeable.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\AppData\Roaming\confuse\chargeable.exe
                                    Imagebase:0xe20000
                                    File size:111'168 bytes
                                    MD5 hash:8333797879EB8B484866624323C08DE3
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000006.00000002.1907772846.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000006.00000002.1907772846.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: njrat1, Description: Identify njRat, Source: 00000006.00000002.1907772846.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                    • Rule: Njrat, Description: detect njRAT in memory, Source: 00000006.00000002.1907772846.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:low
                                    Has exited:true

                                    Target ID:7
                                    Start time:00:32:15
                                    Start date:15/04/2024
                                    Path:C:\Windows\SysWOW64\netsh.exe
                                    Wow64 process (32bit):true
                                    Commandline:netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
                                    Imagebase:0x1560000
                                    File size:82'432 bytes
                                    MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    Target ID:8
                                    Start time:00:32:15
                                    Start date:15/04/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6ec4b0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:11
                                    Start time:00:32:20
                                    Start date:15/04/2024
                                    Path:C:\Users\user\Desktop\SjMIbKjuDL.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\SjMIbKjuDL.exe"
                                    Imagebase:0x620000
                                    File size:111'104 bytes
                                    MD5 hash:21D48723FD950D9B624103EE4DD625F8
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:12
                                    Start time:00:32:30
                                    Start date:15/04/2024
                                    Path:C:\Users\user\AppData\Roaming\confuse\chargeable.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
                                    Imagebase:0xaf0000
                                    File size:111'168 bytes
                                    MD5 hash:8333797879EB8B484866624323C08DE3
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 0000000C.00000002.2045369556.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 0000000C.00000002.2045369556.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: njrat1, Description: Identify njRat, Source: 0000000C.00000002.2045369556.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                                    • Rule: Njrat, Description: detect njRAT in memory, Source: 0000000C.00000002.2045369556.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:low
                                    Has exited:true

                                    Target ID:13
                                    Start time:00:32:33
                                    Start date:15/04/2024
                                    Path:C:\Users\user\AppData\Roaming\confuse\chargeable.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\AppData\Roaming\confuse\chargeable.exe
                                    Imagebase:0x9c0000
                                    File size:111'168 bytes
                                    MD5 hash:8333797879EB8B484866624323C08DE3
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:14
                                    Start time:00:32:38
                                    Start date:15/04/2024
                                    Path:C:\Users\user\Desktop\SjMIbKjuDL.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\SjMIbKjuDL.exe"
                                    Imagebase:0x180000
                                    File size:111'104 bytes
                                    MD5 hash:21D48723FD950D9B624103EE4DD625F8
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:19.4%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:90
                                      Total number of Limit Nodes:3
                                      execution_graph 6705 49b0eda 6706 49b0f0f WriteFile 6705->6706 6708 49b0f41 6706->6708 6803 69a42a 6804 69a44e SetErrorMode 6803->6804 6806 69a48f 6804->6806 6807 69b42d 6808 69b45e LoadLibraryShim 6807->6808 6810 69b4b8 6808->6810 6709 49b135e 6710 49b13be 6709->6710 6711 49b1393 PostMessageW 6709->6711 6710->6711 6712 49b13a8 6711->6712 6847 69a2ac 6848 69a2d0 CreateActCtxA 6847->6848 6850 69a354 6848->6850 6713 69a622 6714 69a698 6713->6714 6715 69a660 DuplicateHandle 6713->6715 6714->6715 6716 69a66e 6715->6716 6811 69ac22 6812 69ac52 RegOpenKeyExW 6811->6812 6814 69ace0 6812->6814 6827 49b0d17 6828 49b0d4a GetFileType 6827->6828 6830 49b0dac 6828->6830 6831 69a5fb 6832 69a622 DuplicateHandle 6831->6832 6834 69a66e 6832->6834 6783 49b0f83 6785 49b0fbe RegSetValueExW 6783->6785 6786 49b103f 6785->6786 6721 69baf2 6722 69bb18 LoadLibraryW 6721->6722 6724 69bb34 6722->6724 6835 49b0007 6836 49b0032 VerLanguageNameW 6835->6836 6838 49b0090 6836->6838 6729 49b0ac6 6731 49b0aec CreateDirectoryW 6729->6731 6732 49b0b13 6731->6732 6733 49b1206 6735 49b122c ShellExecuteExW 6733->6735 6736 49b1248 6735->6736 6737 49b0b86 6738 49b0bbe CreateFileW 6737->6738 6740 49b0c0d 6738->6740 6851 69bab4 6853 69baf2 LoadLibraryW 6851->6853 6854 69bb34 6853->6854 6787 49b0eba 6789 49b0eda WriteFile 6787->6789 6790 49b0f41 6789->6790 6791 69bc4b 6794 69bc82 GetFileVersionInfoSizeW 6791->6794 6793 69bcc7 6794->6793 6855 49b1078 6858 49b10a6 SetFileAttributesW 6855->6858 6857 49b10eb 6858->6857 6748 69a44e 6749 69a47a SetErrorMode 6748->6749 6750 69a4a3 6748->6750 6751 69a48f 6749->6751 6750->6749 6752 49b0032 6753 49b0082 VerLanguageNameW 6752->6753 6754 49b0090 6753->6754 6839 49b0431 6841 49b0462 DrawTextExW 6839->6841 6842 49b04bb 6841->6842 6815 69ad19 6816 69ad5a RegQueryValueExW 6815->6816 6818 69ade3 6816->6818 6819 69bd10 6822 69bd32 GetFileVersionInfoW 6819->6822 6821 69bd84 6822->6821 6859 49b0b60 6861 49b0b86 CreateFileW 6859->6861 6862 49b0c0d 6861->6862 6775 49b10a6 6778 49b10cf SetFileAttributesW 6775->6778 6777 49b10eb 6778->6777 6843 49b1325 6844 49b135e PostMessageW 6843->6844 6846 49b13a8 6844->6846 6799 49b0aa4 6801 49b0ac6 CreateDirectoryW 6799->6801 6802 49b0b13 6801->6802 6823 49b11e4 6825 49b1206 ShellExecuteExW 6823->6825 6826 49b1248 6825->6826

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 d500d0-d51855 479 d5185c-d52b7b 0->479 671 d52b82-d58c8d 479->671 1671 d58c94-d58c9c 671->1671 1672 d58ca4-d597f0 1671->1672 1923 d597f7 1672->1923 1924 d597fe-d59804 1923->1924
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1756748956.0000000000D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d50000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fb589419fe25ba85df21f219cf6fb3d90cb39369aaa0abee37355cf547a1e282
                                      • Instruction ID: b5d66a21a233bd0b318beb42f3f6990a7e01fff06cc176177cf7daa800ec9100
                                      • Opcode Fuzzy Hash: fb589419fe25ba85df21f219cf6fb3d90cb39369aaa0abee37355cf547a1e282
                                      • Instruction Fuzzy Hash: 0B143834601704DFDB65DB30C854A9AB3B2FF89304F6188A9D55A6B3A0DF35AE86CF41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1925 d500e0-d51855 2404 d5185c-d52b7b 1925->2404 2596 d52b82-d58c8d 2404->2596 3596 d58c94-d58c9c 2596->3596 3597 d58ca4-d597f0 3596->3597 3848 d597f7 3597->3848 3849 d597fe-d59804 3848->3849
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1756748956.0000000000D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d50000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b6bdb3080eff23f5207adb4941b87e7e26ed3821d0554316cadc3b0affff3952
                                      • Instruction ID: fbe820502bbac571c4f0456d6c011ada1c9b6ff4b9f0e859ae502fec4e67525c
                                      • Opcode Fuzzy Hash: b6bdb3080eff23f5207adb4941b87e7e26ed3821d0554316cadc3b0affff3952
                                      • Instruction Fuzzy Hash: 0E143834601704DFDB65DB30C854A9AB3B2FF89304F6188A9D55A6B3A0DF35AE86CF41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 3850 d598a0-d5b2cd 4365 d5b2d4-d5c61c 3850->4365
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1756748956.0000000000D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d50000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 23931eb2cc1c3406016f229f6e349718b3624681cbf2bd0c6813dd2f0500c854
                                      • Instruction ID: ae0d2be3f5228dc635fbee9df65d627282b89d689bda0c5e7f5fcb815b086ef0
                                      • Opcode Fuzzy Hash: 23931eb2cc1c3406016f229f6e349718b3624681cbf2bd0c6813dd2f0500c854
                                      • Instruction Fuzzy Hash: 1933A6343249108B8705BB21D554D9E7BB6B7C865C3288385DA1257B88DF3EEF4B8BC9
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4746 69ac22-69acad 4750 69acaf 4746->4750 4751 69acb2-69acc9 4746->4751 4750->4751 4753 69ad0b-69ad10 4751->4753 4754 69accb-69acde RegOpenKeyExW 4751->4754 4753->4754 4755 69ace0-69ad08 4754->4755 4756 69ad12-69ad17 4754->4756 4756->4755
                                      APIs
                                      • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 0069ACD1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1755249007.000000000069A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_69a000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: Open
                                      • String ID:
                                      • API String ID: 71445658-0
                                      • Opcode ID: 9353bf621ce6dfe4127b889015d806a1f2147adb20f5d240cb2ef1bb3cfe3ba2
                                      • Instruction ID: a9443c96af1437a0b831ebf362339947957392c2eec4c33559d44c992d6aaa8f
                                      • Opcode Fuzzy Hash: 9353bf621ce6dfe4127b889015d806a1f2147adb20f5d240cb2ef1bb3cfe3ba2
                                      • Instruction Fuzzy Hash: 8131C471508380AFE7228B51CC45FA7BFFCEF06310F08849AE9848B652D264E94DCBB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4761 49b0b60-49b0bde 4765 49b0be3-49b0bef 4761->4765 4766 49b0be0 4761->4766 4767 49b0bf1 4765->4767 4768 49b0bf4-49b0bfd 4765->4768 4766->4765 4767->4768 4769 49b0bff-49b0c23 CreateFileW 4768->4769 4770 49b0c4e-49b0c53 4768->4770 4773 49b0c55-49b0c5a 4769->4773 4774 49b0c25-49b0c4b 4769->4774 4770->4769 4773->4774
                                      APIs
                                      • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 049B0C05
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: CreateFile
                                      • String ID:
                                      • API String ID: 823142352-0
                                      • Opcode ID: 1d30328f194673adda72c7830a34c65305aaa3aed22075045856dba620497bd1
                                      • Instruction ID: 812ce249470fe90d89fb49be263dbd226d63959050b8439b1d9e48e58481cd4f
                                      • Opcode Fuzzy Hash: 1d30328f194673adda72c7830a34c65305aaa3aed22075045856dba620497bd1
                                      • Instruction Fuzzy Hash: 8B31B0715053406FE722CF65CD44FA6BFE8EF05224F0884AEE9858B652D365E909CB71
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4777 69ad19-69ad97 4780 69ad99 4777->4780 4781 69ad9c-69ada5 4777->4781 4780->4781 4782 69adaa-69adb0 4781->4782 4783 69ada7 4781->4783 4784 69adb2 4782->4784 4785 69adb5-69adcc 4782->4785 4783->4782 4784->4785 4787 69adce-69ade1 RegQueryValueExW 4785->4787 4788 69ae03-69ae08 4785->4788 4789 69ae0a-69ae0f 4787->4789 4790 69ade3-69ae00 4787->4790 4788->4787 4789->4790
                                      APIs
                                      • RegQueryValueExW.KERNELBASE(?,00000E24,0A771243,00000000,00000000,00000000,00000000), ref: 0069ADD4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1755249007.000000000069A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_69a000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: QueryValue
                                      • String ID:
                                      • API String ID: 3660427363-0
                                      • Opcode ID: 29c287b3b34000683923268d403ada4898221d7575b7dd9532407b7ae91dec84
                                      • Instruction ID: 75f5c80b106b56d23f856370681d8a5e6d72b74c7a1c78cc3f99fa57f439e284
                                      • Opcode Fuzzy Hash: 29c287b3b34000683923268d403ada4898221d7575b7dd9532407b7ae91dec84
                                      • Instruction Fuzzy Hash: 3031AF725093805FDB22CB61CC44FA2BFFCEF06310F08849AE9458B652D360E94CCBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4794 49b0f83-49b0ffb 4797 49b0ffd 4794->4797 4798 49b1000-49b100c 4794->4798 4797->4798 4799 49b100e 4798->4799 4800 49b1011-49b1028 4798->4800 4799->4800 4802 49b102a-49b103d RegSetValueExW 4800->4802 4803 49b105f-49b1064 4800->4803 4804 49b103f-49b105c 4802->4804 4805 49b1066-49b106b 4802->4805 4803->4802 4805->4804
                                      APIs
                                      • RegSetValueExW.KERNELBASE(?,00000E24,0A771243,00000000,00000000,00000000,00000000), ref: 049B1030
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: Value
                                      • String ID:
                                      • API String ID: 3702945584-0
                                      • Opcode ID: 2397ca44c6036adf3002f24df0d6505f6fe60e627b40e7bc03282920d02e6adf
                                      • Instruction ID: 6acda4e416a4f622d618a246b7697ec4d3d1c2b259d8a7f597e49c325240bcac
                                      • Opcode Fuzzy Hash: 2397ca44c6036adf3002f24df0d6505f6fe60e627b40e7bc03282920d02e6adf
                                      • Instruction Fuzzy Hash: 4A21C1B15087806FE7228B15DC45BA3BFB8AF06314F08849AE9848B693D324E908C7B1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4809 69a2ac-69a2f3 4811 69a2f6-69a34e CreateActCtxA 4809->4811 4813 69a354-69a36a 4811->4813
                                      APIs
                                      • CreateActCtxA.KERNEL32(?,00000E24,?,?), ref: 0069A346
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1755249007.000000000069A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_69a000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 88c1edfda2522a785d433721f062ac83492d6b26006212e886c8458a6ac4b769
                                      • Instruction ID: 2637b518a0ea2f61b4d146cafa075705f265dbfa83f5c5ced9bf739d24c8671b
                                      • Opcode Fuzzy Hash: 88c1edfda2522a785d433721f062ac83492d6b26006212e886c8458a6ac4b769
                                      • Instruction Fuzzy Hash: AF21F57150D3C06FD3138B258C51B62BFB8EF87620F0941CBE884CB693D225A919C7B2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4814 49b0b86-49b0bde 4817 49b0be3-49b0bef 4814->4817 4818 49b0be0 4814->4818 4819 49b0bf1 4817->4819 4820 49b0bf4-49b0bfd 4817->4820 4818->4817 4819->4820 4821 49b0bff-49b0c07 CreateFileW 4820->4821 4822 49b0c4e-49b0c53 4820->4822 4824 49b0c0d-49b0c23 4821->4824 4822->4821 4825 49b0c55-49b0c5a 4824->4825 4826 49b0c25-49b0c4b 4824->4826 4825->4826
                                      APIs
                                      • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 049B0C05
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: CreateFile
                                      • String ID:
                                      • API String ID: 823142352-0
                                      • Opcode ID: 53a5acb191350810a587c2e18594f5ea8fd0f58ec9e5557f55ff0edc333f33b6
                                      • Instruction ID: 6f4bd2092b221f876f1e5cfa09629db9270f3bf8e69a8951984c9465aaa8ca4b
                                      • Opcode Fuzzy Hash: 53a5acb191350810a587c2e18594f5ea8fd0f58ec9e5557f55ff0edc333f33b6
                                      • Instruction Fuzzy Hash: 02219271604200AFEB21CF65CD45BA7FBE8EF04714F088869E9858B651D375F548CBB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4829 69ac52-69acad 4832 69acaf 4829->4832 4833 69acb2-69acc9 4829->4833 4832->4833 4835 69ad0b-69ad10 4833->4835 4836 69accb-69acde RegOpenKeyExW 4833->4836 4835->4836 4837 69ace0-69ad08 4836->4837 4838 69ad12-69ad17 4836->4838 4838->4837
                                      APIs
                                      • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 0069ACD1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1755249007.000000000069A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_69a000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: Open
                                      • String ID:
                                      • API String ID: 71445658-0
                                      • Opcode ID: 3e2adb8b87f03f91194141415c2b031b77fa6a90bc1b798e763353b7a96d4b09
                                      • Instruction ID: 749401f7f4575e48797b4e300a448fd9e65e9c5f4242d34e60814530364f0539
                                      • Opcode Fuzzy Hash: 3e2adb8b87f03f91194141415c2b031b77fa6a90bc1b798e763353b7a96d4b09
                                      • Instruction Fuzzy Hash: 6B21CD72504204AFEB209F91DD85FABFBECEF14324F14845AE9458BA51D324E94C8AB2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4843 49b0d17-49b0d95 4847 49b0dca-49b0dcf 4843->4847 4848 49b0d97-49b0daa GetFileType 4843->4848 4847->4848 4849 49b0dac-49b0dc9 4848->4849 4850 49b0dd1-49b0dd6 4848->4850 4850->4849
                                      APIs
                                      • GetFileType.KERNELBASE(?,00000E24,0A771243,00000000,00000000,00000000,00000000), ref: 049B0D9D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: FileType
                                      • String ID:
                                      • API String ID: 3081899298-0
                                      • Opcode ID: 0ebc099d0d1c21fa0e8035a64ce0bddace44330ff3a6e93d14e7cd8d1a6ac7fd
                                      • Instruction ID: 5b29880b4c334cf80fbd7fb087bff2aecdb6b20ae94be96de11b411b74914193
                                      • Opcode Fuzzy Hash: 0ebc099d0d1c21fa0e8035a64ce0bddace44330ff3a6e93d14e7cd8d1a6ac7fd
                                      • Instruction Fuzzy Hash: E121D5B54093806FE7128B55DC41BE2BFBCEF47724F0880DAE9848B693D264A90DC7B1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4854 49b0431-49b0486 4856 49b048b-49b049a 4854->4856 4857 49b0488 4854->4857 4858 49b049f-49b04ab 4856->4858 4859 49b049c 4856->4859 4857->4856 4860 49b04ad-49b04b5 DrawTextExW 4858->4860 4861 49b04e5-49b04ea 4858->4861 4859->4858 4862 49b04bb-49b04cd 4860->4862 4861->4860 4864 49b04cf-49b04e2 4862->4864 4865 49b04ec-49b04f1 4862->4865 4865->4864
                                      APIs
                                      • DrawTextExW.USER32(?,?,?,?,?,?), ref: 049B04B3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: DrawText
                                      • String ID:
                                      • API String ID: 2175133113-0
                                      • Opcode ID: 49a7213346c73cb4c7cf0a4180c60942deb1f6f2e871e4a8095016a62fdadbbc
                                      • Instruction ID: 9d8573651ab30538578e7f7a459fea0d9216e1405190826fa9f6683360ada534
                                      • Opcode Fuzzy Hash: 49a7213346c73cb4c7cf0a4180c60942deb1f6f2e871e4a8095016a62fdadbbc
                                      • Instruction Fuzzy Hash: 242192716087809FDB22CF65DD45B62BFF8EF06310F0884AAE9858F563D275E908CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4867 49b0eba-49b0f31 4871 49b0f33-49b0f53 WriteFile 4867->4871 4872 49b0f75-49b0f7a 4867->4872 4875 49b0f7c-49b0f81 4871->4875 4876 49b0f55-49b0f72 4871->4876 4872->4871 4875->4876
                                      APIs
                                      • WriteFile.KERNELBASE(?,00000E24,0A771243,00000000,00000000,00000000,00000000), ref: 049B0F39
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: FileWrite
                                      • String ID:
                                      • API String ID: 3934441357-0
                                      • Opcode ID: 2a960b027a45b2e7c95f87e13654b30225f819d2c42b3bfac22ca182b0957c0e
                                      • Instruction ID: 677270af0998ba1423bc9368f7421aba26ac957697a0014efee08bbe1ffc3be5
                                      • Opcode Fuzzy Hash: 2a960b027a45b2e7c95f87e13654b30225f819d2c42b3bfac22ca182b0957c0e
                                      • Instruction Fuzzy Hash: 9F219F71509380AFDB22CF51DD44FA7FFB8EF45620F08849AE9849B552D364A908CBB2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4879 69ad5a-69ad97 4881 69ad99 4879->4881 4882 69ad9c-69ada5 4879->4882 4881->4882 4883 69adaa-69adb0 4882->4883 4884 69ada7 4882->4884 4885 69adb2 4883->4885 4886 69adb5-69adcc 4883->4886 4884->4883 4885->4886 4888 69adce-69ade1 RegQueryValueExW 4886->4888 4889 69ae03-69ae08 4886->4889 4890 69ae0a-69ae0f 4888->4890 4891 69ade3-69ae00 4888->4891 4889->4888 4890->4891
                                      APIs
                                      • RegQueryValueExW.KERNELBASE(?,00000E24,0A771243,00000000,00000000,00000000,00000000), ref: 0069ADD4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1755249007.000000000069A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_69a000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: QueryValue
                                      • String ID:
                                      • API String ID: 3660427363-0
                                      • Opcode ID: c507a99809d8e3e063d785a194d5ecc9acfff2a4c4c189ae872618d2116b7c20
                                      • Instruction ID: e46ff62e1bf8d6bcb215ba9a1fe536e77107bd64f1c83d6e75fb92b8e4d13a22
                                      • Opcode Fuzzy Hash: c507a99809d8e3e063d785a194d5ecc9acfff2a4c4c189ae872618d2116b7c20
                                      • Instruction Fuzzy Hash: B421AE75604200AFEB21CE55CC80FA6F7ECEF04710F08845AE9058BB51D760E948CAB2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4895 69bab4-69bb16 4897 69bb18 4895->4897 4898 69bb1b-69bb24 4895->4898 4897->4898 4899 69bb5c-69bb61 4898->4899 4900 69bb26-69bb46 LoadLibraryW 4898->4900 4899->4900 4903 69bb48-69bb5b 4900->4903 4904 69bb63-69bb68 4900->4904 4904->4903
                                      APIs
                                      • LoadLibraryW.KERNELBASE(?), ref: 0069BB2C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1755249007.000000000069A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_69a000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: c7f05e6c53bc2f7e9b42173d66cf9f41a29e365588bac37f714e721d6fcc9d61
                                      • Instruction ID: 8fd762881c7f6c8f42f6a9ebaec34743b09a5a9de82ec0e9b0006df896527b3e
                                      • Opcode Fuzzy Hash: c7f05e6c53bc2f7e9b42173d66cf9f41a29e365588bac37f714e721d6fcc9d61
                                      • Instruction Fuzzy Hash: 30215E715093C05FDB128B25DD95792BFB8EF07314F0D84DAED848F6A7D2649908CB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryShim.MSCOREE(?,?,?,?), ref: 0069B4A9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1755249007.000000000069A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_69a000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: LibraryLoadShim
                                      • String ID:
                                      • API String ID: 1475914169-0
                                      • Opcode ID: 921272c7d676bf73240411d3207b04208f130cac096e78cc75dc83e44ba74fb1
                                      • Instruction ID: 62a118444529092d62b762e6d682205737a08a8a0ef78aaba6ae1381189886bd
                                      • Opcode Fuzzy Hash: 921272c7d676bf73240411d3207b04208f130cac096e78cc75dc83e44ba74fb1
                                      • Instruction Fuzzy Hash: 502190B15093805FDB228E15ED45B62BFF8EF46714F08809AED84CB693D365E908DB72
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • RegSetValueExW.KERNELBASE(?,00000E24,0A771243,00000000,00000000,00000000,00000000), ref: 049B1030
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: Value
                                      • String ID:
                                      • API String ID: 3702945584-0
                                      • Opcode ID: e858d6937b2c4583f01f973ff2053b76644660dcfd8b78f9fd6ea7c38107d7c5
                                      • Instruction ID: 5d572c2c18ee2bb781136eebf33005f9bff107d64606b4a9e4763d9a5e31af0e
                                      • Opcode Fuzzy Hash: e858d6937b2c4583f01f973ff2053b76644660dcfd8b78f9fd6ea7c38107d7c5
                                      • Instruction Fuzzy Hash: 0B11D372600640AFE7208F11DD41FA7F7ECEF04750F08846AED458B652D774F5488AB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SetFileAttributesW.KERNELBASE(?,?), ref: 049B10E3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: AttributesFile
                                      • String ID:
                                      • API String ID: 3188754299-0
                                      • Opcode ID: d77dd1258c49fc8d3435669513f541caecc90e748328d619d035b5f3106bffb2
                                      • Instruction ID: 87d5e1eb02856a741ff2513f1b9c7cc1e649a2e64573fd0e254618642f93b864
                                      • Opcode Fuzzy Hash: d77dd1258c49fc8d3435669513f541caecc90e748328d619d035b5f3106bffb2
                                      • Instruction Fuzzy Hash: 3F21C0716083C09FDB118F25DC55BA2BFA8EF46220F0884EAED84CB262D235E905CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetFileVersionInfoSizeW.KERNELBASE(?,?), ref: 0069BCBF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1755249007.000000000069A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_69a000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: FileInfoSizeVersion
                                      • String ID:
                                      • API String ID: 1661704012-0
