Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
bUBD.exe

Overview

General Information

Sample name:bUBD.exe
Analysis ID:1427599
MD5:b0eb1186dec29582d7c86d211e2addf8
SHA1:f8edefa10e35a0434bcb56ba45fcc265b4da6c52
SHA256:d88a3e728153a059a398e01b451767e0fccf2eba9dcfeb6a5fe014363984a1c0
Tags:exenjRat
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Njrat
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Self deletion via cmd or bat file
Uses dynamic DNS services
Allocates memory with a write watch (potentially for evading sandboxes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • bUBD.exe (PID: 6840 cmdline: "C:\Users\user\Desktop\bUBD.exe" MD5: B0EB1186DEC29582D7C86D211E2ADDF8)
    • cmd.exe (PID: 4088 cmdline: cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\bUBD.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5216 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Host": "patria.duckdns.org", "Port": "1994", "Campaign ID": "NYAN CAT", "Network Seprator": "@!#&^%$", "Registry": "03bf0f5789"}
SourceRuleDescriptionAuthorStrings
bUBD.exeJoeSecurity_NjratYara detected NjratJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1620359262.0000000000042000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
      Process Memory Space: bUBD.exe PID: 6840JoeSecurity_NjratYara detected NjratJoe Security
        SourceRuleDescriptionAuthorStrings
        0.0.bUBD.exe.40000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
          No Sigma rule has matched
          Timestamp:04/17/24-21:10:33.620833
          SID:2825564
          Source Port:49738
          Destination Port:1994
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:04/17/24-21:09:03.882073
          SID:2825563
          Source Port:49730
          Destination Port:1994
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:04/17/24-21:10:24.166032
          SID:2033132
          Source Port:49738
          Destination Port:1994
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:04/17/24-21:10:19.272986
          SID:2825564
          Source Port:49730
          Destination Port:1994
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:04/17/24-21:09:03.399283
          SID:2033132
          Source Port:49730
          Destination Port:1994
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: bUBD.exeAvira: detected
          Source: 00000000.00000000.1620359262.0000000000042000.00000002.00000001.01000000.00000003.sdmpMalware Configuration Extractor: Njrat {"Host": "patria.duckdns.org", "Port": "1994", "Campaign ID": "NYAN CAT", "Network Seprator": "@!#&^%$", "Registry": "03bf0f5789"}
          Source: bUBD.exeReversingLabs: Detection: 94%
          Source: Yara matchFile source: bUBD.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.bUBD.exe.40000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1620359262.0000000000042000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: bUBD.exe PID: 6840, type: MEMORYSTR
          Source: bUBD.exeJoe Sandbox ML: detected
          Source: bUBD.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: C:\Users\user\Desktop\bUBD.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
          Source: bUBD.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Networking

          barindex
          Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49730 -> 46.246.14.22:1994
          Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49730 -> 46.246.14.22:1994
          Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49730 -> 46.246.14.22:1994
          Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49738 -> 46.246.14.22:1994
          Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49738 -> 46.246.14.22:1994
          Source: Malware configuration extractorURLs: patria.duckdns.org
          Source: unknownDNS query: name: patria.duckdns.org
          Source: global trafficTCP traffic: 192.168.2.4:49730 -> 46.246.14.22:1994
          Source: Joe Sandbox ViewASN Name: PORTLANEwwwportlanecomSE PORTLANEwwwportlanecomSE
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownDNS traffic detected: queries for: patria.duckdns.org

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: bUBD.exe, Keylogger.cs.Net Code: VKCodeToUnicode