                                      • Opcode ID: 84217ef145c3212136e81552c1093013ac14c5275b6c736572cd76999f4d3a64
                                      • Instruction ID: b1a5d319781817aa1d093a18fa7a93e189c09c4bea8e42f21e3b937ac1267519
                                      • Opcode Fuzzy Hash: 84217ef145c3212136e81552c1093013ac14c5275b6c736572cd76999f4d3a64
                                      • Instruction Fuzzy Hash: 4E2190B19093809FDB12CF25DC45B52BFB8EF46310F0984DAED848F263E274A909CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • CreateDirectoryW.KERNELBASE(?,?), ref: 049B0B0B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: CreateDirectory
                                      • String ID:
                                      • API String ID: 4241100979-0
                                      • Opcode ID: a600d9bcf88cd0310b8d141d9a4bf1f0c00f0509af2b5a6bb222f7b3d5298556
                                      • Instruction ID: 68d7aa4d4a1b5d1cf4a0d63a94986165713f105f0c83e6301e301bf53c83c49a
                                      • Opcode Fuzzy Hash: a600d9bcf88cd0310b8d141d9a4bf1f0c00f0509af2b5a6bb222f7b3d5298556
                                      • Instruction Fuzzy Hash: AD1172716043809FDB11CF65DD85B97BFE8EF46310F0884AAED85CB652D274E904CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • PostMessageW.USER32(?,?,?,?), ref: 049B1399
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: 4dfef9d27d1855676b79712c4d349966aeb0de22c8ec24d3e627a687de505161
                                      • Instruction ID: 16ad302f1eb9c6f0e75ca09e24700752ad29e551e1b22bc8041829259d7f09e9
                                      • Opcode Fuzzy Hash: 4dfef9d27d1855676b79712c4d349966aeb0de22c8ec24d3e627a687de505161
                                      • Instruction Fuzzy Hash: 63219D715093C09FDB238F25DC45A92BFB4EF07210F0985DAE9C48F563D265A918DB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0069A666
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1755249007.000000000069A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_69a000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: af79891c873fc650dca17c210ddeb94dcd66a334407eadb852c10671507cea0a
                                      • Instruction ID: 4d1596cbb435418512d3ffe70d25269f739f1c50ae18b2735592dd3bdffe0b74
                                      • Opcode Fuzzy Hash: af79891c873fc650dca17c210ddeb94dcd66a334407eadb852c10671507cea0a
                                      • Instruction Fuzzy Hash: E6110671408380AFDB228F50DC44B62FFF8EF4A310F0888DAED848B562D235A918DB71
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • VerLanguageNameW.KERNELBASE(?,00000E24,?,?), ref: 049B0082
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: LanguageName
                                      • String ID:
                                      • API String ID: 2060303382-0
                                      • Opcode ID: d9547485d87462e80adc4b5c3b181cef0d2521f79c92a2285ab4e9d92fecde00
                                      • Instruction ID: 07f1a731d0bc22d32ebdf08ae288638fef42e1ebc44cf79e53ee1b6428c1d3df
                                      • Opcode Fuzzy Hash: d9547485d87462e80adc4b5c3b181cef0d2521f79c92a2285ab4e9d92fecde00
                                      • Instruction Fuzzy Hash: 0E11E6B15093806FC311CB25CC45F26FFB8EF86620F08819FE844CB693D225B919CBA6
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • WriteFile.KERNELBASE(?,00000E24,0A771243,00000000,00000000,00000000,00000000), ref: 049B0F39
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: FileWrite
                                      • String ID:
                                      • API String ID: 3934441357-0
                                      • Opcode ID: 5f8faf56e0d67b112cbf2961bbfd665946a3e5afb8d3f4157e91d3fd279d5c29
                                      • Instruction ID: d6b464fad7dec523bd113869a5da78deddbe0af6191682709d3f18b89f356bfd
                                      • Opcode Fuzzy Hash: 5f8faf56e0d67b112cbf2961bbfd665946a3e5afb8d3f4157e91d3fd279d5c29
                                      • Instruction Fuzzy Hash: 4711C471604200AFEB21CF51DD44FA7FBE8EF44724F04C46AE9458B651D374A548CBB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • ShellExecuteExW.SHELL32(?), ref: 049B1240
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: ExecuteShell
                                      • String ID:
                                      • API String ID: 587946157-0
                                      • Opcode ID: 318725aa64c28b5a9bc78c2eebd75e44130ca7274902b71d1f590853852832bf
                                      • Instruction ID: f1817ec74db4bbd3d939690ef0fbdea2eca4cab3b99a7c41b931b7e77e352bba
                                      • Opcode Fuzzy Hash: 318725aa64c28b5a9bc78c2eebd75e44130ca7274902b71d1f590853852832bf
                                      • Instruction Fuzzy Hash: 5E11D3715083809FDB11CF25DC55B52BFB89F06220F0880EBED84CB652D264E908CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetFileVersionInfoW.KERNELBASE(?,?,?,?), ref: 0069BD75
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1755249007.000000000069A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_69a000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: FileInfoVersion
                                      • String ID:
                                      • API String ID: 2427832333-0
                                      • Opcode ID: 82ede1f4000a2a76fbb6bc0af29212498006324f9dcffaaf93ccf610b5f81fe9
                                      • Instruction ID: bafed43d30be8a3ef9692a13154cc0f5cafd80bdc26adb384916e289ada068c0
                                      • Opcode Fuzzy Hash: 82ede1f4000a2a76fbb6bc0af29212498006324f9dcffaaf93ccf610b5f81fe9
                                      • Instruction Fuzzy Hash: 141194B1504380AFDB218F15DC45B66FFF8EF56724F08809EED858B662D261E918CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • PostMessageW.USER32(?,?,?,?), ref: 049B1721
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: c7a7ed6f09f74e0ebae4cd1331b6801b2d48a999005cadb7244a5751f763d7e6
                                      • Instruction ID: e9fc1aaa722c785cbf995ebd84d1f9dddb2e0578591a67f5522ffe9f66045032
                                      • Opcode Fuzzy Hash: c7a7ed6f09f74e0ebae4cd1331b6801b2d48a999005cadb7244a5751f763d7e6
                                      • Instruction Fuzzy Hash: 0B11E271548380AFDB228F15DC45B52FFB4EF46320F0884EEED858B563C275A918CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetFileType.KERNELBASE(?,00000E24,0A771243,00000000,00000000,00000000,00000000), ref: 049B0D9D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: FileType
                                      • String ID:
                                      • API String ID: 3081899298-0
                                      • Opcode ID: 97b37a466ad84f87bef32ea86d654d854fecc5f456e3611dc5ca31fedd76270c
                                      • Instruction ID: 2b120ea5966f89e8d017b4f9bad93d2078711017dbf6c1b2965928eb4ccd7eb2
                                      • Opcode Fuzzy Hash: 97b37a466ad84f87bef32ea86d654d854fecc5f456e3611dc5ca31fedd76270c
                                      • Instruction Fuzzy Hash: 1B010471504300AEE7208F45DD85BE6F7ACDF45724F08C0A6ED448B691D374F9488AA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • CreateDirectoryW.KERNELBASE(?,?), ref: 049B0B0B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: CreateDirectory
                                      • String ID:
                                      • API String ID: 4241100979-0
                                      • Opcode ID: f2c25828ef4febb64f1c411acf3855c976bf0a0b43da243521cabf1e1b82af5c
                                      • Instruction ID: e541a1867cc58b3fe012a47e43aef3ee7cf139574e2f630a5108ea522276a848
                                      • Opcode Fuzzy Hash: f2c25828ef4febb64f1c411acf3855c976bf0a0b43da243521cabf1e1b82af5c
                                      • Instruction Fuzzy Hash: CF115E71A042408FDB50CF59D985BA7FBD8EF05724F08C4BADD49CB651E674E904CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DrawTextExW.USER32(?,?,?,?,?,?), ref: 049B04B3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: DrawText
                                      • String ID:
                                      • API String ID: 2175133113-0
                                      • Opcode ID: dcf36fa02dc46f571cf0107a31d10dcaf721383add067c40dfd36262b0d62851
                                      • Instruction ID: 23d48f84d929171ea0c5b9bdf779367cc7bb858ca43f7da5f2d127bf921519be
                                      • Opcode Fuzzy Hash: dcf36fa02dc46f571cf0107a31d10dcaf721383add067c40dfd36262b0d62851
                                      • Instruction Fuzzy Hash: 5C1170716003049FDB20CF55D985BA7FBE9FF04720F08886ADD858B652E375E408CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SetErrorMode.KERNELBASE(?), ref: 0069A480
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1755249007.000000000069A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_69a000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: ErrorMode
                                      • String ID:
                                      • API String ID: 2340568224-0
                                      • Opcode ID: c55f8dfa53d156989ecd95e4ced65c51526c6f85ac14b39ae4e1d429a4dc3bd4
                                      • Instruction ID: bc272f1b2433527f9006315a495cd5a927155db1d67ce76d0acffd2850ad739d
                                      • Opcode Fuzzy Hash: c55f8dfa53d156989ecd95e4ced65c51526c6f85ac14b39ae4e1d429a4dc3bd4
                                      • Instruction Fuzzy Hash: 78018475508384AFDB128B15DC44B62FFF8EF46720F0880DAED854B652D275A908CBB2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SetFileAttributesW.KERNELBASE(?,?), ref: 049B10E3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: AttributesFile
                                      • String ID:
                                      • API String ID: 3188754299-0
                                      • Opcode ID: c57f1179cf75a1419e4b23e16c6a86f95b144f48598cd908fd899c39e70db9a9
                                      • Instruction ID: 62f831b3004c72ba2016e5bb2e62f6679585d567c10982fa4184684308cb38cb
                                      • Opcode Fuzzy Hash: c57f1179cf75a1419e4b23e16c6a86f95b144f48598cd908fd899c39e70db9a9
                                      • Instruction Fuzzy Hash: 2601B571A002409FEB10CF56D9867A6FBD8EF05360F08C4BADD45CB756E274E508CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • ShellExecuteExW.SHELL32(?), ref: 049B1240
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: ExecuteShell
                                      • String ID:
                                      • API String ID: 587946157-0
                                      • Opcode ID: db545503ff71f1d5957f755c928c0afe946977137359e0a501aae879f0f60131
                                      • Instruction ID: d071246825e742ec1584e7e5943c1384eda04aa21c398954b8ee949150247d75
                                      • Opcode Fuzzy Hash: db545503ff71f1d5957f755c928c0afe946977137359e0a501aae879f0f60131
                                      • Instruction Fuzzy Hash: E1019271A042008FDB50CF55D9867A6FBD8EF05360F08C4BADD49CB655E374E908CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryShim.MSCOREE(?,?,?,?), ref: 0069B4A9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1755249007.000000000069A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_69a000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: LibraryLoadShim
                                      • String ID:
                                      • API String ID: 1475914169-0
                                      • Opcode ID: 1e98aa5059baa62fdba359a4f5a4399d00ab03b411d1bc7c18d8befe24ae2a8f
                                      • Instruction ID: da2e5b180b5f97761dcd57330dc66eac1c879daab55da535f67ce456acdeacff
                                      • Opcode Fuzzy Hash: 1e98aa5059baa62fdba359a4f5a4399d00ab03b411d1bc7c18d8befe24ae2a8f
                                      • Instruction Fuzzy Hash: E50140756002009FDF60CE19E945B66FBE8EF14B20F088499DD498BB56D375E809DB72
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetFileVersionInfoW.KERNELBASE(?,?,?,?), ref: 0069BD75
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1755249007.000000000069A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_69a000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: FileInfoVersion
                                      • String ID:
                                      • API String ID: 2427832333-0
                                      • Opcode ID: 4bc51633d2ec4928d23c1cf19b53322d3b82ef4e201b53a23f091fb48178c516
                                      • Instruction ID: be6349ccf6f57a2a29049f22c3f91f3cec3d884f9c6903a55987b95180c925b3
                                      • Opcode Fuzzy Hash: 4bc51633d2ec4928d23c1cf19b53322d3b82ef4e201b53a23f091fb48178c516
                                      • Instruction Fuzzy Hash: 00019271A00600CFDB608F16E945B56FBE8EF14720F08C05ADD458BB61D371E818CF61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0069A666
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1755249007.000000000069A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_69a000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: dccc67e1fecf596ec65ec1928ffaa15b8ec14d9075c382cf4aca90b954858d18
                                      • Instruction ID: 28bc74fc26bf2b97a6f823a8af0ade92f52c19d284859e6db527220d569a2640
                                      • Opcode Fuzzy Hash: dccc67e1fecf596ec65ec1928ffaa15b8ec14d9075c382cf4aca90b954858d18
                                      • Instruction Fuzzy Hash: C201AD32900600DFDF218F95D944B66FBE5EF48320F08C8AADE498AA11D375E518DFA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetFileVersionInfoSizeW.KERNELBASE(?,?), ref: 0069BCBF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1755249007.000000000069A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_69a000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: FileInfoSizeVersion
                                      • String ID:
                                      • API String ID: 1661704012-0
                                      • Opcode ID: 2b4ccd62096f7d1461fa0909b105454edfbcc086be30d6a8222da76d7a1b1a7d
                                      • Instruction ID: a3d7e819e8999356a206cc65bb7d81d79b0dc8d30bec2fd0c871ab503d5c5c69
                                      • Opcode Fuzzy Hash: 2b4ccd62096f7d1461fa0909b105454edfbcc086be30d6a8222da76d7a1b1a7d
                                      • Instruction Fuzzy Hash: CE019E71A00200CFEB10CF55E985766FBE8EF14320F0884AADD488B752D775E904CA61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryW.KERNELBASE(?), ref: 0069BB2C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1755249007.000000000069A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_69a000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: 82ac8e11d98c6153b898dd914489840abf62d1ec210a0b7a105b655485f1c473
                                      • Instruction ID: 4689375a25aaeb0a30764577a0ff762871d1dbc39ac75f17443dd9d59f58c74b
                                      • Opcode Fuzzy Hash: 82ac8e11d98c6153b898dd914489840abf62d1ec210a0b7a105b655485f1c473
                                      • Instruction Fuzzy Hash: D3017171A042408FDB50CF55E9857A6FBD8EF14720F08C4AADD49CB79AD774E904CAA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • CreateActCtxA.KERNEL32(?,00000E24,?,?), ref: 0069A346
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1755249007.000000000069A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_69a000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 0935fb7e4cf3fc70e2fcc7f28e7e5fe12da93a9d503658430b174f5872939583
                                      • Instruction ID: 8270922d6e0773d421269c740f431d0fedf36296b1a6a9ed6ce77e8d67d08e7e
                                      • Opcode Fuzzy Hash: 0935fb7e4cf3fc70e2fcc7f28e7e5fe12da93a9d503658430b174f5872939583
                                      • Instruction Fuzzy Hash: 4F01A271A00200ABD310DF1ACD46B66FBE8FB88A20F148159ED089BB41D771F959CBE5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • VerLanguageNameW.KERNELBASE(?,00000E24,?,?), ref: 049B0082
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: LanguageName
                                      • String ID:
                                      • API String ID: 2060303382-0
                                      • Opcode ID: ef6564fe3b4b0817180e895e57c326161d7977b188455a1257d903760137e337
                                      • Instruction ID: b37cb6d3e8b06904d29c1054a859dcde1f7e04dd4b4547b0b446e49002af16e2
                                      • Opcode Fuzzy Hash: ef6564fe3b4b0817180e895e57c326161d7977b188455a1257d903760137e337
                                      • Instruction Fuzzy Hash: 0A01A271A00200ABD310DF1ACD46B66FBE8FB88B20F14811AED089BB41D771F959CBE5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • PostMessageW.USER32(?,?,?,?), ref: 049B1721
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: aa7cd63b37e5c5fd8b0add86638dba084864e352e8d4b52e05210a2f2e1af312
                                      • Instruction ID: 997046a60e28b13dceeffcd19de483b8814d134224c3c6e7758a9ed32a1db272
                                      • Opcode Fuzzy Hash: aa7cd63b37e5c5fd8b0add86638dba084864e352e8d4b52e05210a2f2e1af312
                                      • Instruction Fuzzy Hash: 4F01B135600200CFDB208F55D985BA6FBE4EF54220F08C4AEDD454B661D371E418DBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • PostMessageW.USER32(?,?,?,?), ref: 049B1399
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1757275823.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_49b0000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: ad4703cbe407e0d72213514a5e8fc314969050518d2490f3f59c1f86a5ae1a8d
                                      • Instruction ID: 7f95c1b92b4ec6008a4695b516850c89b8bebeeb6141172f0d3da1e34f965b19
                                      • Opcode Fuzzy Hash: ad4703cbe407e0d72213514a5e8fc314969050518d2490f3f59c1f86a5ae1a8d
                                      • Instruction Fuzzy Hash: 2B01DF31A00300CFDB208F45D945B66FBE4EF14320F08C4AADD850BA22E371E418CBA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SetErrorMode.KERNELBASE(?), ref: 0069A480
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1755249007.000000000069A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0069A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_69a000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID: ErrorMode
                                      • String ID:
                                      • API String ID: 2340568224-0
                                      • Opcode ID: 075859c4af882d8f75491bf28d11f43a0df1f6702de8e14f8174357eed871e74
                                      • Instruction ID: ab89d1ba0fe1f06436913d2a9ec54db8d0e20f1c39b2b44929bc78e22e5ee07d
                                      • Opcode Fuzzy Hash: 075859c4af882d8f75491bf28d11f43a0df1f6702de8e14f8174357eed871e74
                                      • Instruction Fuzzy Hash: E6F0AF75904240CFDB108F45E889761FBE8EF15B30F08C0AADD494BB52D3B9E909CEA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1756748956.0000000000D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d50000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4a67c1793efdfe1984573f247ad4a7a702177bc3822e54bb6e9cabd91386d7b6
                                      • Instruction ID: 9d8e991c1c65a273f4038d1cd2cf50689fbe05b2bfc230ab8c0520c151f7475c
                                      • Opcode Fuzzy Hash: 4a67c1793efdfe1984573f247ad4a7a702177bc3822e54bb6e9cabd91386d7b6
                                      • Instruction Fuzzy Hash: A291F331B102128FCB04EB74D8916AEB7F2AF89309F144479D906AB395DF38DD09CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1756748956.0000000000D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d50000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 963de639f05804f8bdfdc699a45bde7b3b4ac9b1c494d29bca7b0a6654bfa0ad
                                      • Instruction ID: 2a84e457c6d334b702a5235cb28fcbb59bf149c93b2323a484dcafb156fd019a
                                      • Opcode Fuzzy Hash: 963de639f05804f8bdfdc699a45bde7b3b4ac9b1c494d29bca7b0a6654bfa0ad
                                      • Instruction Fuzzy Hash: 6F412331B002155FDF05CAA8C891BBEBBA6EB99300F14856AD904CFB82DA30EC4587E1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1756748956.0000000000D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d50000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a1a8f0eae327b16418fc6768eeea80bf68571bf40dff80bfffc1757b22c3e792
                                      • Instruction ID: 0054fe4128a25d98a74e2ffb8492f24af89af81b03b0d5b0427b41ce09642747
                                      • Opcode Fuzzy Hash: a1a8f0eae327b16418fc6768eeea80bf68571bf40dff80bfffc1757b22c3e792
                                      • Instruction Fuzzy Hash: 87212079A183128FCF01DB68D8808AEBFA2BB483067085166DC46C3345DB30EC48CFE0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1756801390.0000000000D80000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d80000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d944958c7c4491209b3041be105f4c63ec429f3dcaafd9278cdb601e526714e2
                                      • Instruction ID: 874385d52f60ab94f09be00747ab68ba8fef352b17eae827b94418ed4f4e5104
                                      • Opcode Fuzzy Hash: d944958c7c4491209b3041be105f4c63ec429f3dcaafd9278cdb601e526714e2
                                      • Instruction Fuzzy Hash: 2311E430204280DFD751DB50C980B26BBA5EB99708F28C59CE9491BB42C777E80BCFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1756801390.0000000000D80000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d80000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 93dde30b93ffab84c99e7930dbee021b232819aff1f019f63696dbe08b705360
                                      • Instruction ID: 3c562a61269b838836331d0ba3ddc1978daccb6349e4422922c4f7b9eccc1196
                                      • Opcode Fuzzy Hash: 93dde30b93ffab84c99e7930dbee021b232819aff1f019f63696dbe08b705360
                                      • Instruction Fuzzy Hash: 38213B351097C08FC703DB24C950B51BFB1AF4B714F2985DAD8894B6A3C63AA81BDB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1756748956.0000000000D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d50000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 51308b745d1018006e94e46b666b8432cc1e87a3232f90c6d2c676fb36901046
                                      • Instruction ID: 97561d2ab1b11170db8d72b93d1711973a4fdfa4a30bef53a4353c7b5c20040f
                                      • Opcode Fuzzy Hash: 51308b745d1018006e94e46b666b8432cc1e87a3232f90c6d2c676fb36901046
                                      • Instruction Fuzzy Hash: 72F0A9317082509BDB266234AC16B6D6AD24BCB711F2901AFE901DB3D5CA729C0687A9
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1756801390.0000000000D80000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d80000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4831497377b8dc70f017d6d7553d3c631efaff8c50e3d314c09476457102460a
                                      • Instruction ID: 6a851bc5f01a9ffb5464d3e7a2eb8c1d4b0e9c0278ca239aa2789052cc20165c
                                      • Opcode Fuzzy Hash: 4831497377b8dc70f017d6d7553d3c631efaff8c50e3d314c09476457102460a
                                      • Instruction Fuzzy Hash: 7201ADB55487806FC7018B16EC41893BFF8EF8663070984AFEC498B622D239A909CB65
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1756748956.0000000000D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d50000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7d02132f2f7bd32735d5c5e26912a26d70e0c9d23ccf9148ddfdf4da3f8fe54b
                                      • Instruction ID: f231ac3542a1e144c16cc543e7d67f1dd00c5d090ee23d2beff0551d015681ca
                                      • Opcode Fuzzy Hash: 7d02132f2f7bd32735d5c5e26912a26d70e0c9d23ccf9148ddfdf4da3f8fe54b
                                      • Instruction Fuzzy Hash: 59F0FC3170021097CA2472689811B6E71D687CAB61F35007AE901EF7D4DE72EC0747F9
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1756748956.0000000000D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d50000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d03f89c1ad997a58ad10af8b6407ff72b571d6d1769bb7a48a339c01ecc61a21
                                      • Instruction ID: f9644f383d34ade4c6245e00e484e705ed21d5e57fec8dc2a2a67ae270b8b9ea
                                      • Opcode Fuzzy Hash: d03f89c1ad997a58ad10af8b6407ff72b571d6d1769bb7a48a339c01ecc61a21
                                      • Instruction Fuzzy Hash: D3F0E931B041240FCF01A6B994206EF77E6EBCA355F0505B9D905D7385EF789D09CBA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1756748956.0000000000D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d50000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7abe636bc3ef2642fcbb8f8cd86a8d46eb12f0588feaf80f2a87fcdebce1f2a9
                                      • Instruction ID: 58392798ef0bc47c13c7a570a3b87264b2583fcb186f2743d56e341150a17ea6
                                      • Opcode Fuzzy Hash: 7abe636bc3ef2642fcbb8f8cd86a8d46eb12f0588feaf80f2a87fcdebce1f2a9
                                      • Instruction Fuzzy Hash: B5E02B3230010437D72855AA5C52FFBB68FA7DA368F244036F7088B791CE619C0152B5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1756801390.0000000000D80000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d80000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f5405e8c2313153df6eab1cfdcb54e4ecace335342848f3dcb2b97980fc5d3c2
                                      • Instruction ID: c1f512d00e12cc6207baa7d6c2cbcbbdc56f17fd5d6c61198d654b5b4330d862
                                      • Opcode Fuzzy Hash: f5405e8c2313153df6eab1cfdcb54e4ecace335342848f3dcb2b97980fc5d3c2
                                      • Instruction Fuzzy Hash: 1CF01D35144644DFC305DB40D980B25FBA2EB89718F24CAADE94917752C737E813DF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1756801390.0000000000D80000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D80000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d80000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: da0f2938341bc936975496687ab42ab3f54cd4c177bfaf3ec22610a96524f571
                                      • Instruction ID: b209e5e01833c100e9f5b82e9898f2a592d5f6e70e4439c49187ad803dd1598a
                                      • Opcode Fuzzy Hash: da0f2938341bc936975496687ab42ab3f54cd4c177bfaf3ec22610a96524f571
                                      • Instruction Fuzzy Hash: 67E092B6A046005B9750CF0AFC41456F7D8EB84630708C47FDC0D8B711E275B908CAA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1756748956.0000000000D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d50000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e397f202f00653c0db73948959b9d5fecd47a492e636363bc0e978809c33e5ae
                                      • Instruction ID: 67a0f3c3da0d541a296ca036b85ee390b4c4036b1561f9815e2704ee79f695b8
                                      • Opcode Fuzzy Hash: e397f202f00653c0db73948959b9d5fecd47a492e636363bc0e978809c33e5ae
                                      • Instruction Fuzzy Hash: 07D0A72234462453D50A31982C1179E364E4787A30F02005AF5059A282CE8A0D0202EE
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1756748956.0000000000D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d50000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dfb92ab456df37ff223dff754428123ee0cde99665e63c378aa54390be683d85
                                      • Instruction ID: afe504eba2d31e53a8b79afd135d16f87b887ee765b26d0b22d547911dca8f14
                                      • Opcode Fuzzy Hash: dfb92ab456df37ff223dff754428123ee0cde99665e63c378aa54390be683d85
                                      • Instruction Fuzzy Hash: 0CC01221300524534A89327551260FE624BCE924A8303007FF11A8A742CF1B8D8206EE
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1755227470.0000000000692000.00000040.00000800.00020000.00000000.sdmp, Offset: 00692000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_692000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f2aef786ce693c3d126bd91b4d0eae3dcffcb0fe924688e22641edf619e9383d
                                      • Instruction ID: bcbc47df5b8d913972908fe512c95c25b597529776e984a3af2e0eb871e8793c
                                      • Opcode Fuzzy Hash: f2aef786ce693c3d126bd91b4d0eae3dcffcb0fe924688e22641edf619e9383d
                                      • Instruction Fuzzy Hash: 00D05E79205AC25FD7169A1CC1A4BD537D9AB61B18F4A44F9A8008BB63C768E9D1D600
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1755227470.0000000000692000.00000040.00000800.00020000.00000000.sdmp, Offset: 00692000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_692000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 70fc87ee2b636c064b6ad0cb9b0f30bea8c2d2b44495404c5e717f2ed12bc844
                                      • Instruction ID: c425647dc31869a07d86a560c8e061cd5ba7d2686ac1bed19684a13f6b015ba9
                                      • Opcode Fuzzy Hash: 70fc87ee2b636c064b6ad0cb9b0f30bea8c2d2b44495404c5e717f2ed12bc844
                                      • Instruction Fuzzy Hash: 28D05E342006824BCB15DA0CC6E4F9937D9AB50B14F0684E9AC108BB62C7A8ECC0CA00
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1756748956.0000000000D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_d50000_SjMIbKjuDL.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b3e93d3aba2b4cbdcba09869b5d5d454e461f9d0e0743f1a7957aadd52b23eaa
                                      • Instruction ID: c7652117aed2d559a7bcb955612e8e1c99218f2fad964ea194261465a9f4ab14
                                      • Opcode Fuzzy Hash: b3e93d3aba2b4cbdcba09869b5d5d454e461f9d0e0743f1a7957aadd52b23eaa
                                      • Instruction Fuzzy Hash: DCC09B11304D3493485E355D34114AD734F4987D75742045EF50957352CE875D4207DE
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Execution Graph

                                      Execution Coverage:19.3%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:54
                                      Total number of Limit Nodes:3
                                      execution_graph 6902 147a44e 6903 147a4a3 6902->6903 6904 147a47a SetErrorMode 6902->6904 6903->6904 6905 147a48f 6904->6905 6952 147bc4b 6954 147bc82 GetFileVersionInfoSizeW 6952->6954 6955 147bcc7 6954->6955 6906 5931042 6907 59310a2 6906->6907 6908 5931077 PostMessageW 6906->6908 6907->6908 6909 593108c 6908->6909 6976 5930006 6977 5930032 VerLanguageNameW 6976->6977 6979 5930090 6977->6979 6956 147bd10 6957 147bd32 GetFileVersionInfoW 6956->6957 6959 147bd84 6957->6959 6980 5931009 6981 5931042 PostMessageW 6980->6981 6983 593108c 6981->6983 6960 147ad19 6961 147ad5a RegQueryValueExW 6960->6961 6963 147ade3 6961->6963 6926 5930032 6927 5930082 VerLanguageNameW 6926->6927 6928 5930090 6927->6928 6984 5930431 6985 5930462 DrawTextExW 6984->6985 6987 59304bb 6985->6987 6929 147a622 6930 147a660 DuplicateHandle 6929->6930 6931 147a698 6929->6931 6932 147a66e 6930->6932 6931->6930 6964 147ac22 6966 147ac52 RegOpenKeyExW 6964->6966 6967 147ace0 6966->6967 6968 147b42d 6970 147b45e LoadLibraryShim 6968->6970 6971 147b4b8 6970->6971 6992 147a2ac 6993 147a2d0 CreateActCtxA 6992->6993 6995 147a354 6993->6995 6972 147a42a 6973 147a44e SetErrorMode 6972->6973 6975 147a48f 6973->6975 6996 147bab4 6998 147baf2 LoadLibraryW 6996->6998 6999 147bb34 6998->6999 6944 147baf2 6945 147bb18 LoadLibraryW 6944->6945 6947 147bb34 6945->6947 6988 147a5fb 6989 147a622 DuplicateHandle 6988->6989 6991 147a66e 6989->6991

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4865 5930dfa-5930e02 4866 5930e04-5930e07 4865->4866 4867 5930e0c-5930e6b 4865->4867 4866->4867 4869 5930ea3-5930ea8 4867->4869 4870 5930e6d-5930e75 NtResumeThread 4867->4870 4869->4870 4872 5930e7b-5930e8d 4870->4872 4873 5930eaa-5930eaf 4872->4873 4874 5930e8f-5930ea2 4872->4874 4873->4874
                                      APIs
                                      • NtResumeThread.NTDLL(?,?), ref: 05930E73
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1791544592.0000000005930000.00000040.00000800.00020000.00000000.sdmp, Offset: 05930000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_5930000_chargeable.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: decb8b585ec72c81dbae317ab538b1ed5aae470e5d2ce51032ca48d262a4a501
                                      • Instruction ID: 52b402bb3f497d1f2d2acc70c90320516d900dab271fbb2f5bd07a5e4bf3417a
                                      • Opcode Fuzzy Hash: decb8b585ec72c81dbae317ab538b1ed5aae470e5d2ce51032ca48d262a4a501
                                      • Instruction Fuzzy Hash: 2021E0B15093C09FDB12CF21C855BA1BFE0AF06224F1C84DEECC84F153D266954ACB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • NtWriteVirtualMemory.NTDLL ref: 05930F24
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1791544592.0000000005930000.00000040.00000800.00020000.00000000.sdmp, Offset: 05930000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_5930000_chargeable.jbxd
                                      Similarity
                                      • API ID: MemoryVirtualWrite
                                      • String ID:
                                      • API String ID: 3527976591-0
                                      • Opcode ID: ebc33fca0b1eeccf806c6dc5dc1af4b44bbe1778fe3e09b0d7a5f77f553f71d4
                                      • Instruction ID: 96afb5b2b7dfc614b5d82032b4bdf1eafce6e4ec5ec1f6631085d87c5191e5e5
                                      • Opcode Fuzzy Hash: ebc33fca0b1eeccf806c6dc5dc1af4b44bbe1778fe3e09b0d7a5f77f553f71d4
                                      • Instruction Fuzzy Hash: D2116071409380AFDB228F55DC44B62FFB4EF46310F0884DAED848B553D275A559DB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • NtWriteVirtualMemory.NTDLL ref: 05930F24
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1791544592.0000000005930000.00000040.00000800.00020000.00000000.sdmp, Offset: 05930000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_5930000_chargeable.jbxd
                                      Similarity
                                      • API ID: MemoryVirtualWrite
                                      • String ID:
                                      • API String ID: 3527976591-0
                                      • Opcode ID: da1ffc8a2505c3f6f30a9f27ff89cc030dcaaad557037e2c15ce3037665d952c
                                      • Instruction ID: 1a6c84191bd4d7bfb9789802d20fb42d717c16d12009e5c6dcf5182ca6672398
                                      • Opcode Fuzzy Hash: da1ffc8a2505c3f6f30a9f27ff89cc030dcaaad557037e2c15ce3037665d952c
                                      • Instruction Fuzzy Hash: 90019E31900240DFDB20CF95D849B66FBE4FF19320F0888AADD498B616D375E558CB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • NtResumeThread.NTDLL(?,?), ref: 05930E73
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1791544592.0000000005930000.00000040.00000800.00020000.00000000.sdmp, Offset: 05930000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_5930000_chargeable.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: f77a55d25d5f4009c782998293eb5952cd075f945740b010955fa1032be35884
                                      • Instruction ID: 901ff42923faf47c5b2f2958e5fa1053be159f350383c1f3d96a870cf724f7d5
                                      • Opcode Fuzzy Hash: f77a55d25d5f4009c782998293eb5952cd075f945740b010955fa1032be35884
                                      • Instruction Fuzzy Hash: 01018F71A04244DFDB20CF55D889B65FBE4FF49320F08C8AADD498B656D375E408CBA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 17b00d0-17b00da 1 17b00dd-17b1855 0->1 2 17b00dc 0->2 481 17b185c-17b2b7b 1->481 2->1 673 17b2b82-17b8c8d 481->673 1673 17b8c94-17b8c9c 673->1673 1674 17b8ca4-17b97f0 1673->1674 1925 17b97f7 1674->1925 1926 17b97fe-17b9804 1925->1926
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790789799.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_17b0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 61e0b402c04cebe114dc1dbcfac1d6ccb2265ff8144b3db331a0c0b43d692ecf
                                      • Instruction ID: 89278d17b79e7896e24333164486c4a184af1e8814421692395068c311e8c786
                                      • Opcode Fuzzy Hash: 61e0b402c04cebe114dc1dbcfac1d6ccb2265ff8144b3db331a0c0b43d692ecf
                                      • Instruction Fuzzy Hash: A1142834601704DFD765DB30C854A9AB3B2FF99304F6188A8D55AAB360DF36AE86CF41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1927 17b00e0-17b1855 2406 17b185c-17b2b7b 1927->2406 2598 17b2b82-17b8c8d 2406->2598 3598 17b8c94-17b8c9c 2598->3598 3599 17b8ca4-17b97f0 3598->3599 3850 17b97f7 3599->3850 3851 17b97fe-17b9804 3850->3851
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790789799.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_17b0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c2d7dcb91805a3e4d11ae1f12c510e5c66b0d5e7ced50f759c173f8af5516107
                                      • Instruction ID: 7190cb333206af68c2fc411068b6665161822b6fa6729272de1af735c17c9c9b
                                      • Opcode Fuzzy Hash: c2d7dcb91805a3e4d11ae1f12c510e5c66b0d5e7ced50f759c173f8af5516107
                                      • Instruction Fuzzy Hash: 1B142834601704DFD765DB30C854A9AB3B2FF99304F6188A8D55AAB360DF35AE86CF41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 3852 17b98a0-17b98aa 3853 17b98ad-17bb2cd 3852->3853 3854 17b98ac 3852->3854 4369 17bb2d4-17bc61c 3853->4369 3854->3853
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790789799.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_17b0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5ef39b1d96a44da60ec25ed9686f11615651ba3da5fa86719467bf4100960640
                                      • Instruction ID: 4832b0655618b65fa1ca3a8ebe9b6f91177ac539306c0d74b051689569f667e4
                                      • Opcode Fuzzy Hash: 5ef39b1d96a44da60ec25ed9686f11615651ba3da5fa86719467bf4100960640
                                      • Instruction Fuzzy Hash: E133C3383069218B871ABF20D55495E7BA6FF8855C3548345C90197B88CF3EAF4F9BC6
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4750 5930ca1-5930d1a 4753 5930d1f-5930d25 4750->4753 4754 5930d1c 4750->4754 4755 5930d27 4753->4755 4756 5930d2a-5930d9c 4753->4756 4754->4753 4755->4756 4760 5930de9-5930dee 4756->4760 4761 5930d9e-5930da6 CreateProcessA 4756->4761 4760->4761 4762 5930dac-5930dbe 4761->4762 4764 5930df0-5930df5 4762->4764 4765 5930dc0-5930de6 4762->4765 4764->4765
                                      APIs
                                      • CreateProcessA.KERNELBASE(?,00000E24), ref: 05930DA4
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1791544592.0000000005930000.00000040.00000800.00020000.00000000.sdmp, Offset: 05930000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_5930000_chargeable.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: e327b8e791628ad85cf86b4bb513cfd320faea018c8cb66b79450fe023153c52
                                      • Instruction ID: 34582246d21c78a000fb5bcbec8b124296fff69d7191e6f685509f167c8010ea
                                      • Opcode Fuzzy Hash: e327b8e791628ad85cf86b4bb513cfd320faea018c8cb66b79450fe023153c52
                                      • Instruction Fuzzy Hash: 38418072504340AFEB22CB65CD45FE2BBFCEF05710F04499AF9898B5A2D265F949CB60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4768 5930cda-5930d1a 4770 5930d1f-5930d25 4768->4770 4771 5930d1c 4768->4771 4772 5930d27 4770->4772 4773 5930d2a-5930d9c 4770->4773 4771->4770 4772->4773 4777 5930de9-5930dee 4773->4777 4778 5930d9e-5930da6 CreateProcessA 4773->4778 4777->4778 4779 5930dac-5930dbe 4778->4779 4781 5930df0-5930df5 4779->4781 4782 5930dc0-5930de6 4779->4782 4781->4782
                                      APIs
                                      • CreateProcessA.KERNELBASE(?,00000E24), ref: 05930DA4
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1791544592.0000000005930000.00000040.00000800.00020000.00000000.sdmp, Offset: 05930000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_5930000_chargeable.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: 1d95e9ddf06ff064b539cafec8f17709a79e579c6ac373e60807b59e88af446e
                                      • Instruction ID: 2589f642d47479610860894e181537ec494d4ef8aa8598c5819c12c063413e67
                                      • Opcode Fuzzy Hash: 1d95e9ddf06ff064b539cafec8f17709a79e579c6ac373e60807b59e88af446e
                                      • Instruction Fuzzy Hash: B4318076600304AFEB21CF65CD85FA6F7ECEF08710F048959EA498A691D771F549CB60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4785 147ac22-147acad 4789 147acb2-147acc9 4785->4789 4790 147acaf 4785->4790 4792 147ad0b-147ad10 4789->4792 4793 147accb-147acde RegOpenKeyExW 4789->4793 4790->4789 4792->4793 4794 147ad12-147ad17 4793->4794 4795 147ace0-147ad08 4793->4795 4794->4795
                                      APIs
                                      • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 0147ACD1
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1789697252.000000000147A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_147a000_chargeable.jbxd
                                      Similarity
                                      • API ID: Open
                                      • String ID:
                                      • API String ID: 71445658-0
                                      • Opcode ID: 858d3087ecb76fbfbf3fd455ec489c37a030f90ddac1af45e4f9e65f9d011bc3
                                      • Instruction ID: 3dda732d8eca44f611f2be4e056c881d96405ead1ca51f8d2ce470d36f4c8ff6
                                      • Opcode Fuzzy Hash: 858d3087ecb76fbfbf3fd455ec489c37a030f90ddac1af45e4f9e65f9d011bc3
                                      • Instruction Fuzzy Hash: B031B471508384AFE7228F65DC45FA7BFBCEF06210F08849AE9858B653D264E94DCB71
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4800 147ad19-147ad97 4803 147ad9c-147ada5 4800->4803 4804 147ad99 4800->4804 4805 147ada7 4803->4805 4806 147adaa-147adb0 4803->4806 4804->4803 4805->4806 4807 147adb5-147adcc 4806->4807 4808 147adb2 4806->4808 4810 147ae03-147ae08 4807->4810 4811 147adce-147ade1 RegQueryValueExW 4807->4811 4808->4807 4810->4811 4812 147ade3-147ae00 4811->4812 4813 147ae0a-147ae0f 4811->4813 4813->4812
                                      APIs
                                      • RegQueryValueExW.KERNELBASE(?,00000E24,E3641AB6,00000000,00000000,00000000,00000000), ref: 0147ADD4
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1789697252.000000000147A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_147a000_chargeable.jbxd
                                      Similarity
                                      • API ID: QueryValue
                                      • String ID:
                                      • API String ID: 3660427363-0
                                      • Opcode ID: 883e0aa9b42b6a38dcf3082817611286d62d47ec5c214cfd41931b89192ba89f
                                      • Instruction ID: 27bd63374b4fcbe664fec03a71fbd0349970253500351b47d183099d6e88e21b
                                      • Opcode Fuzzy Hash: 883e0aa9b42b6a38dcf3082817611286d62d47ec5c214cfd41931b89192ba89f
                                      • Instruction Fuzzy Hash: 8531A1715083845FE722CF65CC44FA7BFB8EF46210F18849AE9458B663D260E949CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4817 147a2ac-147a2f3 4819 147a2f6-147a34e CreateActCtxA 4817->4819 4821 147a354-147a36a 4819->4821
                                      APIs
                                      • CreateActCtxA.KERNEL32(?,00000E24,?,?), ref: 0147A346
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1789697252.000000000147A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_147a000_chargeable.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: d2635ca865ea0dba5e7a95925ffc611f8301835c4497db0a4523c0ad3df92cec
                                      • Instruction ID: 5355277a26b5ad9bf031b5102880a8b60fe342bfa747c5691bc35948d7353ffe
                                      • Opcode Fuzzy Hash: d2635ca865ea0dba5e7a95925ffc611f8301835c4497db0a4523c0ad3df92cec
                                      • Instruction Fuzzy Hash: 6D21F67150D3C06FD3138B259C51B62BFB8EF87620F0A41CBE884DB693D225A919C7B2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4822 147ac52-147acad 4825 147acb2-147acc9 4822->4825 4826 147acaf 4822->4826 4828 147ad0b-147ad10 4825->4828 4829 147accb-147acde RegOpenKeyExW 4825->4829 4826->4825 4828->4829 4830 147ad12-147ad17 4829->4830 4831 147ace0-147ad08 4829->4831 4830->4831
                                      APIs
                                      • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 0147ACD1
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1789697252.000000000147A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_147a000_chargeable.jbxd
                                      Similarity
                                      • API ID: Open
                                      • String ID:
                                      • API String ID: 71445658-0
                                      • Opcode ID: 02588f121533389be870774bcaf577b483456bf065de4f945b70520f6434dd55
                                      • Instruction ID: f20b6747efdd08a7855a89f7839a5094f6700be3c71280c237c8c0fd8bb146fb
                                      • Opcode Fuzzy Hash: 02588f121533389be870774bcaf577b483456bf065de4f945b70520f6434dd55
                                      • Instruction Fuzzy Hash: 3721CF72504204AFE7219F55DD84FABFBECEF04214F18845AE9458BA52D334E94D8AB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4836 5930431-5930486 4838 593048b-593049a 4836->4838 4839 5930488 4836->4839 4840 593049f-59304ab 4838->4840 4841 593049c 4838->4841 4839->4838 4842 59304e5-59304ea 4840->4842 4843 59304ad-59304b5 DrawTextExW 4840->4843 4841->4840 4842->4843 4844 59304bb-59304cd 4843->4844 4846 59304cf-59304e2 4844->4846 4847 59304ec-59304f1 4844->4847 4847->4846
                                      APIs
                                      • DrawTextExW.USER32(?,?,?,?,?,?), ref: 059304B3
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1791544592.0000000005930000.00000040.00000800.00020000.00000000.sdmp, Offset: 05930000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_5930000_chargeable.jbxd
                                      Similarity
                                      • API ID: DrawText
                                      • String ID:
                                      • API String ID: 2175133113-0
                                      • Opcode ID: ba4d87fa5abfd347bef64c37e2cf291e16bfc2b40290872ca1de580281debf39
                                      • Instruction ID: ab5b86e3deaaad525347fcfdb7f62b236ba4f1764e84179a40997d72a053b66e
                                      • Opcode Fuzzy Hash: ba4d87fa5abfd347bef64c37e2cf291e16bfc2b40290872ca1de580281debf39
                                      • Instruction Fuzzy Hash: 752174716087849FDB22CF25DC45B62BFF8FF46210F09849AE9858F563D275E908CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4849 147ad5a-147ad97 4851 147ad9c-147ada5 4849->4851 4852 147ad99 4849->4852 4853 147ada7 4851->4853 4854 147adaa-147adb0 4851->4854 4852->4851 4853->4854 4855 147adb5-147adcc 4854->4855 4856 147adb2 4854->4856 4858 147ae03-147ae08 4855->4858 4859 147adce-147ade1 RegQueryValueExW 4855->4859 4856->4855 4858->4859 4860 147ade3-147ae00 4859->4860 4861 147ae0a-147ae0f 4859->4861 4861->4860
                                      APIs
                                      • RegQueryValueExW.KERNELBASE(?,00000E24,E3641AB6,00000000,00000000,00000000,00000000), ref: 0147ADD4
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1789697252.000000000147A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_147a000_chargeable.jbxd
                                      Similarity
                                      • API ID: QueryValue
                                      • String ID:
                                      • API String ID: 3660427363-0
                                      • Opcode ID: b3bead653045e0bc51f8e149aa2aa4cbf925fc6658ec9dcbafb8c99e369c0458
                                      • Instruction ID: 102178ba8094c83cc8149506d71e893d2ed4e2986caa96513333b9936b27eb65
                                      • Opcode Fuzzy Hash: b3bead653045e0bc51f8e149aa2aa4cbf925fc6658ec9dcbafb8c99e369c0458
                                      • Instruction Fuzzy Hash: C0218E75600604AFE721CF55CC84FE7B7ECEF04620F18845AE9458B762D770E949CAB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4876 147bab4-147bb16 4878 147bb1b-147bb24 4876->4878 4879 147bb18 4876->4879 4880 147bb26-147bb46 LoadLibraryW 4878->4880 4881 147bb5c-147bb61 4878->4881 4879->4878 4884 147bb63-147bb68 4880->4884 4885 147bb48-147bb5b 4880->4885 4881->4880 4884->4885
                                      APIs
                                      • LoadLibraryW.KERNELBASE(?), ref: 0147BB2C
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1789697252.000000000147A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_147a000_chargeable.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: e51bb9309954617d47cb4d068350548b751dbcfffcbeae0a8a22db1a7da4ebf7
                                      • Instruction ID: 5994deff5e93c0109733a90355bd248823ac63e7deeb887c7fef91a1bd24f852
                                      • Opcode Fuzzy Hash: e51bb9309954617d47cb4d068350548b751dbcfffcbeae0a8a22db1a7da4ebf7
                                      • Instruction Fuzzy Hash: 70215E715093C05FDB128B25DC94792BFB4EF47214F0D84DAED848F667D264A908CB72
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4887 147b42d-147b488 4889 147b48d-147b493 4887->4889 4890 147b48a 4887->4890 4891 147b495 4889->4891 4892 147b498-147b4a1 4889->4892 4890->4889 4891->4892 4893 147b4a3-147b4b6 LoadLibraryShim 4892->4893 4894 147b4ce-147b4d3 4892->4894 4895 147b4d5-147b4da 4893->4895 4896 147b4b8-147b4cb 4893->4896 4894->4893 4895->4896
                                      APIs
                                      • LoadLibraryShim.MSCOREE(?,?,?,?), ref: 0147B4A9
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1789697252.000000000147A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_147a000_chargeable.jbxd
                                      Similarity
                                      • API ID: LibraryLoadShim
                                      • String ID:
                                      • API String ID: 1475914169-0
                                      • Opcode ID: 1f0a725e17e22835ac02f603f330f0842e5583f3df529bbcfec9b656629e8b8c
                                      • Instruction ID: 38888f88c998ceec589d40a9348c378c669ae517286a73bfc8d25b513ebd9aa6
                                      • Opcode Fuzzy Hash: 1f0a725e17e22835ac02f603f330f0842e5583f3df529bbcfec9b656629e8b8c
                                      • Instruction Fuzzy Hash: F22181B15093805FDB22CE15DC45B63BFF8EF46614F08809AED848B263D275E908C761
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 4899 147bc4b-147bca9 4901 147bcae-147bcb7 4899->4901 4902 147bcab 4899->4902 4903 147bcef-147bcf4 4901->4903 4904 147bcb9-147bcc1 GetFileVersionInfoSizeW 4901->4904 4902->4901 4903->4904 4906 147bcc7-147bcd9 4904->4906 4907 147bcf6-147bcfb 4906->4907 4908 147bcdb-147bcee 4906->4908 4907->4908
                                      APIs
                                      • GetFileVersionInfoSizeW.KERNELBASE(?,?), ref: 0147BCBF
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1789697252.000000000147A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_147a000_chargeable.jbxd
                                      Similarity
                                      • API ID: FileInfoSizeVersion
                                      • String ID:
                                      • API String ID: 1661704012-0
                                      • Opcode ID: 59e28dc74b4bd9f2a923badb7331bb24589e1a75a9d567ed79ddaf5bc16f8e16
                                      • Instruction ID: 7988eff840ab7c66a309ad1c9bd96169621e3c7bae4487d135b1a752ef37f184
                                      • Opcode Fuzzy Hash: 59e28dc74b4bd9f2a923badb7331bb24589e1a75a9d567ed79ddaf5bc16f8e16
                                      • Instruction Fuzzy Hash: 4A21A5B19093849FD712CF25DC45B52BFF4EF46210F0984DAED848F263D274A509CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • VerLanguageNameW.KERNELBASE(?,00000E24,?,?), ref: 05930082