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: bUBD.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.bUBD.exe.40000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1620359262.0000000000042000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: bUBD.exe PID: 6840, type: MEMORYSTR
          Source: C:\Users\user\Desktop\bUBD.exeCode function: 0_2_00B519F00_2_00B519F0
          Source: bUBD.exe, 00000000.00000000.1620592432.0000000000048000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClientNUEVO.exe4 vs bUBD.exe
          Source: bUBD.exe, 00000000.00000002.2665446665.000000000052E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs bUBD.exe
          Source: bUBD.exeBinary or memory string: OriginalFilenameClientNUEVO.exe4 vs bUBD.exe
          Source: bUBD.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/1@2/1
          Source: C:\Users\user\Desktop\bUBD.exeCode function: 0_2_049E22AA AdjustTokenPrivileges,0_2_049E22AA
          Source: C:\Users\user\Desktop\bUBD.exeCode function: 0_2_049E2273 AdjustTokenPrivileges,0_2_049E2273
          Source: C:\Users\user\Desktop\bUBD.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\bUBD.exe.logJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeMutant created: NULL
          Source: C:\Users\user\Desktop\bUBD.exeMutant created: \Sessions\1\BaseNamedObjects\03bf0f5789
          Source: C:\Users\user\Desktop\bUBD.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5216:120:WilError_03
          Source: bUBD.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: bUBD.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
          Source: C:\Users\user\Desktop\bUBD.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: bUBD.exeReversingLabs: Detection: 94%
          Source: unknownProcess created: C:\Users\user\Desktop\bUBD.exe "C:\Users\user\Desktop\bUBD.exe"
          Source: C:\Users\user\Desktop\bUBD.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\bUBD.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\bUBD.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\bUBD.exe"Jump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
          Source: bUBD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: C:\Users\user\Desktop\bUBD.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
          Source: bUBD.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: bUBD.exe, Program.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Users\user\Desktop\bUBD.exeProcess created: cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\bUBD.exe"
          Source: C:\Users\user\Desktop\bUBD.exeProcess created: cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\bUBD.exe"Jump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeMemory allocated: 9D0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeMemory allocated: 26C0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeMemory allocated: 46C0000 memory commit | memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeWindow / User API: threadDelayed 674Jump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeWindow / User API: threadDelayed 3698Jump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeWindow / User API: threadDelayed 5095Jump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeWindow / User API: foregroundWindowGot 1755Jump to behavior
          Source: C:\Users\user\Desktop\bUBD.exe TID: 6856Thread sleep time: -674000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exe TID: 6856Thread sleep time: -5095000s >= -30000sJump to behavior
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: bUBD.exe, 00000000.00000002.2665446665.0000000000592000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW </providers>
          Source: bUBD.exe, 00000000.00000002.2665446665.0000000000592000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll>
          Source: C:\Users\user\Desktop\bUBD.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: bUBD.exe, Program.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, cbName, ref lpszVer, 100)
          Source: bUBD.exe, Keylogger.csReference to suspicious API methods: MapVirtualKey(a, 0u)
          Source: bUBD.exe, Keylogger.csReference to suspicious API methods: GetAsyncKeyState(num2)
          Source: bUBD.exe, 00000000.00000002.2666345093.0000000002887000.00000004.00000800.00020000.00000000.sdmp, bUBD.exe, 00000000.00000002.2666345093.0000000002ABB000.00000004.00000800.00020000.00000000.sdmp, bUBD.exe, 00000000.00000002.2666345093.000000000275F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: bUBD.exe, 00000000.00000002.2666345093.0000000002887000.00000004.00000800.00020000.00000000.sdmp, bUBD.exe, 00000000.00000002.2666345093.0000000002ABB000.00000004.00000800.00020000.00000000.sdmp, bUBD.exe, 00000000.00000002.2666345093.000000000275F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@9
          Source: C:\Users\user\Desktop\bUBD.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\bUBD.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: bUBD.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.bUBD.exe.40000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1620359262.0000000000042000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: bUBD.exe PID: 6840, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: bUBD.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.bUBD.exe.40000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1620359262.0000000000042000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: bUBD.exe PID: 6840, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Native API
          1
          DLL Side-Loading
          1
          Access Token Manipulation
          1
          Masquerading
          1
          Input Capture
          1
          Security Software Discovery
          Remote Services1
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts2
          Process Injection
          2
          Virtualization/Sandbox Evasion
          LSASS Memory2
          Virtualization/Sandbox Evasion
          Remote Desktop Protocol1
          Archive Collected Data
          1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          DLL Side-Loading
          1
          Disable or Modify Tools
          Security Account Manager1
          Process Discovery
          SMB/Windows Admin SharesData from Network Shared Drive1
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Access Token Manipulation
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput Capture21
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
          Process Injection
          LSA Secrets12
          System Information Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Software Packing
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          File Deletion