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1791544592.0000000005930000.00000040.00000800.00020000.00000000.sdmp, Offset: 05930000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_5930000_chargeable.jbxd
                                      Similarity
                                      • API ID: LanguageName
                                      • String ID:
                                      • API String ID: 2060303382-0
                                      • Opcode ID: 42e5434a0ac30719a05e97e04a86494445a5ff7eba86031d0eb919c9462c9782
                                      • Instruction ID: 0efbbaa975316994d905754ed7572ed04f8c8df9452fd20174613599dcea902d
                                      • Opcode Fuzzy Hash: 42e5434a0ac30719a05e97e04a86494445a5ff7eba86031d0eb919c9462c9782
                                      • Instruction Fuzzy Hash: 0B11E271544340AFC3118B15CC41F72BBB8EF8A620F0581AAEC488BA42D274B959CBA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • PostMessageW.USER32(?,?,?,?), ref: 0593107D
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1791544592.0000000005930000.00000040.00000800.00020000.00000000.sdmp, Offset: 05930000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_5930000_chargeable.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: 0f96f80116f77ddcb0971b82788c037fb2b0ac61f42781b85fd49e671162bdce
                                      • Instruction ID: cdb91e525b9d8eedb3118e843b4c0ac1faa8dfafc26216616d8ecccaac551cc7
                                      • Opcode Fuzzy Hash: 0f96f80116f77ddcb0971b82788c037fb2b0ac61f42781b85fd49e671162bdce
                                      • Instruction Fuzzy Hash: AD219D715093C09FDB238F25CC45A62BFB4EF07210F0984DAE9848F563D265A818DB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0147A666
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1789697252.000000000147A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_147a000_chargeable.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 1befce8ec70cba748b464d7566260476f1af0e526b14d7e8c51977ef7858c8da
                                      • Instruction ID: 70cad0c720331a69e530e60c3ae683a0a1ed1ba89a9018fab6f9e8ed8f893a82
                                      • Opcode Fuzzy Hash: 1befce8ec70cba748b464d7566260476f1af0e526b14d7e8c51977ef7858c8da
                                      • Instruction Fuzzy Hash: 7E11A271409380AFDB228F55DC44B62FFF4EF4A210F08889AED898B563D275A518DB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetFileVersionInfoW.KERNELBASE(?,?,?,?), ref: 0147BD75
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1789697252.000000000147A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_147a000_chargeable.jbxd
                                      Similarity
                                      • API ID: FileInfoVersion
                                      • String ID:
                                      • API String ID: 2427832333-0
                                      • Opcode ID: 55138433b67c08b836f7e75456fc28981826cfdc026d11081956a87082316c6f
                                      • Instruction ID: fc2e27bd31a6279773089ef16653b0bfc0e6558e8fdea6307afaf83da2e43f65
                                      • Opcode Fuzzy Hash: 55138433b67c08b836f7e75456fc28981826cfdc026d11081956a87082316c6f
                                      • Instruction Fuzzy Hash: B3116071504380AFDB228F15DC45B63FFB8EF46624F08809EED858B663D271E919CB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • PostMessageW.USER32(?,?,?,?), ref: 05931405
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1791544592.0000000005930000.00000040.00000800.00020000.00000000.sdmp, Offset: 05930000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_5930000_chargeable.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: f92d3c67a1ed449c53aab3daf1ca87f5d6913243cdeb3598f1e04b51c66bd0b4
                                      • Instruction ID: 66c1b75df30e1adc3b6adbc8cd21ad7e6ece003769c0c1f3a414997c8c4223a4
                                      • Opcode Fuzzy Hash: f92d3c67a1ed449c53aab3daf1ca87f5d6913243cdeb3598f1e04b51c66bd0b4
                                      • Instruction Fuzzy Hash: 1211D071548380AFDB228F11DC45B62FFB4EF06224F08849EED458B563D265A418DB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DrawTextExW.USER32(?,?,?,?,?,?), ref: 059304B3
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1791544592.0000000005930000.00000040.00000800.00020000.00000000.sdmp, Offset: 05930000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_5930000_chargeable.jbxd
                                      Similarity
                                      • API ID: DrawText
                                      • String ID:
                                      • API String ID: 2175133113-0
                                      • Opcode ID: 6586af287850a6fc0daffa6f0deee8ed13a23a6f13f15aa9b4f1539c8e0af2be
                                      • Instruction ID: 602a37e5fff7414c60f86d3c48c48c022fe161be6193e081d8fde2b897b46241
                                      • Opcode Fuzzy Hash: 6586af287850a6fc0daffa6f0deee8ed13a23a6f13f15aa9b4f1539c8e0af2be
                                      • Instruction Fuzzy Hash: 09117075600304DFDB20CF55D889B66FBE8FF08220F08886ADD498B652E375E504CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SetErrorMode.KERNELBASE(?), ref: 0147A480
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1789697252.000000000147A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_147a000_chargeable.jbxd
                                      Similarity
                                      • API ID: ErrorMode
                                      • String ID:
                                      • API String ID: 2340568224-0
                                      • Opcode ID: 924ca19fb5648658df6fcff357d676508a047e1ab5737a617aa9bb83edd0eb30
                                      • Instruction ID: e03749390cca205c654a29fbe1dab246b00b6911f63c7ba997cc41d6d6d51d65
                                      • Opcode Fuzzy Hash: 924ca19fb5648658df6fcff357d676508a047e1ab5737a617aa9bb83edd0eb30
                                      • Instruction Fuzzy Hash: EE018475908384AFD722CF15DC44B62FFB8EF46620F0880DAED854B263D275A908CB71
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryShim.MSCOREE(?,?,?,?), ref: 0147B4A9
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1789697252.000000000147A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_147a000_chargeable.jbxd
                                      Similarity
                                      • API ID: LibraryLoadShim
                                      • String ID:
                                      • API String ID: 1475914169-0
                                      • Opcode ID: aae7e3e08d49f216d894bb9de355a26b6984d221f2b698d4b2be6b3bc312874f
                                      • Instruction ID: 1661a1c89fad94bd004720b24bf2fc227b5d19260aa53d380495f6b5dc2c977d
                                      • Opcode Fuzzy Hash: aae7e3e08d49f216d894bb9de355a26b6984d221f2b698d4b2be6b3bc312874f
                                      • Instruction Fuzzy Hash: 5E0152759002449FEB60CF19D845BA3FBE8EF15620F0884AADD498B762D775E409CB71
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetFileVersionInfoW.KERNELBASE(?,?,?,?), ref: 0147BD75
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1789697252.000000000147A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_147a000_chargeable.jbxd
                                      Similarity
                                      • API ID: FileInfoVersion
                                      • String ID:
                                      • API String ID: 2427832333-0
                                      • Opcode ID: 0f48952a870fc361aad06ca4a94c5d52223eed21e746948b3312c858a8009f58
                                      • Instruction ID: 5fb1a3b89da905aa4be29fc09b2608b1de0d0c7b5e51e02b723d49f24850c83e
                                      • Opcode Fuzzy Hash: 0f48952a870fc361aad06ca4a94c5d52223eed21e746948b3312c858a8009f58
                                      • Instruction Fuzzy Hash: 8701B571A00640CFDB61CF1AD845B96FBE4EF55620F08C05ADD458B762D271E459CF62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0147A666
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1789697252.000000000147A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_147a000_chargeable.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 57e6803ad713aee1f86493d706cc89f303fe95c7ff693589e94818c04a952325
                                      • Instruction ID: ba8af44392330e46aff61d8c820fb7cd0f8b7dab1cd60c73976deaa8981ff585
                                      • Opcode Fuzzy Hash: 57e6803ad713aee1f86493d706cc89f303fe95c7ff693589e94818c04a952325
                                      • Instruction Fuzzy Hash: 6F01AD32900600DFDB21CF95D844B66FBE4EF48320F08C89ADE894B622D375E418CF62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetFileVersionInfoSizeW.KERNELBASE(?,?), ref: 0147BCBF
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1789697252.000000000147A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_147a000_chargeable.jbxd
                                      Similarity
                                      • API ID: FileInfoSizeVersion
                                      • String ID:
                                      • API String ID: 1661704012-0
                                      • Opcode ID: 6496a708da68e8d9cf0815f3d7e9a9472d5c418152c3d4011b5ffe6017d09043
                                      • Instruction ID: f18689d8cfe5406363201460a0c6582c0941e810e4d42f49c3e4f858a2716182
                                      • Opcode Fuzzy Hash: 6496a708da68e8d9cf0815f3d7e9a9472d5c418152c3d4011b5ffe6017d09043
                                      • Instruction Fuzzy Hash: 0601D471900240DFEB20CF19D8857A6FBE8EF04220F08C4AADD49CB352D675E404CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • CreateActCtxA.KERNEL32(?,00000E24,?,?), ref: 0147A346
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1789697252.000000000147A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_147a000_chargeable.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: d9c8f1914cffd92fc18f7de13417fe970b62afcc4e189304728ed5cffd1bde34
                                      • Instruction ID: 258bd97a0f4ddceaf693134b4a709c2ef960e612b26ec778a15c67eb739fb03a
                                      • Opcode Fuzzy Hash: d9c8f1914cffd92fc18f7de13417fe970b62afcc4e189304728ed5cffd1bde34
                                      • Instruction Fuzzy Hash: EF01A271A00200ABD310DF16CD86B66FBF8FB88A20F148159ED089BB41D771F955CBE5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryW.KERNELBASE(?), ref: 0147BB2C
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1789697252.000000000147A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_147a000_chargeable.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: 5baf9ff1949e7083f1b4e7db32a4c08ca3b79e26cb010a860764d24f38f04fd4
                                      • Instruction ID: d84daf1fe6a41006e6db65e074f53e41b2750e64d936861cfbc6a596b67b2b0e
                                      • Opcode Fuzzy Hash: 5baf9ff1949e7083f1b4e7db32a4c08ca3b79e26cb010a860764d24f38f04fd4
                                      • Instruction Fuzzy Hash: 62018471A002448FDB60CF59D9857B2FBE4EF45220F08C4AADD49CF75AD274E404CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • VerLanguageNameW.KERNELBASE(?,00000E24,?,?), ref: 05930082
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1791544592.0000000005930000.00000040.00000800.00020000.00000000.sdmp, Offset: 05930000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_5930000_chargeable.jbxd
                                      Similarity
                                      • API ID: LanguageName
                                      • String ID:
                                      • API String ID: 2060303382-0
                                      • Opcode ID: 8698322b0bba81bf5f5b817bcf8d7e4c4788fa3226bcc2f8b6ea274e4c3ae1d1
                                      • Instruction ID: c4602fde71dd0c6d672a6c93e165122833a2619ec2f151533409046f4974fce1
                                      • Opcode Fuzzy Hash: 8698322b0bba81bf5f5b817bcf8d7e4c4788fa3226bcc2f8b6ea274e4c3ae1d1
                                      • Instruction Fuzzy Hash: 2A01A271A00200ABD310DF16CD86B66FBF8FB88A20F14811AED089BB41D771F955CBE5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • PostMessageW.USER32(?,?,?,?), ref: 05931405
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1791544592.0000000005930000.00000040.00000800.00020000.00000000.sdmp, Offset: 05930000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_5930000_chargeable.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: 1b6df62d08df031d712b571d6811fb3a39bd9c40da589bb20a44c0485459dbfe
                                      • Instruction ID: 446c4fbe4b505f13efcb37f3ea0988600d8f13c2775aba7d82f525a8798b58d0
                                      • Opcode Fuzzy Hash: 1b6df62d08df031d712b571d6811fb3a39bd9c40da589bb20a44c0485459dbfe
                                      • Instruction Fuzzy Hash: 7101B132900240CFDB20CF55D845B66FBE4FF15220F08C4AADD454B662D371E458DB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • PostMessageW.USER32(?,?,?,?), ref: 0593107D
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1791544592.0000000005930000.00000040.00000800.00020000.00000000.sdmp, Offset: 05930000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_5930000_chargeable.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: 4f0e59abc984a29c9be619b3c78a9071a1a553d511c5c386c44ef0b191bacf34
                                      • Instruction ID: 253a70ecc228eb7923241e1e208d3f7f20b161378434c3e93fa997bb8576ea5e
                                      • Opcode Fuzzy Hash: 4f0e59abc984a29c9be619b3c78a9071a1a553d511c5c386c44ef0b191bacf34
                                      • Instruction Fuzzy Hash: D1018B35900280DFDB20CF46D885B62FBE4FF19220F08C49ADE890B662D375E458DBA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SetErrorMode.KERNELBASE(?), ref: 0147A480
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1789697252.000000000147A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_147a000_chargeable.jbxd
                                      Similarity
                                      • API ID: ErrorMode
                                      • String ID:
                                      • API String ID: 2340568224-0
                                      • Opcode ID: 2f9d59ac7534328b4869a614d3b2ebc4fc598c500d854ce266dd745388dcdfb0
                                      • Instruction ID: 44636f374de9e29c387e8c56c7350113615fe1c6c303c7784f4bad09057f1d4e
                                      • Opcode Fuzzy Hash: 2f9d59ac7534328b4869a614d3b2ebc4fc598c500d854ce266dd745388dcdfb0
                                      • Instruction Fuzzy Hash: A3F0A475904244CFDB20CF05D8897A6FBE4EF55220F1CC0AADD494B762D275E449CEA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790789799.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_17b0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3ed488632cfdf814afa01f42e69e3f1be1773531732561a6d1d50cb8ef11da00
                                      • Instruction ID: b493a66fd55ff88e310361a3ee6ebedc8611ce60b4ada79817a93efab63efab2
                                      • Opcode Fuzzy Hash: 3ed488632cfdf814afa01f42e69e3f1be1773531732561a6d1d50cb8ef11da00
                                      • Instruction Fuzzy Hash: 1FB14F75E002099FDB15CBA9D885BEDFBF2EF98314F14C06AE515AB2A1D7319C42CB50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790789799.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_17b0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1871e20ff875f20d987f2702f95d36c56f9cefa51a013b602d844d7a5fbe0681
                                      • Instruction ID: e84a2044b446fd532698f1494dd7bb215b79e7b72ec67609778b95b679aebec7
                                      • Opcode Fuzzy Hash: 1871e20ff875f20d987f2702f95d36c56f9cefa51a013b602d844d7a5fbe0681
                                      • Instruction Fuzzy Hash: 2C91C431B012118FCB16DB78D4916EEB7B2FF89218F10846AC506EB7A5DF389D09CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790789799.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_17b0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0d566566e4cbd612582795be009f25c06a2ed461d8b0b07f94ee7bea1e793435
                                      • Instruction ID: 94232124ff5031338a8910c986a9007da7a4edb0885525aecdad8acdea3e8594
                                      • Opcode Fuzzy Hash: 0d566566e4cbd612582795be009f25c06a2ed461d8b0b07f94ee7bea1e793435
                                      • Instruction Fuzzy Hash: 6B4103317002515FDB06CAA8C891BFEFBA2EB95304F18C56AD144CF786DB74AC0183A1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790789799.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_17b0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 217699b666c87b25bd792f5fc202a3fa4f61084f9fd1a2dcdc3be81d37ae1fcd
                                      • Instruction ID: 795c5f36d8af5158dae3254097f50717d1ea6e57c6d75a6bcb8d1c957bc03705
                                      • Opcode Fuzzy Hash: 217699b666c87b25bd792f5fc202a3fa4f61084f9fd1a2dcdc3be81d37ae1fcd
                                      • Instruction Fuzzy Hash: 3E410631B042458BDB279B7884987FEBFA2AB89210F15806ED502EB351DF348805DBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790789799.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_17b0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c9d770f0fa26d01449ae2a5800e1b6d487392edf0c0716179ead306357c7bf38
                                      • Instruction ID: ffd68ca40b0421430a72c5ca7bbc991e144257a7e53d057ce41507756f6ce73a
                                      • Opcode Fuzzy Hash: c9d770f0fa26d01449ae2a5800e1b6d487392edf0c0716179ead306357c7bf38
                                      • Instruction Fuzzy Hash: C241E670A093428FCB23DB78D890AEEFFB1FF59214B14816AC541DB296D7349D48CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790789799.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_17b0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: de4db96b7bcb15fde97a7a458497070906ce021e1a6030dff3bba6dc90535662
                                      • Instruction ID: 5758a8be3ccf6917bdb91a4afbf8eba15aec1a17f1fa4574bb827d6cc40394e5
                                      • Opcode Fuzzy Hash: de4db96b7bcb15fde97a7a458497070906ce021e1a6030dff3bba6dc90535662
                                      • Instruction Fuzzy Hash: 4C312371B052128FCB22CB68D8C0AEEFBA2FF482287148269D515D7795DB34ED44CBD0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790789799.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_17b0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6634396c284a2712b29d60f5befd1cdffa4bacb231ef3b5a1d41de321409f91a
                                      • Instruction ID: d7905e649e57f3fe3c864a6b26f7de4051033966b0dc34517cd6a5f099a4dce9
                                      • Opcode Fuzzy Hash: 6634396c284a2712b29d60f5befd1cdffa4bacb231ef3b5a1d41de321409f91a
                                      • Instruction Fuzzy Hash: 1B21D271E002569FCB01CBB48895AEEFFB6EFA9210F14846ED601A7255DB344805CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790789799.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_17b0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 864d336d7dd8d419908fefd3a03edc4fa91d6f5b65b94641ffe0477513fb4c70
                                      • Instruction ID: 1bbbf4212b3e38a1fddbbcaac03a36cdb43d9c7f9b37ef061d7af1daee672ba9
                                      • Opcode Fuzzy Hash: 864d336d7dd8d419908fefd3a03edc4fa91d6f5b65b94641ffe0477513fb4c70
                                      • Instruction Fuzzy Hash: 7E11EE2158E7C05FCB83AB7048A50AABF719E5711430E40EFD4C9CF1A3DA2E884AC363
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790993989.0000000001A70000.00000040.00000020.00020000.00000000.sdmp, Offset: 01A70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_1a70000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 75a61c198f9c7669047e271b203711aff003a40a64c0a328b402a3b969c3236e
                                      • Instruction ID: 46acc7089de675ead8309b43409141df6b654559d2c8c8b09798a3f513402cdc
                                      • Opcode Fuzzy Hash: 75a61c198f9c7669047e271b203711aff003a40a64c0a328b402a3b969c3236e
                                      • Instruction Fuzzy Hash: 2421793110D7C18FC7138B64CA50B51BFB1AF47604F2985EAE4884BAA3C63A9916DB52
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790993989.0000000001A70000.00000040.00000020.00020000.00000000.sdmp, Offset: 01A70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_1a70000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ceb8f07a69eadde83c2a68149f99f1baa431f3a3099205f50224734faa7e7071
                                      • Instruction ID: a61ddd2cebdc1b405a286cd7afdda1b2b8fb27c4ba7c3789088935b68f4f386f
                                      • Opcode Fuzzy Hash: ceb8f07a69eadde83c2a68149f99f1baa431f3a3099205f50224734faa7e7071
                                      • Instruction Fuzzy Hash: D211E430204680DFD711CB54CE80B26FBA1EB8A708F28C99CF9491BB42C737D903CA81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790789799.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_17b0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2e13d4f7a64faea0a6fbc8c9abe6961113d58133a8680e692aa1f503d3677bf4
                                      • Instruction ID: b04247520eb7002c44c5cdddbe970e1b1351c3b616047b7bb5cae27e2da7fd8f
                                      • Opcode Fuzzy Hash: 2e13d4f7a64faea0a6fbc8c9abe6961113d58133a8680e692aa1f503d3677bf4
                                      • Instruction Fuzzy Hash: E401F731B863509FC72252285851BADBFA18F8A714F2500AFD700EB3A2CB649C0683A5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790993989.0000000001A70000.00000040.00000020.00020000.00000000.sdmp, Offset: 01A70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_1a70000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0f167a63b418f1354002f3bd1cfb06fdc7dab656366c60b43f7da0044e400b24
                                      • Instruction ID: 10f1e77e1769f82d59c9b680e19b23e90486dea6a6084de0cb6c265bc808d3b1
                                      • Opcode Fuzzy Hash: 0f167a63b418f1354002f3bd1cfb06fdc7dab656366c60b43f7da0044e400b24
                                      • Instruction Fuzzy Hash: DA01D6B65083806FC711CF55AC40893FFF8EF8623070984ABEC488B612D135B949CBA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790789799.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_17b0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: eb43b6bd40ae474dcf78988b2850addbc35295af56167f754d504e80160e7384
                                      • Instruction ID: ab909d19d50dd2c2c0f8c89513b3d2c3426a82cd35a50da790af51ce8c0218b8
                                      • Opcode Fuzzy Hash: eb43b6bd40ae474dcf78988b2850addbc35295af56167f754d504e80160e7384
                                      • Instruction Fuzzy Hash: FDF04632B4021097CB3462AD9801BAEB1D6CBC9B54F20002AE701EF3A4CF71EC0743E9
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790993989.0000000001A70000.00000040.00000020.00020000.00000000.sdmp, Offset: 01A70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_1a70000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f5405e8c2313153df6eab1cfdcb54e4ecace335342848f3dcb2b97980fc5d3c2
                                      • Instruction ID: b06cdd45edf6d5ea7141fb6c9b2f4617cab7570ca8a55d030c75de137a1030ad
                                      • Opcode Fuzzy Hash: f5405e8c2313153df6eab1cfdcb54e4ecace335342848f3dcb2b97980fc5d3c2
                                      • Instruction Fuzzy Hash: 03F01D35144644DFC306CB44DA80B26FBA2EB89718F24CAADE9491B752C737E913DE81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790993989.0000000001A70000.00000040.00000020.00020000.00000000.sdmp, Offset: 01A70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_1a70000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 27065834d3679c14a280e1dd80d247470bd943d2604b018833b3ea63da106050
                                      • Instruction ID: bde98b01834d917977c80e13c33937b41434d21e3e4b61c68743a44bdb6d0a1a
                                      • Opcode Fuzzy Hash: 27065834d3679c14a280e1dd80d247470bd943d2604b018833b3ea63da106050
                                      • Instruction Fuzzy Hash: 58E092B6A006445B9750CF0AEC41452F7E8EB88630708C47FDC0D8B701E275B508CAA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790789799.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_17b0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: af1bcdd690bb67d51945bccb6627ea0d3a1db2bb968fb9dac2f97fc64227ca57
                                      • Instruction ID: 99dd30a279cc4e1a99527955fa552f1fe06b4cc924cecf259b3195d219a5bae3
                                      • Opcode Fuzzy Hash: af1bcdd690bb67d51945bccb6627ea0d3a1db2bb968fb9dac2f97fc64227ca57
                                      • Instruction Fuzzy Hash: 5ED0A7726845205BCB0E21A838104FD67998BF7630B11005FD006D62A2CE5D0D0343D5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790789799.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_17b0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: eee06db44795ed59f37a659779d955d9aa49f5e95e1ba1cde4426ded9bc58af5
                                      • Instruction ID: af6efd76f1289eb68f1c1ed3c141e9f4f1106bc472739df499b85d895fb4e15b
                                      • Opcode Fuzzy Hash: eee06db44795ed59f37a659779d955d9aa49f5e95e1ba1cde4426ded9bc58af5
                                      • Instruction Fuzzy Hash: 95C01221300524530E4933B651254FE674ACE62498703007FE11A8A742CF2B894202EA
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1789673423.0000000001472000.00000040.00000800.00020000.00000000.sdmp, Offset: 01472000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_1472000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9e11ca13e783581a9f3ccfcbb594c5742e3f9027264b1d13cd567cd0c72e76a2
                                      • Instruction ID: 88ae8ccff894a75ad6eb9bf3c3cd40d57d40b201852e94b59677b46e45437d26
                                      • Opcode Fuzzy Hash: 9e11ca13e783581a9f3ccfcbb594c5742e3f9027264b1d13cd567cd0c72e76a2
                                      • Instruction Fuzzy Hash: 30D05E7A205AD18FE3169A1CC1A4FD63BE4AB61714F4A44FAA8009B773C7A8E5C1D600
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1789673423.0000000001472000.00000040.00000800.00020000.00000000.sdmp, Offset: 01472000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_1472000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bf77add47f577ccf1576fdedc630c54c085f13e4018bf2b79219fdc612061bbc
                                      • Instruction ID: 277b8c12efddbd533e2cdef113399d27a395c93011b637edd8b33a3f8dd4b870
                                      • Opcode Fuzzy Hash: bf77add47f577ccf1576fdedc630c54c085f13e4018bf2b79219fdc612061bbc
                                      • Instruction Fuzzy Hash: 8BD05E342006814BD715DA2CC6D4F9A3BD4AB50B14F0644EDAC108B772C7B4E8C0CA00
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000002.00000002.1790789799.00000000017B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_17b0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d319de211b6b8ccb7a5a34f7816a201ae2d4ecc9f120b3f2ce9442cae0857169
                                      • Instruction ID: a4de4ae21a62c5e2e2cbfbf9f6c7691ff8dec1219147e7b06b0b8cc0f8e76b6b
                                      • Opcode Fuzzy Hash: d319de211b6b8ccb7a5a34f7816a201ae2d4ecc9f120b3f2ce9442cae0857169
                                      • Instruction Fuzzy Hash: C4C09B71344535530D1E35DE38504AD774D49F7C65B41055FD50957361CE565D0203DE
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Execution Graph

                                      Execution Coverage:14.1%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:2.3%
                                      Total number of Nodes:130
                                      Total number of Limit Nodes:5
                                      execution_graph 7425 5622162 7426 562219a RegCreateKeyExW 7425->7426 7428 562220c 7426->7428 7429 163bce2 7431 163bd17 ReadFile 7429->7431 7432 163bd49 7431->7432 7478 163ba22 7481 163ba57 GetFileType 7478->7481 7480 163ba84 7481->7480 7433 5622b6a 7436 5622b9f GetProcessWorkingSetSize 7433->7436 7435 5622bcb 7436->7435 7437 56203ea 7438 562043a GetComputerNameW 7437->7438 7439 5620448 7438->7439 7482 56213aa 7483 56213e5 LoadLibraryA 7482->7483 7485 5621422 7483->7485 7440 562056e 7441 56205a6 ConvertStringSecurityDescriptorToSecurityDescriptorW 7440->7441 7443 56205e7 7441->7443 7444 163abee 7445 163ac1a OleInitialize 7444->7445 7447 163ac50 7444->7447 7446 163ac28 7445->7446 7447->7445 7489 5622332 7490 5622367 ioctlsocket 7489->7490 7492 5622393 7490->7492 7493 5620032 7494 562006a WSASocketW 7493->7494 7496 56200a6 7494->7496 7448 5620d76 7449 5620db1 getaddrinfo 7448->7449 7451 5620e23 7449->7451 7452 163a7fa 7453 163a832 RegOpenKeyExW 7452->7453 7455 163a888 7453->7455 7497 163afba 7498 163b030 7497->7498 7499 163aff8 DuplicateHandle 7497->7499 7498->7499 7500 163b006 7499->7500 7456 163a2fe 7457 163a353 7456->7457 7458 163a32a SetErrorMode 7456->7458 7457->7458 7459 163a33f 7458->7459 7505 163a902 7508 163a93d SendMessageTimeoutA 7505->7508 7507 163a985 7508->7507 7460 54d0b68 KiUserExceptionDispatcher 7461 54d0b9c 7460->7461 7462 163a646 7465 163a67e CreateMutexW 7462->7465 7464 163a6c1 7465->7464 7509 163a186 7510 163a1f3 7509->7510 7511 163a1bb send 7509->7511 7510->7511 7512 163a1c9 7511->7512 7513 163a486 7514 163a4bb RegSetValueExW 7513->7514 7516 163a507 7514->7516 7517 5620c8a 7519 5620cbf GetProcessTimes 7517->7519 7520 5620cf1 7519->7520 7521 163b90a 7524 163b942 CreateFileW 7521->7524 7523 163b991 7524->7523 7466 5622c4e 7468 5622c83 SetProcessWorkingSetSize 7466->7468 7469 5622caf 7468->7469 7525 562240e 7526 5622437 select 7525->7526 7528 562246c 7526->7528 7529 5622a8e 7531 5622ac3 GetExitCodeProcess 7529->7531 7532 5622aec 7531->7532 7470 163a74e 7471 163a77a FindCloseChangeNotification 7470->7471 7472 163a7b9 7470->7472 7473 163a788 7471->7473 7472->7471 7533 5622912 7535 5622941 AdjustTokenPrivileges 7533->7535 7536 5622963 7535->7536 7537 5622792 7539 56227bb LookupPrivilegeValueW 7537->7539 7540 56227e2 7539->7540 7541 163a392 7542 163a3c7 RegQueryValueExW 7541->7542 7544 163a41b 7542->7544 7474 5620f56 7476 5620f8b WSAConnect 7474->7476 7477 5620faa 7476->7477 7545 54d10b6 7546 54d0d9a 7545->7546 7551 54d10e8 7546->7551 7556 54d1152 7546->7556 7561 54d1183 7546->7561 7566 54d1170 7546->7566 7552 54d1123 7551->7552 7553 54d124c 7552->7553 7571 54d14f1 7552->7571 7575 54d1500 7552->7575 7553->7553 7557 54d1159 7556->7557 7558 54d124c 7557->7558 7559 54d14f1 2 API calls 7557->7559 7560 54d1500 2 API calls 7557->7560 7558->7558 7559->7558 7560->7558 7562 54d118a 7561->7562 7563 54d124c 7562->7563 7564 54d14f1 2 API calls 7562->7564 7565 54d1500 2 API calls 7562->7565 7564->7563 7565->7563 7567 54d1177 7566->7567 7568 54d124c 7567->7568 7569 54d14f1 2 API calls 7567->7569 7570 54d1500 2 API calls 7567->7570 7568->7568 7569->7568 7570->7568 7572 54d152b 7571->7572 7573 54d156c 7572->7573 7579 54d1aa1 7572->7579 7573->7553 7576 54d152b 7575->7576 7577 54d156c 7576->7577 7578 54d1aa1 2 API calls 7576->7578 7577->7553 7578->7577 7580 54d1aaa 7579->7580 7584 56210c8 7580->7584 7588 562111e 7580->7588 7581 54d1b10 7581->7573 7585 562111e GetVolumeInformationA 7584->7585 7587 5621176 7585->7587 7587->7581 7589 562116e GetVolumeInformationA 7588->7589 7590 5621176 7589->7590 7590->7581 7591 562071e 7593 5620756 MapViewOfFile 7591->7593 7594 56207a5 7593->7594
                                      APIs
                                      • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 0562295B
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: AdjustPrivilegesToken
                                      • String ID:
                                      • API String ID: 2874748243-0
                                      • Opcode ID: b3e7282008228c9dee8d013edc0ef7400bd376b41f356ef433c2e7254b971d59
                                      • Instruction ID: 1d0a50843ab2129553b294aebd689eb7663a7ca0febdbf048edd58cab1e30fa1
                                      • Opcode Fuzzy Hash: b3e7282008228c9dee8d013edc0ef7400bd376b41f356ef433c2e7254b971d59
                                      • Instruction Fuzzy Hash: 7C21BF765097809FDB128F25DC44B62BFF4FF06320F08849AE9858B663D234E918CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 0562295B
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: AdjustPrivilegesToken
                                      • String ID:
                                      • API String ID: 2874748243-0
                                      • Opcode ID: 0794141c951b41dd0df77bc2e7a948e299bff0a94647141e1f915790a06a112e
                                      • Instruction ID: 393c6b455cead1094235b56925712305247e9c0f247567c1ebc6fcb2b6726607
                                      • Opcode Fuzzy Hash: 0794141c951b41dd0df77bc2e7a948e299bff0a94647141e1f915790a06a112e
                                      • Instruction Fuzzy Hash: 46115E76A006449FDB20CF56D884B66FBE4FF09220F08C46AED458BA52D335E418DF61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 293 562063f-5620673 294 56206e0-56206f6 293->294 295 5620675-562067c 293->295 295->294
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4350a44db343b0ea65115971c3e1847c0ed03c639e29afdf37199e44d8d5f5e0
                                      • Instruction ID: 908ef013812e55cf47ec64d89b635e07c689a2df741bc11755db41f4625b324d
                                      • Opcode Fuzzy Hash: 4350a44db343b0ea65115971c3e1847c0ed03c639e29afdf37199e44d8d5f5e0
                                      • Instruction Fuzzy Hash: 3541D27240D3C05FD7138B259C49BA6BFB4EF07224F0985DBE9848B6A3D265A90DC762
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 298 54d0b68-54d0ba6 KiUserExceptionDispatcher 301 54d0ba9-54d0baf 298->301 302 54d0cad-54d0cca 301->302 303 54d0bb5-54d0bb8 301->303 304 54d0bba 303->304 335 54d0bbc call 11805df 304->335 336 54d0bbc call 1180606 304->336 306 54d0bc1-54d0bee 311 54d0c35-54d0c38 306->311 312 54d0bf0-54d0bf2 306->312 311->302 314 54d0c3a-54d0c40 311->314 332 54d0bf4 call 11805df 312->332 333 54d0bf4 call 54d1e90 312->333 334 54d0bf4 call 1180606 312->334 314->304 315 54d0c46-54d0c4d 314->315 317 54d0c4f-54d0c65 315->317 318 54d0c9e-54d0ca8 315->318 316 54d0bfa-54d0c01 319 54d0c03-54d0c2a 316->319 320 54d0c32 316->320 317->302 324 54d0c67-54d0c6f 317->324 318->301 319->320 320->311 325 54d0c71-54d0c7c 324->325 326 54d0c90-54d0c98 call 54d2210 324->326 325->302 328 54d0c7e-54d0c88 325->328 326->318 328->326 332->316 333->316 334->316 335->306 336->306
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 054D0B8F
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137587177.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_54d0000_chargeable.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 635c4fe5880a6944564aa3ddfb90abbc9151529dee4424fa03ac17bbcb1cc001
                                      • Instruction ID: 654f543801280054cc52304cebc271fba2dace9a00b51227ba79c47fad808c51
                                      • Opcode Fuzzy Hash: 635c4fe5880a6944564aa3ddfb90abbc9151529dee4424fa03ac17bbcb1cc001
                                      • Instruction Fuzzy Hash: FA415535A002058FCB18DF79D9985DDB7F2EF88214F1480AAD409DB35AEB34DD85CBA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 338 54d0b58-54d0b95 KiUserExceptionDispatcher 339 54d0b9c-54d0ba6 338->339 341 54d0ba9-54d0baf 339->341 342 54d0cad-54d0cca 341->342 343 54d0bb5-54d0bb8 341->343 344 54d0bba 343->344 375 54d0bbc call 11805df 344->375 376 54d0bbc call 1180606 344->376 346 54d0bc1-54d0bee 351 54d0c35-54d0c38 346->351 352 54d0bf0-54d0bf2 346->352 351->342 354 54d0c3a-54d0c40 351->354 372 54d0bf4 call 11805df 352->372 373 54d0bf4 call 54d1e90 352->373 374 54d0bf4 call 1180606 352->374 354->344 355 54d0c46-54d0c4d 354->355 357 54d0c4f-54d0c65 355->357 358 54d0c9e-54d0ca8 355->358 356 54d0bfa-54d0c01 359 54d0c03-54d0c2a 356->359 360 54d0c32 356->360 357->342 364 54d0c67-54d0c6f 357->364 358->341 359->360 360->351 365 54d0c71-54d0c7c 364->365 366 54d0c90-54d0c98 call 54d2210 364->366 365->342 368 54d0c7e-54d0c88 365->368 366->358 368->366 372->356 373->356 374->356 375->346 376->346
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 054D0B8F
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137587177.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_54d0000_chargeable.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 601ceba975784c3f89db52d0a8500955186febd0c981693bfe3b9c321afc30bb
                                      • Instruction ID: 14262ad59949045315d8daeb70b562a81943fc21e638b5257bfe9985ff55007d
                                      • Opcode Fuzzy Hash: 601ceba975784c3f89db52d0a8500955186febd0c981693bfe3b9c321afc30bb
                                      • Instruction Fuzzy Hash: DC414635A102058FCB58DF79C9986AEB7F2EF98214F14806AD809DB359EB34DD45CBA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 378 163b8ca-163b962 382 163b967-163b973 378->382 383 163b964 378->383 384 163b975 382->384 385 163b978-163b981 382->385 383->382 384->385 386 163b983-163b9a7 CreateFileW 385->386 387 163b9d2-163b9d7 385->387 390 163b9d9-163b9de 386->390 391 163b9a9-163b9cf 386->391 387->386 390->391
                                      APIs
                                      • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0163B989
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: CreateFile
                                      • String ID:
                                      • API String ID: 823142352-0
                                      • Opcode ID: 9da90fbb5a4df34a07054d0ec9c650b2f4f1376c727255977c61047842c7b9aa
                                      • Instruction ID: deb1ee8477b8ad054e7115ba3b89e72e28bab8aae3bc7fafc2e72641f2610d0b
                                      • Opcode Fuzzy Hash: 9da90fbb5a4df34a07054d0ec9c650b2f4f1376c727255977c61047842c7b9aa
                                      • Instruction Fuzzy Hash: 8931B271508380AFE722CF65DC44BA2BFE8EF46310F08849EE9858B652D375E409CB71
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 394 5622136-56221ba 398 56221bf-56221cb 394->398 399 56221bc 394->399 400 56221d0-56221d9 398->400 401 56221cd 398->401 399->398 402 56221db 400->402 403 56221de-56221f5 400->403 401->400 402->403 405 5622237-562223c 403->405 406 56221f7-562220a RegCreateKeyExW 403->406 405->406 407 562223e-5622243 406->407 408 562220c-5622234 406->408 407->408
                                      APIs
                                      • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 056221FD
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 8cb3372245cd73954ea9e7cba0626e6f977a724f5aa3091e75cb4906a8e4c4e8
                                      • Instruction ID: 4207048957edd316ab40b2445a8551515e2d9f2a9d62cdf84b087dc94a9dfd5c
                                      • Opcode Fuzzy Hash: 8cb3372245cd73954ea9e7cba0626e6f977a724f5aa3091e75cb4906a8e4c4e8
                                      • Instruction Fuzzy Hash: A6319E76504744AFE722CF65CC44FA7BBFCFF05210F08459AE9858BA62D324E948CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 413 163be37-163be57 414 163be79-163beab 413->414 415 163be59-163be78 413->415 419 163beae-163bf06 RegQueryValueExW 414->419 415->414 421 163bf0c-163bf22 419->421
                                      APIs
                                      • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 0163BEFE
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: QueryValue
                                      • String ID:
                                      • API String ID: 3660427363-0
                                      • Opcode ID: 07e7ffc4b141f66aefc78009e69426b5e59118c35e8b658e822f1dc0903883ad
                                      • Instruction ID: cb2c9e7ff9a1dbd43c434c5945db8b947ca2ed07f1d75265f5c630e2ae59a801
                                      • Opcode Fuzzy Hash: 07e7ffc4b141f66aefc78009e69426b5e59118c35e8b658e822f1dc0903883ad
                                      • Instruction Fuzzy Hash: 06316F7550E3C06FD3138B258C65A61BFB4EF87610B0E45CBD9C48B6A3D2296919C7B2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 422 163a7c7-163a855 426 163a857 422->426 427 163a85a-163a871 422->427 426->427 429 163a8b3-163a8b8 427->429 430 163a873-163a886 RegOpenKeyExW 427->430 429->430 431 163a8ba-163a8bf 430->431 432 163a888-163a8b0 430->432 431->432
                                      APIs
                                      • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 0163A879
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: Open
                                      • String ID:
                                      • API String ID: 71445658-0
                                      • Opcode ID: f3c9c55e1269baca47a619c1730db7c04ab5dd7ecd5db9c9b5d7a1f0ebd8fa2b
                                      • Instruction ID: afed9dcaf502a9128e66353641d8e1ac048eb9a5c8230bb1d6287c0d1834e17f
                                      • Opcode Fuzzy Hash: f3c9c55e1269baca47a619c1730db7c04ab5dd7ecd5db9c9b5d7a1f0ebd8fa2b
                                      • Instruction Fuzzy Hash: 2631B1B24083846FE7228B658C44FA7BFBCEF46210F08459AE984CB653D364A90DC7B1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 437 5620d54-5620e13 443 5620e65-5620e6a 437->443 444 5620e15-5620e1d getaddrinfo 437->444 443->444 445 5620e23-5620e35 444->445 447 5620e37-5620e62 445->447 448 5620e6c-5620e71 445->448 448->447
                                      APIs
                                      • getaddrinfo.WS2_32(?,00000E24), ref: 05620E1B
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: getaddrinfo
                                      • String ID:
                                      • API String ID: 300660673-0
                                      • Opcode ID: 731ce8901e1428eb723a6f853836daa7c9d8ed0ba4cf4701bee72f889d17e478
                                      • Instruction ID: 44bfcdfe88a66637e9fb38a98aa52d63335b2235dd33bbd56cc8f83c5765b40c
                                      • Opcode Fuzzy Hash: 731ce8901e1428eb723a6f853836daa7c9d8ed0ba4cf4701bee72f889d17e478
                                      • Instruction Fuzzy Hash: F031CFB2504340AFE7218B51DC84FA7FBACEB44720F04489AFA489B691D375A94CCB60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 452 5620c4c-5620c57 453 5620cc4-5620cc6 452->453 454 5620c59-5620cc2 452->454 455 5620ce0-5620ce1 453->455 456 5620cc8-5620cdd 453->456 454->453 458 5620ce3-5620ceb GetProcessTimes 455->458 459 5620d2e-5620d33 455->459 456->455 463 5620cf1-5620d03 458->463 459->458 465 5620d35-5620d3a 463->465 466 5620d05-5620d2b 463->466 465->466
                                      APIs
                                      • GetProcessTimes.KERNELBASE(?,00000E24,5EEFD804,00000000,00000000,00000000,00000000), ref: 05620CE9
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: ProcessTimes
                                      • String ID:
                                      • API String ID: 1995159646-0
                                      • Opcode ID: 60bbb1ee469bae3e60bc5dfd5f4bdb4f791e4bac2842e80c6e1e93fd784dcfeb
                                      • Instruction ID: 51ff77dbbeb1ec7333f41b5319b2a786bca2f3feb7bc656472c744fd6a31be56
                                      • Opcode Fuzzy Hash: 60bbb1ee469bae3e60bc5dfd5f4bdb4f791e4bac2842e80c6e1e93fd784dcfeb
                                      • Instruction Fuzzy Hash: 2031E5B65097806FD7228F21DC45FA6BFB8EF46324F0884DAE8848F592D234A549CB71
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 485 5620548-56205c9 489 56205cb 485->489 490 56205ce-56205d7 485->490 489->490 491 56205d9-56205e1 ConvertStringSecurityDescriptorToSecurityDescriptorW 490->491 492 562062f-5620634 490->492 494 56205e7-56205f9 491->494 492->491 495 5620636-562063b 494->495 496 56205fb-562062c 494->496 495->496
                                      APIs
                                      • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 056205DF
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: DescriptorSecurity$ConvertString
                                      • String ID:
                                      • API String ID: 3907675253-0
                                      • Opcode ID: a37771b9058686f4329b554afdf4d040e494bfc26426caf0708c682b50fe064e
                                      • Instruction ID: 91a2bc65088d776770211411d5a81597b633de792073d251d79662088397c2e3
                                      • Opcode Fuzzy Hash: a37771b9058686f4329b554afdf4d040e494bfc26426caf0708c682b50fe064e
                                      • Instruction Fuzzy Hash: A631BF72509384AFE7218F65DC45FA7BBB8EF45220F0884AAE944DB652D324A948CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 469 163a612-163a695 473 163a697 469->473 474 163a69a-163a6a3 469->474 473->474 475 163a6a5 474->475 476 163a6a8-163a6b1 474->476 475->476 477 163a6b3-163a6d7 CreateMutexW 476->477 478 163a702-163a707 476->478 481 163a709-163a70e 477->481 482 163a6d9-163a6ff 477->482 478->477 481->482
                                      APIs
                                      • CreateMutexW.KERNELBASE(?,?), ref: 0163A6B9
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: CreateMutex
                                      • String ID:
                                      • API String ID: 1964310414-0
                                      • Opcode ID: da9382cfdfa04a327ca586028835d46c1379ab84d69c7017764c2ff17fbf835e
                                      • Instruction ID: 8f40267b63b8903333b9091abad51b0e13b525aa50f41c1ca3e408a8618633b7
                                      • Opcode Fuzzy Hash: da9382cfdfa04a327ca586028835d46c1379ab84d69c7017764c2ff17fbf835e
                                      • Instruction Fuzzy Hash: 8E31B3B55093805FE712CB65CC85B96FFF8EF46210F08849AE984CB292D375E909C761
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 056221FD
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 778ee849586d09cdbe6e98d10326768f58a0acef17875d5f6ab8f6cd1d575b36
                                      • Instruction ID: 3a10773b152575a464253019041106edf22eba58cd75425e7667e1935301c5f1
                                      • Opcode Fuzzy Hash: 778ee849586d09cdbe6e98d10326768f58a0acef17875d5f6ab8f6cd1d575b36
                                      • Instruction Fuzzy Hash: 77219C76500604AFEB21CE56CD44FABBBECEF08224F08855AEA45C7A51D720E549CEA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 500 163a8c1-163a975 504 163a977-163a97f SendMessageTimeoutA 500->504 505 163a9b9-163a9be 500->505 506 163a985-163a997 504->506 505->504 508 163a9c0-163a9c5 506->508 509 163a999-163a9b6 506->509 508->509
                                      APIs
                                      • SendMessageTimeoutA.USER32(?,00000E24), ref: 0163A97D
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: MessageSendTimeout
                                      • String ID:
                                      • API String ID: 1599653421-0
                                      • Opcode ID: e00353519727c5ef6370d9b4e457170d63551dce299da3fdc8cd9bd103dbd708
                                      • Instruction ID: 3290c455061fc711e4c1413da24dd8ad3cc3d9fe341baa6d86924c3b5b353e16
                                      • Opcode Fuzzy Hash: e00353519727c5ef6370d9b4e457170d63551dce299da3fdc8cd9bd103dbd708
                                      • Instruction Fuzzy Hash: FE31F672404380AFEB228F61CC45FA2FFB8EF46310F08849AE9848B593D375A50DCB65
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • RegQueryValueExW.KERNELBASE(?,00000E24,5EEFD804,00000000,00000000,00000000,00000000), ref: 0163A40C
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: QueryValue
                                      • String ID:
                                      • API String ID: 3660427363-0
                                      • Opcode ID: 31f1c1aef001789e7c5319dd16c2283677cecd07f6ec7568971ea7cdc58b1c39
                                      • Instruction ID: 9d2f559e441211f4bc54c1b029c3396fc2c19847b9d81afd7aa10887ecc206ab
                                      • Opcode Fuzzy Hash: 31f1c1aef001789e7c5319dd16c2283677cecd07f6ec7568971ea7cdc58b1c39
                                      • Instruction Fuzzy Hash: 74318175509780AFE722CF55CC84F92BFF8EF46310F08849AE985CB692D364E949CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • getaddrinfo.WS2_32(?,00000E24), ref: 05620E1B
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: getaddrinfo
                                      • String ID:
                                      • API String ID: 300660673-0
                                      • Opcode ID: 078e485bb0935dd80b0a61e614ca44f2416fd0282a59bfd66517051fa163adc5
                                      • Instruction ID: b430a0526de585c15b6caa650b11bf5710ba6f48109c87edec03b9fc4d990108
                                      • Opcode Fuzzy Hash: 078e485bb0935dd80b0a61e614ca44f2416fd0282a59bfd66517051fa163adc5
                                      • Instruction Fuzzy Hash: 53219F72500204AEEB20DF51DD85FB6FBACEF04724F04485AFA889B681D775A98DCB71
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetVolumeInformationA.KERNELBASE(?,00000E24,?,?), ref: 0562116E
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: InformationVolume
                                      • String ID:
                                      • API String ID: 2039140958-0
                                      • Opcode ID: 16b8287c9a97a3a01ca268f21f527408371082e68346e9a2105c346a1343f171
                                      • Instruction ID: 4ced08467e55e1d2cbd9673430d69fe6510a6bd63e316363eb4b8cf0677e4f53
                                      • Opcode Fuzzy Hash: 16b8287c9a97a3a01ca268f21f527408371082e68346e9a2105c346a1343f171
                                      • Instruction Fuzzy Hash: DB31917150D3C06FD3128B258C55B62BFB8EF87610F0980DBE884DF693D225A949C7A2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • WSASocketW.WS2_32(?,?,?,?,?), ref: 0562009E
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: Socket
                                      • String ID:
                                      • API String ID: 38366605-0
                                      • Opcode ID: b1748f8e32d687bf13d3a3f1295702b99970b287e40610d52cc202377d1b63fb
                                      • Instruction ID: 2374581dc014e526035bdfd192bafc0d696d466cadd1ee5ecd431f064eb83dce
                                      • Opcode Fuzzy Hash: b1748f8e32d687bf13d3a3f1295702b99970b287e40610d52cc202377d1b63fb
                                      • Instruction Fuzzy Hash: 1431B171409380AFE722CF65DC44F56FFF8EF06220F08849AE9858B652D375A448CB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: select
                                      • String ID:
                                      • API String ID: 1274211008-0
                                      • Opcode ID: 808551d0388bcf0b6cfb4769652fc22f03e07e54ed846864384c857bbc84a06d
                                      • Instruction ID: 6fe0cd5417308165ae8816f9a714ebea0e1c1a56922689099267fff3c3d5b016
                                      • Opcode Fuzzy Hash: 808551d0388bcf0b6cfb4769652fc22f03e07e54ed846864384c857bbc84a06d
                                      • Instruction Fuzzy Hash: 34217E755087849FDB12CF25DC44B62BFF8FF46214F0884DAE984CB662D234E909CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetFileType.KERNELBASE(?,00000E24,5EEFD804,00000000,00000000,00000000,00000000), ref: 0163BA75
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: FileType
                                      • String ID:
                                      • API String ID: 3081899298-0
                                      • Opcode ID: df1e2cb26870875fa63461dd7636486d859dfad131acca8721dd681ab8aaf110
                                      • Instruction ID: eef8cc926b0e5339ffa09882188b7aa5acbaf88553caeab714480790d079ba2f
                                      • Opcode Fuzzy Hash: df1e2cb26870875fa63461dd7636486d859dfad131acca8721dd681ab8aaf110
                                      • Instruction Fuzzy Hash: 3921F8B54097806FE7138B25DC45BA2BFBCEF47724F0880D6ED808B693D264A909C7B1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetExitCodeProcess.KERNELBASE(?,00000E24,5EEFD804,00000000,00000000,00000000,00000000), ref: 05622AE4
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: CodeExitProcess
                                      • String ID:
                                      • API String ID: 3861947596-0
                                      • Opcode ID: bc8fb930ebe30ff66bee2dd7d7b004f109edd6b6156d3ee01c2a7f2da20e77cf
                                      • Instruction ID: b6ccf9370463aa8476696f3373a438dc101d24f15a538bbf19c66a833258ac59
                                      • Opcode Fuzzy Hash: bc8fb930ebe30ff66bee2dd7d7b004f109edd6b6156d3ee01c2a7f2da20e77cf
                                      • Instruction Fuzzy Hash: 3421C4755093806FE712CF25DC45FA6BFB8EF42224F0884DAE944DF692D264A908C771
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • RegSetValueExW.KERNELBASE(?,00000E24,5EEFD804,00000000,00000000,00000000,00000000), ref: 0163A4F8
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: Value
                                      • String ID:
                                      • API String ID: 3702945584-0
                                      • Opcode ID: c60fbc0a9b513f80c32626d90d2a7fb3aa8946db0ceb3cd3a150f4129860a991
                                      • Instruction ID: 56ca89027ac5726b3acc53709a4a550e9d028e0cb625e8d3d495a728d4248113
                                      • Opcode Fuzzy Hash: c60fbc0a9b513f80c32626d90d2a7fb3aa8946db0ceb3cd3a150f4129860a991
                                      • Instruction Fuzzy Hash: 872192725093806FD7228F55DC44FA7BFB8EF46220F08849AE985CB692D364E848C771
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 056205DF
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: DescriptorSecurity$ConvertString
                                      • String ID:
                                      • API String ID: 3907675253-0
                                      • Opcode ID: 0453e32073862aa0b67251faacd18f52d8519071a226f412b7b6b5cff778aae5
                                      • Instruction ID: bd0b6407ed5d099143ba6cc0f0bcee63e9387b243d9aabb548d2d1c1b6c5ed20
                                      • Opcode Fuzzy Hash: 0453e32073862aa0b67251faacd18f52d8519071a226f412b7b6b5cff778aae5
                                      • Instruction Fuzzy Hash: 4621C272500604AFE720DF65DD45FABBBACEF44220F08846AE945DBA41D734E548CAB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0163B989
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: CreateFile
                                      • String ID:
                                      • API String ID: 823142352-0
                                      • Opcode ID: e188a228b99b8a2b9643aef3b215386d9675086923c5c292d1ff779490369ddf
                                      • Instruction ID: 5f83b9079df5739fe570bef9720d53d3d51a1fd7d2bb4dc9d8d9f037e66937f6
                                      • Opcode Fuzzy Hash: e188a228b99b8a2b9643aef3b215386d9675086923c5c292d1ff779490369ddf
                                      • Instruction Fuzzy Hash: 3921B071504200AFEB21CF66DD85B66FBE8EF49320F08846EE9458BB92D375E408CB71
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • RegQueryValueExW.KERNELBASE(?,00000E24,5EEFD804,00000000,00000000,00000000,00000000), ref: 056204F4
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: QueryValue
                                      • String ID:
                                      • API String ID: 3660427363-0
                                      • Opcode ID: 88612814e4c8958395151dca3dd119a14f4306aecb6516a5859b840c0f1a2433
                                      • Instruction ID: 3cf11909b1597b5dee9eb327f70fbdcf3306d42c767c0d5d07e4ae41d2b272b9
                                      • Opcode Fuzzy Hash: 88612814e4c8958395151dca3dd119a14f4306aecb6516a5859b840c0f1a2433
                                      • Instruction Fuzzy Hash: 6921AF72508740AFD721CF55CC48FA7FBF8EF45220F08849AE9459BA92D364E948CBB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 0163A879
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: Open
                                      • String ID:
                                      • API String ID: 71445658-0
                                      • Opcode ID: 7cbf38f6d7f6d300c290b2dec4bad6b0839a43325aeeb0c7ae6247ef11c28f06
                                      • Instruction ID: c9927ca5336c3268df84a8846b6520e0e4cdd62365b914b3893fa48ae9428b17
                                      • Opcode Fuzzy Hash: 7cbf38f6d7f6d300c290b2dec4bad6b0839a43325aeeb0c7ae6247ef11c28f06
                                      • Instruction Fuzzy Hash: FE21CF72500204AFE7218F95CD44FABFBECEF44224F04855AE945CBB41D774E54D8AB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetProcessWorkingSetSize.KERNEL32(?,00000E24,5EEFD804,00000000,00000000,00000000,00000000), ref: 05622BC3
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: ProcessSizeWorking
                                      • String ID:
                                      • API String ID: 3584180929-0
                                      • Opcode ID: 8ed1a4c70b10ed47ee22b4605e7b3d17a449db04549308104eeadc0d6b4499c7
                                      • Instruction ID: 7c494f37d4ba798acf21e1bcd993298c9adcce1466293361f8300755a5dbc541
                                      • Opcode Fuzzy Hash: 8ed1a4c70b10ed47ee22b4605e7b3d17a449db04549308104eeadc0d6b4499c7
                                      • Instruction Fuzzy Hash: 3521D4B15093806FD711CF65CC44FA6FFB8EF46220F0884AAE944DB652D374A948CBB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SetProcessWorkingSetSize.KERNEL32(?,00000E24,5EEFD804,00000000,00000000,00000000,00000000), ref: 05622CA7
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: ProcessSizeWorking
                                      • String ID:
                                      • API String ID: 3584180929-0
                                      • Opcode ID: 8ed1a4c70b10ed47ee22b4605e7b3d17a449db04549308104eeadc0d6b4499c7
                                      • Instruction ID: 75bf98fe56015e07fc15c24946dfffa175953cecfe5d3324e95645cc5e0e1cd6
                                      • Opcode Fuzzy Hash: 8ed1a4c70b10ed47ee22b4605e7b3d17a449db04549308104eeadc0d6b4499c7
                                      • Instruction Fuzzy Hash: 4121C2715083846FD712CF65CC45FA6BFA8EF46220F0884AAE944CB652D264A908CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • CreateMutexW.KERNELBASE(?,?), ref: 0163A6B9
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: CreateMutex
                                      • String ID:
                                      • API String ID: 1964310414-0
                                      • Opcode ID: 2e07440e58cc890b33161b2b8a71a24546fb595c885b3a1a168fe8d31e0b8c4f
                                      • Instruction ID: 911e3fd15f19f6ebcbf5714d08acfa8ae889ee149437a3e6e2404473c154e83d
                                      • Opcode Fuzzy Hash: 2e07440e58cc890b33161b2b8a71a24546fb595c885b3a1a168fe8d31e0b8c4f
                                      • Instruction Fuzzy Hash: 7F21D4B56042009FE711CFA5CD85BA6FBE8EF45220F08846AE989CB741D775E409CA71
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: send
                                      • String ID:
                                      • API String ID: 2809346765-0
                                      • Opcode ID: 1520fc636a31af3d331d2dceac3e8f2bff063b0b1c95117a30bab4f987ed2e4c
                                      • Instruction ID: b60053319826b9386aaa6455f9f6355720e8f0883da5d03af13d1ce7a1790bf6
                                      • Opcode Fuzzy Hash: 1520fc636a31af3d331d2dceac3e8f2bff063b0b1c95117a30bab4f987ed2e4c
                                      • Instruction Fuzzy Hash: B021AC3140D3C09FD7238B658C54A92BFB4EF47220F0985DBD984CF5A3D229A809CB72
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • ReadFile.KERNELBASE(?,00000E24,5EEFD804,00000000,00000000,00000000,00000000), ref: 0163BD41
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: FileRead
                                      • String ID:
                                      • API String ID: 2738559852-0
                                      • Opcode ID: 1746a9971c958cdf09986f86a906f5c0597e03cd69a8bb0c71c52c8bf1816558
                                      • Instruction ID: 2f77bc63b7284542835f967ad97940b40458ff6c8401914fa939833c7c01ca03
                                      • Opcode Fuzzy Hash: 1746a9971c958cdf09986f86a906f5c0597e03cd69a8bb0c71c52c8bf1816558
                                      • Instruction Fuzzy Hash: 85219272409380AFD722CF55DC44F96FFB8EF45324F08849AE9449B652D374A508CBB2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • ioctlsocket.WS2_32(?,00000E24,5EEFD804,00000000,00000000,00000000,00000000), ref: 0562238B
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: ioctlsocket
                                      • String ID:
                                      • API String ID: 3577187118-0
                                      • Opcode ID: 3106dcdbe0c0a35df3370b3c5bb43d3281cecaf5581f89130d4f3c1345d050cb
                                      • Instruction ID: e115521121610e36e51889c421aeef33b58e68620953884f650d41222a63acec
                                      • Opcode Fuzzy Hash: 3106dcdbe0c0a35df3370b3c5bb43d3281cecaf5581f89130d4f3c1345d050cb
                                      • Instruction Fuzzy Hash: 9C21D271409384AFD722CF51CC84FA6FFB8EF46224F08849BE9449B692D374A508CBB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • RegQueryValueExW.KERNELBASE(?,00000E24,5EEFD804,00000000,00000000,00000000,00000000), ref: 0163A40C
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: QueryValue
                                      • String ID:
                                      • API String ID: 3660427363-0
                                      • Opcode ID: 0c6b08f6cd76d7c4aadf758cc96cbb69aa2bfc707240aec45e69049870e2b050
                                      • Instruction ID: 90d2f027c792d999246d60f39c833f1401d3423f1c2c7b57b98c17190b41630b
                                      • Opcode Fuzzy Hash: 0c6b08f6cd76d7c4aadf758cc96cbb69aa2bfc707240aec45e69049870e2b050
                                      • Instruction Fuzzy Hash: E021A2766002049FE721CF55CC84FA6FBECEF44720F08845AE985CB752D764E849DAB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 05620FA2
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: Connect
                                      • String ID:
                                      • API String ID: 3144859779-0
                                      • Opcode ID: d9ee33f3ee8a866639fca70b746b1f2311887b7701cc9803cfbf1ee1a488ab78
                                      • Instruction ID: d084bcacb4f363ca1010caf673cd7d53e35d2a07763fedc4b3e23de38e21ab12
                                      • Opcode Fuzzy Hash: d9ee33f3ee8a866639fca70b746b1f2311887b7701cc9803cfbf1ee1a488ab78
                                      • Instruction Fuzzy Hash: 32219F71508784AFDB228F55DC44B62FFF4FF4A220F08849AED858B662D335A918DB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • WSASocketW.WS2_32(?,?,?,?,?), ref: 0562009E
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: Socket
                                      • String ID:
                                      • API String ID: 38366605-0
                                      • Opcode ID: e4f6cf21805347094aa1e89af3b9e1a8d1d5038762228821a14513730f29db55
                                      • Instruction ID: 31862eb300d0eff3ec0722b6bdce9cb54f3e6cf4d6e62a4a161ca100d33050b2
                                      • Opcode Fuzzy Hash: e4f6cf21805347094aa1e89af3b9e1a8d1d5038762228821a14513730f29db55
                                      • Instruction Fuzzy Hash: 38210E71500240AFEB20CF95DD44FAAFBE8EF08320F08885AE9458BB41D375E409CB72
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: FileView
                                      • String ID:
                                      • API String ID: 3314676101-0
                                      • Opcode ID: 69044cb83fe5a85cb513cde91ba30ed9e0a3845c0d7f0c7af0b98f7bd161d01e
                                      • Instruction ID: ad62e4b2452830e85766b275fd2a1126867b3b733b2978f8a0f74b7e1cd064d1
                                      • Opcode Fuzzy Hash: 69044cb83fe5a85cb513cde91ba30ed9e0a3845c0d7f0c7af0b98f7bd161d01e
                                      • Instruction Fuzzy Hash: A121FD72404204AFE721CF95DD89FA6FBE8EF08224F08845AE9458BB41D375E449CFA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryA.KERNELBASE(?,00000E24), ref: 05621413
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: 728ed28ea1e069c3fa5f124bc7259efec5df3dda0e8878a124c5fd7304da372e
                                      • Instruction ID: 88bbdc06d16dc9d657e84bd588b41a15030e0ad08e8182a22d98641f418755fd
                                      • Opcode Fuzzy Hash: 728ed28ea1e069c3fa5f124bc7259efec5df3dda0e8878a124c5fd7304da372e
                                      • Instruction Fuzzy Hash: 1211D6715083406FE721CF55DC85FA6FFB8EF46720F08809AF9449B692D274A948CB66
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SendMessageTimeoutA.USER32(?,00000E24), ref: 0163A97D
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: MessageSendTimeout
                                      • String ID:
                                      • API String ID: 1599653421-0
                                      • Opcode ID: f943227596e88508272018c6078af156900f6696498c7fcef28e0e7b5a2ff247
                                      • Instruction ID: d3e06a0c51f7435a431dc96bb8a326fe3006c8168dca274f09473dfce667a245
                                      • Opcode Fuzzy Hash: f943227596e88508272018c6078af156900f6696498c7fcef28e0e7b5a2ff247
                                      • Instruction Fuzzy Hash: 7521E172500200AFEB218F95DD40FA6FBA8EF44720F08845AEE859BA91D375E509DBB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • RegQueryValueExW.KERNELBASE(?,00000E24,5EEFD804,00000000,00000000,00000000,00000000), ref: 056204F4
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: QueryValue
                                      • String ID:
                                      • API String ID: 3660427363-0
                                      • Opcode ID: 70d054bebff274de6406179764ca7229a0addd8582b8fd8869733ca0d4e51282
                                      • Instruction ID: 484709570c1bbec53e68aa15d19c74ba70d7ca8e08242958aa247f246ad81a24
                                      • Opcode Fuzzy Hash: 70d054bebff274de6406179764ca7229a0addd8582b8fd8869733ca0d4e51282
                                      • Instruction Fuzzy Hash: D211B172504600EFEB20CF55CD88FA6F7ECEF04724F08855AE9459BB51D760E548CAB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • RegSetValueExW.KERNELBASE(?,00000E24,5EEFD804,00000000,00000000,00000000,00000000), ref: 0163A4F8
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: Value
                                      • String ID:
                                      • API String ID: 3702945584-0
                                      • Opcode ID: b39eaff6e7d8d949df525adb6a5fc0c11956e0c9f8dd0eab7958e3d5919988c5
                                      • Instruction ID: ac224f9b4cf7c568bb6b51df4162058194702f68b645a1c26a0ab7f59c70ebad
                                      • Opcode Fuzzy Hash: b39eaff6e7d8d949df525adb6a5fc0c11956e0c9f8dd0eab7958e3d5919988c5
                                      • Instruction Fuzzy Hash: 2711BEB2500200AFEB218E55CC45FA6FBECEF44624F08845AED85CBB82D360E448DAB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 056227DA
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: LookupPrivilegeValue
                                      • String ID:
                                      • API String ID: 3899507212-0
                                      • Opcode ID: 078bd1f154938e9c6b13494134df2f9eb4240ce4287913c9289881407bbd8fba
                                      • Instruction ID: 4c476ec2c4b867f1724890417422f8286f140885d962fc94e35327f5020fc8ca
                                      • Opcode Fuzzy Hash: 078bd1f154938e9c6b13494134df2f9eb4240ce4287913c9289881407bbd8fba
                                      • Instruction Fuzzy Hash: 6D11AF756083809FD761CF25DC85B62BFE8EF45220F0884AAE945CBA52D234E808CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetProcessTimes.KERNELBASE(?,00000E24,5EEFD804,00000000,00000000,00000000,00000000), ref: 05620CE9
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: ProcessTimes
                                      • String ID:
                                      • API String ID: 1995159646-0
                                      • Opcode ID: 188a405f4674069922d131be9515270719e792c5ec326f76b615ecbdf5f0b732
                                      • Instruction ID: 74f6113425725d73015e0b9363084e447559c2be3e71a04e618c304714db9ed9
                                      • Opcode Fuzzy Hash: 188a405f4674069922d131be9515270719e792c5ec326f76b615ecbdf5f0b732
                                      • Instruction Fuzzy Hash: 24112672500600AFEB20CF51DC44FA6FBE8EF44320F08886AE9058BA45D330E448CFB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • FindCloseChangeNotification.KERNELBASE(?), ref: 0163A780
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: ChangeCloseFindNotification
                                      • String ID:
                                      • API String ID: 2591292051-0
                                      • Opcode ID: 0ba7dec601b5f408c4960e6998d7a5fd21e3eb564c09fee424c1b548b42f03b2
                                      • Instruction ID: cb6061557a2716102e1c411dcd66c6389fe61d0ac52feab69ecc40da402ad4aa
                                      • Opcode Fuzzy Hash: 0ba7dec601b5f408c4960e6998d7a5fd21e3eb564c09fee424c1b548b42f03b2
                                      • Instruction Fuzzy Hash: 2211D6B59043849FD712CF55DD85752BFB8EF46320F0884ABED858B653D3349905CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetProcessWorkingSetSize.KERNEL32(?,00000E24,5EEFD804,00000000,00000000,00000000,00000000), ref: 05622BC3
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: ProcessSizeWorking
                                      • String ID:
                                      • API String ID: 3584180929-0
                                      • Opcode ID: 02202e31429c6eaf177611951a5f2c2bdbd5fec07f06909dc3273663ccef5b5d
                                      • Instruction ID: 86782e7eb8138395517799d72bd98cfffcec65c7bfa1e82e68c9070c0d846b0e
                                      • Opcode Fuzzy Hash: 02202e31429c6eaf177611951a5f2c2bdbd5fec07f06909dc3273663ccef5b5d
                                      • Instruction Fuzzy Hash: 4511C4756046049FE710CF55DC85BA6FBA8EF45324F08846AED05CBA41D774E548CBB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SetProcessWorkingSetSize.KERNEL32(?,00000E24,5EEFD804,00000000,00000000,00000000,00000000), ref: 05622CA7
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: ProcessSizeWorking
                                      • String ID:
                                      • API String ID: 3584180929-0
                                      • Opcode ID: 02202e31429c6eaf177611951a5f2c2bdbd5fec07f06909dc3273663ccef5b5d
                                      • Instruction ID: ee75e84dbcf011d8d14f36fc61bfa68f30a6c32ec2332957264e2f7a3549c439
                                      • Opcode Fuzzy Hash: 02202e31429c6eaf177611951a5f2c2bdbd5fec07f06909dc3273663ccef5b5d
                                      • Instruction Fuzzy Hash: 15110176600600AFEB20CF55DC85FA6FBA8EF44224F08846AED08CBB41D374E508CAB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetComputerNameW.KERNEL32(?,00000E24,?,?), ref: 0562043A
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: ComputerName
                                      • String ID:
                                      • API String ID: 3545744682-0
                                      • Opcode ID: 7e6ee9eac72ec79c53464b0527d5d3b9a553ef99f0663de2a6c437f6d7bb090d
                                      • Instruction ID: dccb8d765ea0d1ae6a53b4d96e538c15580ecac0394adfa9b263ec000d1da162
                                      • Opcode Fuzzy Hash: 7e6ee9eac72ec79c53464b0527d5d3b9a553ef99f0663de2a6c437f6d7bb090d
                                      • Instruction Fuzzy Hash: 3011C871909340AFD3118B15CC45F76BFB8EFC6620F09819AEC449B782D625B919C7B6
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetExitCodeProcess.KERNELBASE(?,00000E24,5EEFD804,00000000,00000000,00000000,00000000), ref: 05622AE4
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: CodeExitProcess
                                      • String ID:
                                      • API String ID: 3861947596-0
                                      • Opcode ID: 64b57842e3d2af57f242a802ed8e5aa67dd824258ce0d7ba063322cc8b2dd890
                                      • Instruction ID: 967c3d6b37a0b0270bbaf4d6d7883b97b4708e34198a8a1033ac47eb9fe3f67d
                                      • Opcode Fuzzy Hash: 64b57842e3d2af57f242a802ed8e5aa67dd824258ce0d7ba063322cc8b2dd890
                                      • Instruction Fuzzy Hash: 0211E375500200AFEB11CF55DD85BA6B7A8EF44224F18846AED04DBB41D774E548CAB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0163AFFE
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 7375731b13a6e58496ad851caeac935edc99f522f9a28d2db9c7b41d08f50e5b
                                      • Instruction ID: 473d670205edfe0929d18f6d950bcca0a0e51b612e3c8fa328542b9209f97b15
                                      • Opcode Fuzzy Hash: 7375731b13a6e58496ad851caeac935edc99f522f9a28d2db9c7b41d08f50e5b
                                      • Instruction Fuzzy Hash: 36117271409380AFDB228F55DC44B62FFF4EF8A320F08849AED858B662D375A519DB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • ReadFile.KERNELBASE(?,00000E24,5EEFD804,00000000,00000000,00000000,00000000), ref: 0163BD41
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: FileRead
                                      • String ID:
                                      • API String ID: 2738559852-0
                                      • Opcode ID: e5203a4734d92345993677725ee50238af52f529eabdaf54c22adf96bc0986f4
                                      • Instruction ID: b8d73440c0aca6df6b6e94237b9650bcc4658fc92ac418038d50cd35147fcc94
                                      • Opcode Fuzzy Hash: e5203a4734d92345993677725ee50238af52f529eabdaf54c22adf96bc0986f4
                                      • Instruction Fuzzy Hash: C911E372500200EFEB21CF55DC84FA6FBE8EF84324F08845AE9458BA51D374E549CBB2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • ioctlsocket.WS2_32(?,00000E24,5EEFD804,00000000,00000000,00000000,00000000), ref: 0562238B
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: ioctlsocket
                                      • String ID:
                                      • API String ID: 3577187118-0
                                      • Opcode ID: 5bc431191baae3784d78a705108024c0dd1f1c45783fd6ee7c7b75d3fc0de77c
                                      • Instruction ID: ca13c19f407438f9441fa71d811552b4c981b932456295e90b65e5cfcfc7f48e
                                      • Opcode Fuzzy Hash: 5bc431191baae3784d78a705108024c0dd1f1c45783fd6ee7c7b75d3fc0de77c
                                      • Instruction Fuzzy Hash: 0211E076500204AFEB20CF51CC84FAAFBE8EF44724F08846AED049BA41D374E508CAB2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: Initialize
                                      • String ID:
                                      • API String ID: 2538663250-0
                                      • Opcode ID: f4855bc7960433b0984cb71516cf75e75a47db29d9a476b59a0da7ab20a8ad58
                                      • Instruction ID: 1a16829fdc3aeca2ffa4daea337afadb093f6a48ab49fcac3f9a290ff5c7ad2e
                                      • Opcode Fuzzy Hash: f4855bc7960433b0984cb71516cf75e75a47db29d9a476b59a0da7ab20a8ad58
                                      • Instruction Fuzzy Hash: 061182715493C0AFDB128F65DC44B52BFB4EF47220F0884DAED848F253D275A548DB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryA.KERNELBASE(?,00000E24), ref: 05621413
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: e7b92a512b72c8e644d2438e3572d797695ca8da74aa135e0faca6ceacb35b14
                                      • Instruction ID: 7c1b824c8a2ee5fd0037a6b0d46673d54cfb1e8614d20ff79ec79f7b616892ee
                                      • Opcode Fuzzy Hash: e7b92a512b72c8e644d2438e3572d797695ca8da74aa135e0faca6ceacb35b14
                                      • Instruction Fuzzy Hash: 26112571504200AEE720CF15DC81FB6FBA8EF45724F04805AED084BB81C3B5A44DCEA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SetErrorMode.KERNELBASE(?), ref: 0163A330
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: ErrorMode
                                      • String ID:
                                      • API String ID: 2340568224-0
                                      • Opcode ID: 8a8499be19a199767e83cdf3240d767ff41192edf0f4c2c035cd0b37a38ce847
                                      • Instruction ID: cd0c1e284138e7554ae23a0fd9433fef22bcaf0ff6fc95233d28c1e4af19ace1
                                      • Opcode Fuzzy Hash: 8a8499be19a199767e83cdf3240d767ff41192edf0f4c2c035cd0b37a38ce847
                                      • Instruction Fuzzy Hash: EE1160714093C06FD7138B159C54762BFB4DF47224F0C80DAED848B263D265A908D762
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: select
                                      • String ID:
                                      • API String ID: 1274211008-0
                                      • Opcode ID: 16025299c9c2222324a11011b8f9d955ef884e9d2eec1d45cc15e02b55a12747
                                      • Instruction ID: 951ff5c3dc953083185249fbc0a2c6e9722aa6b8ac1ae5cb5d011b6137e76723
                                      • Opcode Fuzzy Hash: 16025299c9c2222324a11011b8f9d955ef884e9d2eec1d45cc15e02b55a12747
                                      • Instruction Fuzzy Hash: D7116A796006449FDB20CF55D884BA2FBE8FF18220F0885AADD49CBA52D334E418CF61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 056227DA
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: LookupPrivilegeValue
                                      • String ID:
                                      • API String ID: 3899507212-0
                                      • Opcode ID: 3b410cbeb3d2e69d4fc1d736a13b58655d18f52d0da75ff2c97dd6683c6ee579
                                      • Instruction ID: 2efd59b27954a2b44ab8caf9c4b5a66abb629b35f8d598996f9a88d82f4d876e
                                      • Opcode Fuzzy Hash: 3b410cbeb3d2e69d4fc1d736a13b58655d18f52d0da75ff2c97dd6683c6ee579
                                      • Instruction Fuzzy Hash: 54118E76A046008FDB60CF29D885B66FBE8EF14620F08C46ADD49DBB42D674E448CE61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetFileType.KERNELBASE(?,00000E24,5EEFD804,00000000,00000000,00000000,00000000), ref: 0163BA75
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: FileType
                                      • String ID:
                                      • API String ID: 3081899298-0
                                      • Opcode ID: 56226f7964db83c12a0b823ea7b5083389e07663e4c5d3a9fa842c2902191d80
                                      • Instruction ID: 62fdb835a28832717b9ec6e737637cdff51d70c34013eb8b01ff0f4e3eb5fad5
                                      • Opcode Fuzzy Hash: 56226f7964db83c12a0b823ea7b5083389e07663e4c5d3a9fa842c2902191d80
                                      • Instruction Fuzzy Hash: E1012271904600AEE720CF06CC84BA6FBA8EF84324F088096ED048BB41D374E8498AB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 05620FA2
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: Connect
                                      • String ID:
                                      • API String ID: 3144859779-0
                                      • Opcode ID: 603195f39b6ad9abd862604ca06419ffc835406ac125411bd05577b235efb750
                                      • Instruction ID: 3f39ffa2d1bc2542cfe94963027a31affc0f0dd6eb0889a183d1ab6eaf92ffcc
                                      • Opcode Fuzzy Hash: 603195f39b6ad9abd862604ca06419ffc835406ac125411bd05577b235efb750
                                      • Instruction Fuzzy Hash: D3115A71504644DFDB20CF55D848B62FBE4FF08220F0884AAED498BB62D335E558CF62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetVolumeInformationA.KERNELBASE(?,00000E24,?,?), ref: 0562116E
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: InformationVolume
                                      • String ID:
                                      • API String ID: 2039140958-0
                                      • Opcode ID: 0ebc0c9e7cecc675923417e23acaddc1211773d14e57fb134cad068549a51ed4
                                      • Instruction ID: f980a0ad0aae80b2f55eaf84f6c54be135d57bb6286338ce834d82bf47db6f26
                                      • Opcode Fuzzy Hash: 0ebc0c9e7cecc675923417e23acaddc1211773d14e57fb134cad068549a51ed4
                                      • Instruction Fuzzy Hash: 1501B171A00200ABD310DF16CD45B76FBE8FB88A20F14811AEC089BB41D731B915CBE5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0163AFFE
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: ffb4bc56ab4766f81bddb85f2ec7eed36b341467ab4e2a07eeb280e1ef59bdfe
                                      • Instruction ID: b5c3f3c64b1ef76f3ebc61b31195fabfcf8c44fd6fc975ce456e75adc33770b0
                                      • Opcode Fuzzy Hash: ffb4bc56ab4766f81bddb85f2ec7eed36b341467ab4e2a07eeb280e1ef59bdfe
                                      • Instruction Fuzzy Hash: 6A016D72900640DFDB218F95DD44B62FBE4EF88320F08889ADD998B652D376E419DF62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetComputerNameW.KERNEL32(?,00000E24,?,?), ref: 0562043A
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137806694.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5620000_chargeable.jbxd
                                      Similarity
                                      • API ID: ComputerName
                                      • String ID:
                                      • API String ID: 3545744682-0
                                      • Opcode ID: a12e38dc7da818bafe018c962d5ce76bfa4797a984fc219cc7c0476ac7e59584
                                      • Instruction ID: 9f0dedf4585d7b6152314d619c03c9a5e536586d419706437c4089e1131fd207
                                      • Opcode Fuzzy Hash: a12e38dc7da818bafe018c962d5ce76bfa4797a984fc219cc7c0476ac7e59584
                                      • Instruction Fuzzy Hash: B801A271900200ABD310DF1ACD46B66FBE8FB88A20F14815AEC089BB41D731F955CBE5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • FindCloseChangeNotification.KERNELBASE(?), ref: 0163A780
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: ChangeCloseFindNotification
                                      • String ID:
                                      • API String ID: 2591292051-0
                                      • Opcode ID: 94b604257cd58f1776413b6c95c04d18d3887ab385209fbbad196a8d70cd4827
                                      • Instruction ID: d0a1882b15ef0e208a56c4253307335d8a5b03426df211fde7fe4d880ecf4527
                                      • Opcode Fuzzy Hash: 94b604257cd58f1776413b6c95c04d18d3887ab385209fbbad196a8d70cd4827
                                      • Instruction Fuzzy Hash: B2017C75A002408FEB118F99D985766FBA4EF85220F08C4AADD8ACB756D275E408DAA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 0163BEFE
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: QueryValue
                                      • String ID:
                                      • API String ID: 3660427363-0
                                      • Opcode ID: cce8f358ee8f34b68e28d44e693bdf6c0f50b6c837be846a5bfedef492933b27
                                      • Instruction ID: 8dcecb57216d56e7b5f40a461b8defd6aedcbcc82d253cf5b5db44f0168cfd22
                                      • Opcode Fuzzy Hash: cce8f358ee8f34b68e28d44e693bdf6c0f50b6c837be846a5bfedef492933b27
                                      • Instruction Fuzzy Hash: F201A271900200ABD310DF1ACD46B66FBE8FB88A20F14811AEC089BB41D771F955CBE5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: send
                                      • String ID:
                                      • API String ID: 2809346765-0
                                      • Opcode ID: 3b1e050d2043c8734ee721031ff3bef466cedd1f4d01fa7481a88852f33afa2b
                                      • Instruction ID: 11ec4efeb10cb05d54323d762c8d91f9ca698df4d86b83839a0dbd49d129ec76
                                      • Opcode Fuzzy Hash: 3b1e050d2043c8734ee721031ff3bef466cedd1f4d01fa7481a88852f33afa2b
                                      • Instruction Fuzzy Hash: 4C018C72904240DFDB208F99D844B62FBE4EF84221F0885AADD898B612D375A418DBA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: Initialize
                                      • String ID:
                                      • API String ID: 2538663250-0
                                      • Opcode ID: 9b23e5d4787e3eed2098175f1a04536759c21699eb9e0ebebcde7287a635345d
                                      • Instruction ID: 5bd9f99d1e90623cec9af684b40f659aa66b08e42e946c95b5650c4bd70600ae
                                      • Opcode Fuzzy Hash: 9b23e5d4787e3eed2098175f1a04536759c21699eb9e0ebebcde7287a635345d
                                      • Instruction Fuzzy Hash: E501A271904244CFDB10CF55DC84765FBE4EF85220F08C4AADD888F746D379E448CAA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SetErrorMode.KERNELBASE(?), ref: 0163A330
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133604932.000000000163A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_163a000_chargeable.jbxd
                                      Similarity
                                      • API ID: ErrorMode
                                      • String ID:
                                      • API String ID: 2340568224-0
                                      • Opcode ID: 48a9437b68f29b17424a3738837d4be2609467e17717d96be3ad67d1fda4e949
                                      • Instruction ID: f4866b68887173fb0ae238733f3e13b78dab63ddf1f6ccbc4791c1c0b26d6fd6
                                      • Opcode Fuzzy Hash: 48a9437b68f29b17424a3738837d4be2609467e17717d96be3ad67d1fda4e949
                                      • Instruction Fuzzy Hash: 78F0AF75904244CFEB108F49DC89761FBE4EF85324F08C09ADD898B752D3B5E408DAA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4138203339.0000000005AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5ad0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a54e810005ac737528a713329a51f80bef5a768ddaff3f1e2fe4522ffc4dc023
                                      • Instruction ID: 1797df2d32b58f2ee350b6e24e59da0529f939696ddb5b1de0825d08a054819b
                                      • Opcode Fuzzy Hash: a54e810005ac737528a713329a51f80bef5a768ddaff3f1e2fe4522ffc4dc023
                                      • Instruction Fuzzy Hash: 37415175508340AFC341CF19D840A5AFFE4EF89660F08895EF9999B311D235A904CFA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4132268069.0000000001180000.00000040.00000020.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_1180000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2f546549df93ae10de3454d0910b7456345de7cf975293c5cc0b94e5fa70edda
                                      • Instruction ID: fc10aab54fb8c4b5f679a0c53867d60d0528672086fa947cd5813e5c16a2f05e
                                      • Opcode Fuzzy Hash: 2f546549df93ae10de3454d0910b7456345de7cf975293c5cc0b94e5fa70edda
                                      • Instruction Fuzzy Hash: 38310A3550E7C58FC7179B24D860711BFB1AF4B608F2985EFD4858B5A3C33A984ACB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4138203339.0000000005AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5ad0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9fbd9f8e3aa5abd375fa58883dc5a54b919fa905b579ac78a0bd06995cab0675
                                      • Instruction ID: 6ee86f829866a0ff489233774e61399c6ef37b1bc35a503be1624ad3959d5d14
                                      • Opcode Fuzzy Hash: 9fbd9f8e3aa5abd375fa58883dc5a54b919fa905b579ac78a0bd06995cab0675
                                      • Instruction Fuzzy Hash: 2E11BAB5908341AFD350CF19D840A5BFBE4FBD8664F04896EF998D7311D231EA088FA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4132268069.0000000001180000.00000040.00000020.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_1180000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bcce62aa2bf63ff33a10d6d327a274599fc6fae1e03020969034a7aa6eef68cc
                                      • Instruction ID: d8b94024939664fbc2344d6b38e5a35ebdd697b45df729b7901f4c9cf5a38a01
                                      • Opcode Fuzzy Hash: bcce62aa2bf63ff33a10d6d327a274599fc6fae1e03020969034a7aa6eef68cc
                                      • Instruction Fuzzy Hash: E611D530A14248DFD719DB14D540B25B795AB8E708F24C9ACF84917643C737D89BCE81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4132268069.0000000001180000.00000040.00000020.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_1180000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fbb7cab1c7e3cbbe26ae03bea5187c3158787f95de646bfe82c7e599e2ec9e90
                                      • Instruction ID: 9b36a8e3e24025efff68f11574b16650d98c87b4aa4b2feb87afba0717dd15f0
                                      • Opcode Fuzzy Hash: fbb7cab1c7e3cbbe26ae03bea5187c3158787f95de646bfe82c7e599e2ec9e90
                                      • Instruction Fuzzy Hash: 37216D315493C4CFD7078B24C990B65BFB1AF4B314F2985EED4848B6A3C33A884ACB52
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4138203339.0000000005AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5ad0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b2fbf5a9ddc59e9e639758dfe4079f7a6284ea22d4c660153b60c100f4029759
                                      • Instruction ID: aabe230fbfb24daae96ef42c06c185854ef8c348687f0ed3f76fd9ffcbd3dffa
                                      • Opcode Fuzzy Hash: b2fbf5a9ddc59e9e639758dfe4079f7a6284ea22d4c660153b60c100f4029759
                                      • Instruction Fuzzy Hash: 3D11FAB5908301AFD750CF09DC80E57FBE8EBC8660F04882EF95997311E231E9088FA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133745432.000000000164A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_164a000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7907fe86255f07e4a8e740ad0122f31819823d42645f10a9bf802957bc7bac0c
                                      • Instruction ID: 816e94e7702aff492bc2b59fbf8222bde744e071e5b635c5fa8c424998c3ba02
                                      • Opcode Fuzzy Hash: 7907fe86255f07e4a8e740ad0122f31819823d42645f10a9bf802957bc7bac0c
                                      • Instruction Fuzzy Hash: EF11FAB5908301AFD350CF09DC40E57FBE8EBD8660F04892EF95997311D231E9088FA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4132268069.0000000001180000.00000040.00000020.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_1180000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 98ab05aea3b32ca7a781ec8fa66e6b371f613294944520a277623c7873c8caa7
                                      • Instruction ID: c4d762628fa72a6501d232e94d249eebc2563b32798aa01daae5a7f165ac2148
                                      • Opcode Fuzzy Hash: 98ab05aea3b32ca7a781ec8fa66e6b371f613294944520a277623c7873c8caa7
                                      • Instruction Fuzzy Hash: 9001DBB554D3C06FD7128F159C54862FFB8DF8613070C84DFEC898B652D125A809C771
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4132268069.0000000001180000.00000040.00000020.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_1180000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f5405e8c2313153df6eab1cfdcb54e4ecace335342848f3dcb2b97980fc5d3c2
                                      • Instruction ID: 0adec27de3da7da422f4c2b4f8ae2cf051b6398968a7fa059f9285aea6959e64
                                      • Opcode Fuzzy Hash: f5405e8c2313153df6eab1cfdcb54e4ecace335342848f3dcb2b97980fc5d3c2
                                      • Instruction Fuzzy Hash: 18F04B35504644DFC706CB04D580B25FBA2EB89718F24CAA9E84817A52C737A852DE81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4132268069.0000000001180000.00000040.00000020.00020000.00000000.sdmp, Offset: 01180000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_1180000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0ad537e4ccf34390b6f09dc6641bbfc9ab693fb0f15e5817a2cb0272a26592a6
                                      • Instruction ID: 6fae04dd25bbce4601d11bfaa554a7a018b4f2cfeb477a9cbb1b90f09b117812
                                      • Opcode Fuzzy Hash: 0ad537e4ccf34390b6f09dc6641bbfc9ab693fb0f15e5817a2cb0272a26592a6
                                      • Instruction Fuzzy Hash: 52E092B6A006449B9750CF0AEC45452F7D8EB84630718C47FDC0D8B701E235B508CAA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4138203339.0000000005AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5ad0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1933c097f2cd2f2ce6d2c4310227a7da01cff72727cb4a151db8ca782f12455f
                                      • Instruction ID: cc68aeaefd5997118a0b8887e3c68d54af21f38e8636d597985ab74c68483513
                                      • Opcode Fuzzy Hash: 1933c097f2cd2f2ce6d2c4310227a7da01cff72727cb4a151db8ca782f12455f
                                      • Instruction Fuzzy Hash: 7FE0D8F294020467D7108E069C45F52FB98DB94930F08C467ED085B741E171B51889E1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4138203339.0000000005AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5ad0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9e7d278d8b27233a040d2a62f759faf149acaba5878a3aa7c75765d717515d94
                                      • Instruction ID: f51d17864927a4801a0f2eeb60cb80cc8fc10bc531d9b7ac6a1d876dc3ae2d8e
                                      • Opcode Fuzzy Hash: 9e7d278d8b27233a040d2a62f759faf149acaba5878a3aa7c75765d717515d94
                                      • Instruction Fuzzy Hash: 2EE0D8B294030467D6509E069C45F63FB98DB90930F08C467ED091B702E172B5048DF1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4138203339.0000000005AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AD0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_5ad0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b2bf9aef330410b28589994207de4f550723711398bae1f31418eafed3136d52
                                      • Instruction ID: 438cbe27d7d7fa8cbfc10e40d87cb9875c08033ef7276217a477b9bba28058c7
                                      • Opcode Fuzzy Hash: b2bf9aef330410b28589994207de4f550723711398bae1f31418eafed3136d52
                                      • Instruction Fuzzy Hash: 6EE0D8B294020467D2109E069C45F53FB98DB90930F08C467ED091B701E172B614CDE1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133745432.000000000164A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164A000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_164a000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a594f85cec7cbc1b9c2937de1199a7cfd1348c9e504876a03e2c4bccf80ab5b1
                                      • Instruction ID: abdd497d5e3e48a70d9f92d7e491771ee5b61cb111c22f481797dec82eb214ad
                                      • Opcode Fuzzy Hash: a594f85cec7cbc1b9c2937de1199a7cfd1348c9e504876a03e2c4bccf80ab5b1
                                      • Instruction Fuzzy Hash: 7AE0D8F294020467D2108F06AC45F52FB98DB90930F08C567ED091B701E171B90489F5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133573554.0000000001632000.00000040.00000800.00020000.00000000.sdmp, Offset: 01632000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_1632000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ceb69854ee64d2a41a6ae102e22cfde5732218c7aa3cdd1406ca7778345aeb14
                                      • Instruction ID: 7e7c2078c1dc00699901a412c20c04a2c06150f3bcf2a8cb859643dd65aa398a
                                      • Opcode Fuzzy Hash: ceb69854ee64d2a41a6ae102e22cfde5732218c7aa3cdd1406ca7778345aeb14
                                      • Instruction Fuzzy Hash: ACD05E79206AC14FE3169A1CC5A4B953BE4ABA1714F4A44FDA8008B763C768E5D1D600
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4133573554.0000000001632000.00000040.00000800.00020000.00000000.sdmp, Offset: 01632000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_1632000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 95f84b6fd08a135bc42b7b729ca2505ba3a1c1ef7a5acd5beb1f1b1ec63bd259
                                      • Instruction ID: 0f7e25ead8c08de56375925caa7f41a73619a43fbcaf2dd03898e359cd667853
                                      • Opcode Fuzzy Hash: 95f84b6fd08a135bc42b7b729ca2505ba3a1c1ef7a5acd5beb1f1b1ec63bd259
                                      • Instruction Fuzzy Hash: 3DD05E352406814BE715DA0CCAE4F597BD4AF90B14F0644ECAC108B762C7A4E8C0CA00
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.4137587177.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_54d0000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $ $:@k$:@k$:@k$:@k$:@k$:@k$:@k
                                      • API String ID: 0-1999185200
                                      • Opcode ID: 9280b69ad097421757f53af415dc3dd53289972d76fcdd4b6ca4b278e1c96656
                                      • Instruction ID: eb53595c99847c174531daf9256b054feb9517cb0da07b658024e4e8825bee00
                                      • Opcode Fuzzy Hash: 9280b69ad097421757f53af415dc3dd53289972d76fcdd4b6ca4b278e1c96656
                                      • Instruction Fuzzy Hash: AAB27E34B002148FDB18DB68D869BAEB7B3BF88308F1180A9D5059B791DF75DD85CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Execution Graph

                                      Execution Coverage:22.8%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:112
                                      Total number of Limit Nodes:11
                                      execution_graph 7586 145c7c0 7590 145c7e1 7586->7590 7597 145c7f0 7586->7597 7587 145c7d6 7591 145c7ef 7590->7591 7592 145c7ff 7590->7592 7591->7592 7594 145c7e1 6 API calls 7591->7594 7595 145c7f0 6 API calls 7591->7595 7593 145c8f9 7592->7593 7603 145cdbd 7592->7603 7593->7587 7594->7592 7595->7592 7598 145c7ff 7597->7598 7600 145c7e1 6 API calls 7597->7600 7601 145c7f0 6 API calls 7597->7601 7599 145c8f9 7598->7599 7602 145cdbd 6 API calls 7598->7602 7599->7587 7600->7598 7601->7598 7602->7599 7604 145cdc0 7603->7604 7606 145ce7b 7604->7606 7633 5260ca1 7604->7633 7637 5260cda 7604->7637 7605 145cf0a 7605->7606 7607 145cf39 7605->7607 7641 5260e3e 7605->7641 7645 5260dfa 7605->7645 7606->7593 7649 5260ee6 7607->7649 7653 5260eb9 7607->7653 7608 145cf54 7608->7606 7617 5260ee6 NtWriteVirtualMemory 7608->7617 7618 5260eb9 NtWriteVirtualMemory 7608->7618 7609 145d03f 7609->7606 7625 5260e3e NtResumeThread 7609->7625 7626 5260dfa NtResumeThread 7609->7626 7610 145cf90 7610->7606 7610->7609 7623 5260ee6 NtWriteVirtualMemory 7610->7623 7624 5260eb9 NtWriteVirtualMemory 7610->7624 7611 145d057 7611->7606 7631 5260ee6 NtWriteVirtualMemory 7611->7631 7632 5260eb9 NtWriteVirtualMemory 7611->7632 7612 145d0a6 7615 5260e3e NtResumeThread 7612->7615 7616 5260dfa NtResumeThread 7612->7616 7613 145d0c3 7619 5260e3e NtResumeThread 7613->7619 7620 5260dfa NtResumeThread 7613->7620 7614 145d0d0 7614->7593 7615->7613 7616->7613 7617->7610 7618->7610 7619->7614 7620->7614 7623->7610 7624->7610 7625->7611 7626->7611 7631->7612 7632->7612 7635 5260cda CreateProcessA 7633->7635 7636 5260dac 7635->7636 7636->7605 7639 5260d15 CreateProcessA 7637->7639 7640 5260dac 7639->7640 7640->7605 7642 5260ea3 7641->7642 7643 5260e6d NtResumeThread 7641->7643 7642->7643 7644 5260e7b 7643->7644 7644->7607 7646 5260e04 NtResumeThread 7645->7646 7648 5260e7b 7646->7648 7648->7607 7650 5260f1e NtWriteVirtualMemory 7649->7650 7651 5260f56 7649->7651 7652 5260f2c 7650->7652 7651->7650 7652->7608 7654 5260ee6 NtWriteVirtualMemory 7653->7654 7656 5260f2c 7654->7656 7656->7608 7695 11ead19 7697 11ead5a RegQueryValueExW 7695->7697 7698 11eade3 7697->7698 7699 11ebd10 7702 11ebd32 GetFileVersionInfoW 7699->7702 7701 11ebd84 7702->7701 7661 11ea44e 7662 11ea47a SetErrorMode 7661->7662 7663 11ea4a3 7661->7663 7664 11ea48f 7662->7664 7663->7662 7665 5260032 7666 5260082 VerLanguageNameW 7665->7666 7667 5260090 7666->7667 7727 11ebc4b 7730 11ebc82 GetFileVersionInfoSizeW 7727->7730 7729 11ebcc7 7730->7729 7703 5260431 7706 5260462 DrawTextExW 7703->7706 7705 52604bb 7706->7705 7707 5260006 7708 5260032 VerLanguageNameW 7707->7708 7710 5260090 7708->7710 7672 5261042 7673 5261077 PostMessageW 7672->7673 7674 52610a2 7672->7674 7675 526108c 7673->7675 7674->7673 7743 11ea5fb 7744 11ea622 DuplicateHandle 7743->7744 7746 11ea66e 7744->7746 7731 11ebab4 7734 11ebaf2 LoadLibraryW 7731->7734 7733 11ebb34 7734->7733 7687 11ebaf2 7688 11ebb18 LoadLibraryW 7687->7688 7690 11ebb34 7688->7690 7711 5261009 7712 5261042 PostMessageW 7711->7712 7714 526108c 7712->7714 7735 11ea2ac 7736 11ea2d0 CreateActCtxA 7735->7736 7738 11ea354 7736->7738 7715 11eb42d 7718 11eb45e LoadLibraryShim 7715->7718 7717 11eb4b8 7718->7717 7719 11ea42a 7720 11ea44e SetErrorMode 7719->7720 7722 11ea48f 7720->7722 7691 11ea622 7692 11ea698 7691->7692 7693 11ea660 DuplicateHandle 7691->7693 7692->7693 7694 11ea66e 7693->7694 7723 11eac22 7724 11eac52 RegOpenKeyExW 7723->7724 7726 11eace0 7724->7726

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1926 14500e0-1451855 2405 145185c-1452b7b 1926->2405 2597 1452b82-1458c8d 2405->2597 3597 1458c94-1458c9c 2597->3597 3598 1458ca4-14597f0 3597->3598 3849 14597f7 3598->3849 3850 14597fe-1459804 3849->3850
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1858151185.0000000001450000.00000040.00000800.00020000.00000000.sdmp, Offset: 01450000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1450000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a788d362cf0df4cd9ac1f6017a076d8caac1a17d9374aaaa635df2f45e9ebe63
                                      • Instruction ID: d296aa651af8d4705eb283ae5c008bee6f14ffd6be4f61552aba0e4fe92f7185
                                      • Opcode Fuzzy Hash: a788d362cf0df4cd9ac1f6017a076d8caac1a17d9374aaaa635df2f45e9ebe63
                                      • Instruction Fuzzy Hash: 85142834601714DFDB65DB30C854B9AB3B2EF89304F6188A8D55AAB360DF35AE86CF41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1858151185.0000000001450000.00000040.00000800.00020000.00000000.sdmp, Offset: 01450000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1450000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 95574a5c8190b83975306cc4ad6c5d169601fea8fff8d0892f098ae82a10ac65
                                      • Instruction ID: 1f6a681d8ab8f3c771738666b0925ccaf72db8be1399bb0a7143b6f564932e29
                                      • Opcode Fuzzy Hash: 95574a5c8190b83975306cc4ad6c5d169601fea8fff8d0892f098ae82a10ac65
                                      • Instruction Fuzzy Hash: 36B360B57004108F8B49EF02D4E1A7E3776A741A487284399CD512FBDADB39AD17CBCA
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 5574 11eac22-11eacad 5578 11eacaf 5574->5578 5579 11eacb2-11eacc9 5574->5579 5578->5579 5581 11ead0b-11ead10 5579->5581 5582 11eaccb-11eacde RegOpenKeyExW 5579->5582 5581->5582 5583 11ead12-11ead17 5582->5583 5584 11eace0-11ead08 5582->5584 5583->5584
                                      APIs
                                      • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 011EACD1
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1857720736.00000000011EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011EA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_11ea000_chargeable.jbxd
                                      Similarity
                                      • API ID: Open
                                      • String ID:
                                      • API String ID: 71445658-0
                                      • Opcode ID: 3dbb0512ce46274e30d4219545b9a861106bd0ba1053aad4d4565d294c240420
                                      • Instruction ID: c62b4232002d59cb9087abefdfb2740933ca5f00da4471c63728f4175c80daae
                                      • Opcode Fuzzy Hash: 3dbb0512ce46274e30d4219545b9a861106bd0ba1053aad4d4565d294c240420
                                      • Instruction Fuzzy Hash: 8D3193714083846FE7228B55DC45FA7BFFCEF05210F08449AE9858B552D365E94DCBB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 5589 11ead19-11ead97 5592 11ead9c-11eada5 5589->5592 5593 11ead99 5589->5593 5594 11eadaa-11eadb0 5592->5594 5595 11eada7 5592->5595 5593->5592 5596 11eadb5-11eadcc 5594->5596 5597 11eadb2 5594->5597 5595->5594 5599 11eadce-11eade1 RegQueryValueExW 5596->5599 5600 11eae03-11eae08 5596->5600 5597->5596 5601 11eae0a-11eae0f 5599->5601 5602 11eade3-11eae00 5599->5602 5600->5599 5601->5602
                                      APIs
                                      • RegQueryValueExW.KERNELBASE(?,00000E24,13A6DA2D,00000000,00000000,00000000,00000000), ref: 011EADD4
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1857720736.00000000011EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011EA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_11ea000_chargeable.jbxd
                                      Similarity
                                      • API ID: QueryValue
                                      • String ID:
                                      • API String ID: 3660427363-0
                                      • Opcode ID: 6b17c416f7913b813d4ac2e06b5a0863249be64ab49a37dc08326f05de2c5484
                                      • Instruction ID: 47cd3f24a1b6697a5f4fb67580539bf0871ed9ba49968cb4f9808d9a369d2ce2
                                      • Opcode Fuzzy Hash: 6b17c416f7913b813d4ac2e06b5a0863249be64ab49a37dc08326f05de2c5484
                                      • Instruction Fuzzy Hash: 1331B1725087805FE722CF65DC84FA2BFF8EF06310F08849AE9458B693D360E548CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 5606 11ea2ac-11ea2f3 5608 11ea2f6-11ea34e CreateActCtxA 5606->5608 5610 11ea354-11ea36a 5608->5610
                                      APIs
                                      • CreateActCtxA.KERNEL32(?,00000E24,?,?), ref: 011EA346
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1857720736.00000000011EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011EA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_11ea000_chargeable.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: d323ba52fa78e08deb9757f3ab2c424dd22f9b2409c042c093883dfbdf98924c
                                      • Instruction ID: b2e46bec8e08ceb818ff31a1ad308c7ace5a5de0f5a755c2e6ac771847c2d94d
                                      • Opcode Fuzzy Hash: d323ba52fa78e08deb9757f3ab2c424dd22f9b2409c042c093883dfbdf98924c
                                      • Instruction Fuzzy Hash: D221F67140D3C06FD3138B259C51B62BFB8EF87620F0A41CBE884DB693D225A919C7B2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 5611 11eac52-11eacad 5614 11eacaf 5611->5614 5615 11eacb2-11eacc9 5611->5615 5614->5615 5617 11ead0b-11ead10 5615->5617 5618 11eaccb-11eacde RegOpenKeyExW 5615->5618 5617->5618 5619 11ead12-11ead17 5618->5619 5620 11eace0-11ead08 5618->5620 5619->5620
                                      APIs
                                      • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 011EACD1
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1857720736.00000000011EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011EA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_11ea000_chargeable.jbxd
                                      Similarity
                                      • API ID: Open
                                      • String ID:
                                      • API String ID: 71445658-0
                                      • Opcode ID: 6e49576eadd278eb1c5f640cceceecb637c8e76b7121b385fc121b7f9e1306e1
                                      • Instruction ID: dcfdd031dd81690d01e0ff66633cb51121ca41c2b4a7214a16e642e1250b5551
                                      • Opcode Fuzzy Hash: 6e49576eadd278eb1c5f640cceceecb637c8e76b7121b385fc121b7f9e1306e1
                                      • Instruction Fuzzy Hash: 3021D172504604AFE7219F95DD84FABFBECEF14314F08845AEA458BA42D324E94C8AB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 5638 11ead5a-11ead97 5640 11ead9c-11eada5 5638->5640 5641 11ead99 5638->5641 5642 11eadaa-11eadb0 5640->5642 5643 11eada7 5640->5643 5641->5640 5644 11eadb5-11eadcc 5642->5644 5645 11eadb2 5642->5645 5643->5642 5647 11eadce-11eade1 RegQueryValueExW 5644->5647 5648 11eae03-11eae08 5644->5648 5645->5644 5649 11eae0a-11eae0f 5647->5649 5650 11eade3-11eae00 5647->5650 5648->5647 5649->5650
                                      APIs
                                      • RegQueryValueExW.KERNELBASE(?,00000E24,13A6DA2D,00000000,00000000,00000000,00000000), ref: 011EADD4
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1857720736.00000000011EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011EA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_11ea000_chargeable.jbxd
                                      Similarity
                                      • API ID: QueryValue
                                      • String ID:
                                      • API String ID: 3660427363-0
                                      • Opcode ID: 9693f8e258bd8afcfadf57df94acf28d10c4a5474ca335725adbac135b9f015f
                                      • Instruction ID: 5493bff3773e4b32fee32ee70c8b32a717e7536f3f9bd4c0fa12515433fd44d2
                                      • Opcode Fuzzy Hash: 9693f8e258bd8afcfadf57df94acf28d10c4a5474ca335725adbac135b9f015f
                                      • Instruction Fuzzy Hash: A7219075604604AFE721CF55DC84FA6FBECEF04710F08845AE9458B692D761E548CAB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 5665 11ebab4-11ebb16 5667 11ebb1b-11ebb24 5665->5667 5668 11ebb18 5665->5668 5669 11ebb5c-11ebb61 5667->5669 5670 11ebb26-11ebb46 LoadLibraryW 5667->5670 5668->5667 5669->5670 5673 11ebb48-11ebb5b 5670->5673 5674 11ebb63-11ebb68 5670->5674 5674->5673
                                      APIs
                                      • LoadLibraryW.KERNELBASE(?), ref: 011EBB2C
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1857720736.00000000011EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011EA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_11ea000_chargeable.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: 5123a4c5d7ffa79668cffdf596fc12ceaa01df0469dfab8bd3bf77780c2a0f51
                                      • Instruction ID: dd5af229c8bdc1cc26bfea004d04ec6d2f4d9aa0b80f40c49d2ce2bd8176829c
                                      • Opcode Fuzzy Hash: 5123a4c5d7ffa79668cffdf596fc12ceaa01df0469dfab8bd3bf77780c2a0f51
                                      • Instruction Fuzzy Hash: D2215E7150D3C05FDB128B29DC94792BFB4EF47214F0D84DAE9848F557D2649908CBA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 5676 11eb42d-11eb488 5678 11eb48d-11eb493 5676->5678 5679 11eb48a 5676->5679 5680 11eb498-11eb4a1 5678->5680 5681 11eb495 5678->5681 5679->5678 5682 11eb4ce-11eb4d3 5680->5682 5683 11eb4a3-11eb4b6 LoadLibraryShim 5680->5683 5681->5680 5682->5683 5684 11eb4b8-11eb4cb 5683->5684 5685 11eb4d5-11eb4da 5683->5685 5685->5684
                                      APIs
                                      • LoadLibraryShim.MSCOREE(?,?,?,?), ref: 011EB4A9
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1857720736.00000000011EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011EA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_11ea000_chargeable.jbxd
                                      Similarity
                                      • API ID: LibraryLoadShim
                                      • String ID:
                                      • API String ID: 1475914169-0
                                      • Opcode ID: 19a04220369652a0086cc285000514463d4a37d5afa383e4fb3771a4f99b2cf3
                                      • Instruction ID: 260284a495f7035e1555101be5f4a6ad356fa00321dc2d568eead805fcde8b08
                                      • Opcode Fuzzy Hash: 19a04220369652a0086cc285000514463d4a37d5afa383e4fb3771a4f99b2cf3
                                      • Instruction Fuzzy Hash: DD2190B15097805FDB228E19DC45B62BFF8EF46614F08808AED858B293D365E908CB71
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 5688 11ebc4b-11ebca9 5690 11ebcae-11ebcb7 5688->5690 5691 11ebcab 5688->5691 5692 11ebcef-11ebcf4 5690->5692 5693 11ebcb9-11ebcc1 GetFileVersionInfoSizeW 5690->5693 5691->5690 5692->5693 5694 11ebcc7-11ebcd9 5693->5694 5696 11ebcdb-11ebcee 5694->5696 5697 11ebcf6-11ebcfb 5694->5697 5697->5696
                                      APIs
                                      • GetFileVersionInfoSizeW.KERNELBASE(?,?), ref: 011EBCBF
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1857720736.00000000011EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011EA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_11ea000_chargeable.jbxd
                                      Similarity
                                      • API ID: FileInfoSizeVersion
                                      • String ID:
                                      • API String ID: 1661704012-0
                                      • Opcode ID: 41bf5eb1f57dcdb2c1781dec5022ca0065559fc086f868a444392518bf61f8df
                                      • Instruction ID: c43c4fa2df741f50b680d89dc1c1f62228006a209676df281b439683b37eeaa7
                                      • Opcode Fuzzy Hash: 41bf5eb1f57dcdb2c1781dec5022ca0065559fc086f868a444392518bf61f8df
                                      • Instruction Fuzzy Hash: 9C21A2B15093809FEB12CF65DC45B52BFF4EF46210F0984DAED848F263D274A909CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 011EA666
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1857720736.00000000011EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011EA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_11ea000_chargeable.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 4df1c3824ff9f278a603161290c40af6940e4e4a1e3be7b880f554c2eafe8e95
                                      • Instruction ID: 8997c16697a7264f69e8664bd31dc281383994bd2440bd948b90363e8b3a9491
                                      • Opcode Fuzzy Hash: 4df1c3824ff9f278a603161290c40af6940e4e4a1e3be7b880f554c2eafe8e95
                                      • Instruction Fuzzy Hash: 9E118171409780AFDB228F55DC44B62FFF4EF8A310F0888DAED858B563D275A518DB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetFileVersionInfoW.KERNELBASE(?,?,?,?), ref: 011EBD75
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1857720736.00000000011EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011EA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_11ea000_chargeable.jbxd
                                      Similarity
                                      • API ID: FileInfoVersion
                                      • String ID:
                                      • API String ID: 2427832333-0
                                      • Opcode ID: 384544722a2bc3f3e10b13e67088d2b9aaf9357cf338dbb27457250c7d9160cd
                                      • Instruction ID: 82434da3a1a20394eefd3ca3e939297ff113afcaef2d3d808effaabee4842e69
                                      • Opcode Fuzzy Hash: 384544722a2bc3f3e10b13e67088d2b9aaf9357cf338dbb27457250c7d9160cd
                                      • Instruction Fuzzy Hash: CE1198B1508740AFDB228F19DC45F66FFF8EF45614F08809EED458B663D261E918CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SetErrorMode.KERNELBASE(?), ref: 011EA480
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1857720736.00000000011EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011EA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_11ea000_chargeable.jbxd
                                      Similarity
                                      • API ID: ErrorMode
                                      • String ID:
                                      • API String ID: 2340568224-0
                                      • Opcode ID: 289249486efaea38921070b3e87d630134c915de20c50faad3339d6351bf607d
                                      • Instruction ID: 119f8f0296a0e5740240880ff95d2b71f87fb881f9f5fbb025fb989234c50316
                                      • Opcode Fuzzy Hash: 289249486efaea38921070b3e87d630134c915de20c50faad3339d6351bf607d
                                      • Instruction Fuzzy Hash: E60184B5408384AFDB12CB15DC48B62FFF8EF46620F0880DAED854B253D275A908DBB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetFileVersionInfoW.KERNELBASE(?,?,?,?), ref: 011EBD75
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1857720736.00000000011EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011EA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_11ea000_chargeable.jbxd
                                      Similarity
                                      • API ID: FileInfoVersion
                                      • String ID:
                                      • API String ID: 2427832333-0
                                      • Opcode ID: 25e85c667c78357007446500180bd38fd6d4075116296145d1ae0baee82205b2
                                      • Instruction ID: d77bb573467e306c08ace68160196db6d6ea3f188fc9f2069ad3d3b66f506480
                                      • Opcode Fuzzy Hash: 25e85c667c78357007446500180bd38fd6d4075116296145d1ae0baee82205b2
                                      • Instruction Fuzzy Hash: 68019271504600CFDB658F5ADC49B5AFBE4FF14624F08805ADD458B762D371E458CEA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryShim.MSCOREE(?,?,?,?), ref: 011EB4A9
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1857720736.00000000011EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011EA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_11ea000_chargeable.jbxd
                                      Similarity
                                      • API ID: LibraryLoadShim
                                      • String ID:
                                      • API String ID: 1475914169-0
                                      • Opcode ID: 3d25464eb6cf0e80ba1bf12ef273d6b229e10532536e38ecdbcce27fa52219fa
                                      • Instruction ID: 9398c1c6a172ba29f827fb307cda201497e19c3843c813fc8497cb02fdada03c
                                      • Opcode Fuzzy Hash: 3d25464eb6cf0e80ba1bf12ef273d6b229e10532536e38ecdbcce27fa52219fa
                                      • Instruction Fuzzy Hash: 3F01B5715046008FEB24CF59DC89B62FBE8EF14620F08C099ED4A8B752D374E408CB72
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 011EA666
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1857720736.00000000011EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011EA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_11ea000_chargeable.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 6f66f214fb9d703067a2a5a59c2a5de2e3d316cda4cc66d7a9e2da7848242548
                                      • Instruction ID: 410f59794e904c7e459dc6881a04503480a80bd9d7660bbe784079413b4c24b3
                                      • Opcode Fuzzy Hash: 6f66f214fb9d703067a2a5a59c2a5de2e3d316cda4cc66d7a9e2da7848242548
                                      • Instruction Fuzzy Hash: 29016D72904600DFDB218F95D944B66FBE4EF49320F08C89ADD494B652D375E418DF62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetFileVersionInfoSizeW.KERNELBASE(?,?), ref: 011EBCBF
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1857720736.00000000011EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011EA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_11ea000_chargeable.jbxd
                                      Similarity
                                      • API ID: FileInfoSizeVersion
                                      • String ID:
                                      • API String ID: 1661704012-0
                                      • Opcode ID: 0597e28335f46eb52f2f430a8e0b1788deaac7561d4ca8ff1b14865fc403b2e8
                                      • Instruction ID: 6fa142bb1fea0588310b7a57b6f378d8292ebb8e07e24ad4c15c946e43d161e7
                                      • Opcode Fuzzy Hash: 0597e28335f46eb52f2f430a8e0b1788deaac7561d4ca8ff1b14865fc403b2e8
                                      • Instruction Fuzzy Hash: 0F01D471908600CFEB10CF9AD889766FBE4EF04220F08C4AADD498B342D775E414CBA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • CreateActCtxA.KERNEL32(?,00000E24,?,?), ref: 011EA346
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1857720736.00000000011EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011EA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_11ea000_chargeable.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 60dabfaabe173b796cb5f9708e6cb15476829bc90a55eb51da1884a86ba9026c
                                      • Instruction ID: ad00fe9b220bc1eb121f545398d90b5e15123f7a44cf0974046cbe75810056d4
                                      • Opcode Fuzzy Hash: 60dabfaabe173b796cb5f9708e6cb15476829bc90a55eb51da1884a86ba9026c
                                      • Instruction Fuzzy Hash: D301A271500200ABD310DF1ACD46B66FBE8FB88A20F14815AEC089BB41D731F955CBE5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryW.KERNELBASE(?), ref: 011EBB2C
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1857720736.00000000011EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011EA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_11ea000_chargeable.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: e6e5369e9fc90340d29c8c3fdbf854381c55a03b3dd9723f3b08f8143ebef7ec
                                      • Instruction ID: 984a8838c352667f001c871fd43a055fa1a2d6d8cbdbef3f94004e173f5c0a0f
                                      • Opcode Fuzzy Hash: e6e5369e9fc90340d29c8c3fdbf854381c55a03b3dd9723f3b08f8143ebef7ec
                                      • Instruction Fuzzy Hash: 660184719086408FDB60CF99D889762FBD8EF54620F08C4AADD498F75AD374E404CAA6
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • SetErrorMode.KERNELBASE(?), ref: 011EA480
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1857720736.00000000011EA000.00000040.00000800.00020000.00000000.sdmp, Offset: 011EA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_11ea000_chargeable.jbxd
                                      Similarity
                                      • API ID: ErrorMode
                                      • String ID:
                                      • API String ID: 2340568224-0
                                      • Opcode ID: 77727662f0621efe675824494a2b05fab97e3ec5dad0a7c736a3c66ebcf87550
                                      • Instruction ID: 62daa63ccd8264a30f71513e4794fcea6acdd90c6eb61ce485502da0063a6489
                                      • Opcode Fuzzy Hash: 77727662f0621efe675824494a2b05fab97e3ec5dad0a7c736a3c66ebcf87550
                                      • Instruction Fuzzy Hash: 4EF0AF75904640CFDB10CF4AE889761FBE4EF55220F0CC0AADD494B752E379E448CEA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1858151185.0000000001450000.00000040.00000800.00020000.00000000.sdmp, Offset: 01450000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1450000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f643c12e3fe541076c7bd917aa1896aa9075736db739218f78d12245b027bb17
                                      • Instruction ID: b1ab86702d690803988b6aee24dc8f4ffedc9a96e91c812da391abe68ca12b5e
                                      • Opcode Fuzzy Hash: f643c12e3fe541076c7bd917aa1896aa9075736db739218f78d12245b027bb17
                                      • Instruction Fuzzy Hash: D331EB30B00305CBDF659B7994987BE7AFBAB8C250F14402AD801E7756CF748C029B95
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1858151185.0000000001450000.00000040.00000800.00020000.00000000.sdmp, Offset: 01450000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1450000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 932fcfab584c6442ea9d4f92c0d8e631bde51870c8b320621348f1385b4cbde5
                                      • Instruction ID: f0aeca72cded97f98732c9c2743d091e95b64f17984e36ab89ee2c0e046275a2
                                      • Opcode Fuzzy Hash: 932fcfab584c6442ea9d4f92c0d8e631bde51870c8b320621348f1385b4cbde5
                                      • Instruction Fuzzy Hash: 9D318134A003128FCB55DB69D9C097FBBB9FF48355B10412AD80197356DB34DD45CB90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1858151185.0000000001450000.00000040.00000800.00020000.00000000.sdmp, Offset: 01450000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1450000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: adfaa84bdd0c4ec41eaa8f57936175d15dbbcba2190c4cc93b29a904f7a13d3f
                                      • Instruction ID: f481d0b95f46fa04e4c6d72ecc2f041c38f250aa891f98489affc98b9c35e29a
                                      • Opcode Fuzzy Hash: adfaa84bdd0c4ec41eaa8f57936175d15dbbcba2190c4cc93b29a904f7a13d3f
                                      • Instruction Fuzzy Hash: CA11BC2114E3C45FD75767744D355A93F719E03014B0E81EBE5C4CE5A3CA1E894AD3A6
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1858060374.0000000001260000.00000040.00000020.00020000.00000000.sdmp, Offset: 01260000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1260000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: da44d1ea8783a7b5c3f1708db7c51a4e373fb324593c95420b6f6cb12d4d7375
                                      • Instruction ID: cc487af05a7e8099eebf8ba1f61a90fe6cc69282a64a483f14e62f2140109ccb
                                      • Opcode Fuzzy Hash: da44d1ea8783a7b5c3f1708db7c51a4e373fb324593c95420b6f6cb12d4d7375
                                      • Instruction Fuzzy Hash: 6F11E730214281DFD716CB54D980B25BB99EB89708F24C59CF5491BBC2C77BD843DA85
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1858060374.0000000001260000.00000040.00000020.00020000.00000000.sdmp, Offset: 01260000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1260000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 27838829aa45b2c774fda8a7bf618afa868a4cc489eeaff47785d04264a9d3af
                                      • Instruction ID: 0042f6a6c3910fa4ae6b5096d6713e715b60336311f8d038af9b54ad90f46c03
                                      • Opcode Fuzzy Hash: 27838829aa45b2c774fda8a7bf618afa868a4cc489eeaff47785d04264a9d3af
                                      • Instruction Fuzzy Hash: 8BF044B65097806FD7118B16AC44863FFB8EF96620709C49FEC498B652D225A909CBB2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1858060374.0000000001260000.00000040.00000020.00020000.00000000.sdmp, Offset: 01260000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1260000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0f20e732d939d3e5471710a6f2e44bd9713c0dbf81eb22dd960a9e277deb68b8
                                      • Instruction ID: 73db210b55e842a9008e9da5c13bcfe8d54b5d87e05520a608137741b88a9d8b
                                      • Opcode Fuzzy Hash: 0f20e732d939d3e5471710a6f2e44bd9713c0dbf81eb22dd960a9e277deb68b8
                                      • Instruction Fuzzy Hash: 53117C341082818FC707CB10C990B15BBB1EB8A308F28C6EEE5494B6A3C73A9842DB41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1858060374.0000000001260000.00000040.00000020.00020000.00000000.sdmp, Offset: 01260000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1260000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8950793e56bb1cfe8986b0a0f608769c039ba685f1c7fc25a5d81598f8ffba7c
                                      • Instruction ID: 0583f03fc298083aac54c73fc10c80febcaec59948b6c9e126508850c0e41c18
                                      • Opcode Fuzzy Hash: 8950793e56bb1cfe8986b0a0f608769c039ba685f1c7fc25a5d81598f8ffba7c
                                      • Instruction Fuzzy Hash: 3FF0B4B6504600AB9710CE0AEC418A3F7ECEB88630B08C42EEC4997B01D235F805CAA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1858060374.0000000001260000.00000040.00000020.00020000.00000000.sdmp, Offset: 01260000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1260000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f5405e8c2313153df6eab1cfdcb54e4ecace335342848f3dcb2b97980fc5d3c2
                                      • Instruction ID: c2f4f598a0b43bb154b0b5198191db1d7cca5646a21ed71fea6a94dc8ed20fd4
                                      • Opcode Fuzzy Hash: f5405e8c2313153df6eab1cfdcb54e4ecace335342848f3dcb2b97980fc5d3c2
                                      • Instruction Fuzzy Hash: 51F06D35104645DFC306CB04D980B25FBA6EB88718F24CAADE94907752C737E813DE85
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1858060374.0000000001260000.00000040.00000020.00020000.00000000.sdmp, Offset: 01260000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1260000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f305f8ef9e2571da0626d5926be7b3245c1723fe65edb0839d352ab4e707de83
                                      • Instruction ID: 36fc50bde59b1f51d36d635cb3b53e53ebff94db2a676ef4361d5763302ba3d6
                                      • Opcode Fuzzy Hash: f305f8ef9e2571da0626d5926be7b3245c1723fe65edb0839d352ab4e707de83
                                      • Instruction Fuzzy Hash: C0E092B66046005B9750CF0BEC41492F7D8EB88630708C47FDC0D8B701D235B508CAE5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1857698007.00000000011E2000.00000040.00000800.00020000.00000000.sdmp, Offset: 011E2000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_11e2000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5fae927db6c91f21cc8775c54f6192e282e05338d41768b56ba2732e0fb5c23d
                                      • Instruction ID: bfbbdc39ad6b5cbd7ab75492d3d20d1a978ed745f10449a9386a039fe98f3897
                                      • Opcode Fuzzy Hash: 5fae927db6c91f21cc8775c54f6192e282e05338d41768b56ba2732e0fb5c23d
                                      • Instruction Fuzzy Hash: BED05E79305AC14FE31A9B1CC1A8B953BE8AB61714F5A44F9A8008B763C768E5C1D600
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1857698007.00000000011E2000.00000040.00000800.00020000.00000000.sdmp, Offset: 011E2000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_11e2000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 31030a5c8cc492f37301f3260aa93888ac4b11df3b08e931d063ac821b70ed26
                                      • Instruction ID: 28ea2e9987000db297f0a72c72615c3d555d445ef0251b92f36d12f4ba3e11db
                                      • Opcode Fuzzy Hash: 31030a5c8cc492f37301f3260aa93888ac4b11df3b08e931d063ac821b70ed26
                                      • Instruction Fuzzy Hash: E0D05E34204A814BD719DA0CC6E8F593BD8AB54B14F1A44E8BC108B762C7B4E8C0CE00
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1858151185.0000000001450000.00000040.00000800.00020000.00000000.sdmp, Offset: 01450000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1450000_chargeable.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5f5963a2941c6d21897128ccc0eddcd082fd4c5ee33d8f52f6fa65b7bd784995
                                      • Instruction ID: a5aff81d98123061d7750990530c9292265847b20d80c29e24910d70e19aecba
                                      • Opcode Fuzzy Hash: 5f5963a2941c6d21897128ccc0eddcd082fd4c5ee33d8f52f6fa65b7bd784995
                                      • Instruction Fuzzy Hash: 41B0122D8092C05FCF260330BC5419A3F30AE4330230514F5E4E0C10DAC0140C8ED322
                                      Uniqueness

                                      Uniqueness Score: -1.00%