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          bUBD.exe95%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
          bUBD.exe100%AviraTR/Dropper.Gen7
          bUBD.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          patria.duckdns.org
          46.246.14.22
          truetrue
            unknown
            NameMaliciousAntivirus DetectionReputation
            patria.duckdns.orgtrue
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              46.246.14.22
              patria.duckdns.orgSweden
              42708PORTLANEwwwportlanecomSEtrue
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1427599
              Start date and time:2024-04-17 21:08:08 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 15s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:7
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:bUBD.exe
              Detection:MAL
              Classification:mal100.troj.spyw.evad.winEXE@4/1@2/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 99%
              • Number of executed functions: 94
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: bUBD.exe
              TimeTypeDescription
              21:09:32API Interceptor189416x Sleep call for process: bUBD.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              46.246.14.22bOTj.exeGet hashmaliciousNjratBrowse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                patria.duckdns.orgx5gJuYmvL7m2.exeGet hashmaliciousNjratBrowse
                • 46.246.82.18
                bTFU.exeGet hashmaliciousNjratBrowse
                • 46.246.14.2
                bTDk.exeGet hashmaliciousNjratBrowse
                • 46.246.80.3
                bT6H.exeGet hashmaliciousNjratBrowse
                • 46.246.12.4
                bT6q.exeGet hashmaliciousNjratBrowse
                • 46.246.12.14
                bT5A.exeGet hashmaliciousNjratBrowse
                • 46.246.80.9
                bT57.exeGet hashmaliciousNjratBrowse
                • 46.246.80.9
                bT5b.exeGet hashmaliciousNjratBrowse
                • 46.246.80.9
                bT3v.exeGet hashmaliciousNjratBrowse
                • 46.246.84.15
                bT2W.exeGet hashmaliciousNjratBrowse
                • 46.246.84.15
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                PORTLANEwwwportlanecomSExutnF2gKGTTy.exeGet hashmaliciousAsyncRATBrowse
                • 46.246.4.3
                8ubQTzsAqG.exeGet hashmaliciousUnknownBrowse
                • 185.117.88.39
                8ubQTzsAqG.exeGet hashmaliciousUnknownBrowse
                • 185.117.88.39
                ODOCVzwXq5.elfGet hashmaliciousMiraiBrowse
                • 195.190.218.30
                bSRh.exeGet hashmaliciousXWormBrowse
                • 46.246.86.13
                xjwP3UYA8ujq.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                • 46.246.82.6
                x6Xw7vcuD9zM.exeGet hashmaliciousNjratBrowse
                • 46.246.14.23
                xw8oKxLrOnt6.exeGet hashmaliciousRemcosBrowse
                • 46.246.14.10
                xde47dUIgZDh.exeGet hashmaliciousAsyncRATBrowse
                • 46.246.6.20
                x7CwEiB9bHEP.exeGet hashmaliciousNjratBrowse
                • 46.246.6.20
                No context
                No context
                Process:C:\Users\user\Desktop\bUBD.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):907
                Entropy (8bit):5.243019596074263
                Encrypted:false
                SSDEEP:24:MLF2CpI329Iz52VMzffup26KTnKoO2+b2hHAa/:MwQd9IzoaXuY6Ux+SF/
                MD5:48A0572426885EBDE53CA62C7F2E194E
                SHA1:035628CDF6276367F6C83E9F4AA2172933850AA8
                SHA-256:4C68E10691304CAC8DA65A05CF2580728EC0E294104F267840712AF1C46A6538
                SHA-512:DEFE728C2312918D94BD43C98908C08CCCA5EBFB77F873779DCA784F14C607B33A4E29AC5ECB798F2F741668B7692F72BCB60DEFD536EA86B296B64FA359C42D
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Configuration\53992d421e2c7ecf6609c62b3510a6f0\System.Configuration.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\74774597e319a738b792e6a6c06d3559\System.Xml.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Management\1bd56c432cb9ff27e335d97f404caf8f\System.Management.ni.dll",0..
                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):3.8058337179857618
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                • Win32 Executable (generic) a (10002005/4) 49.75%
                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                • Windows Screen Saver (13104/52) 0.07%
                • Win16/32 Executable Delphi generic (2074/23) 0.01%
                File name:bUBD.exe
                File size:32'768 bytes
                MD5:b0eb1186dec29582d7c86d211e2addf8
                SHA1:f8edefa10e35a0434bcb56ba45fcc265b4da6c52
                SHA256:d88a3e728153a059a398e01b451767e0fccf2eba9dcfeb6a5fe014363984a1c0
                SHA512:d3152ab2ebb76eea8ef99627317e4d9c01aa0cd060089338e6d62fbbc9d374ea282338c111100b430d11aeeb1faa73b973c4ff3473d6c2a66805c453e7fe3421
                SSDEEP:384:e0bUe5XB4e0X0gONpQq1pvmufCsIs6WT2tTUFQqz9A+ObbE:PT9Bui/Qqvvmu6V/bE
                TLSH:E2E2084A77E58215C6BC16FC8CB313210672E3878572EB6F9CDC88CA5B676D00651EEE
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f.................P... ......ng... ........@.. ....................................@................................
                Icon Hash:90cececece8e8eb0
                Entrypoint:0x40676e
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x661FE016 [Wed Apr 17 14:43:34 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x67180x53.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000x2b0.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0xa0000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x47740x5000dff105bc01e460c4fcff2a345b0802a2False0.475146484375data5.295670427311821IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0x80000x2b00x100000198e1617ae38c466f86b96f395cb28False0.077880859375data0.6915250571668272IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0xa0000xc0x100034585954bedb30c5084980db7d41ad8fFalse0.0087890625data0.013126943721219527IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_VERSION0x80580x254data0.46308724832214765
                DLLImport
                mscoree.dll_CorExeMain
                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                04/17/24-21:10:33.620833TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)497381994192.168.2.446.246.14.22
                04/17/24-21:09:03.882073TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)497301994192.168.2.446.246.14.22
                04/17/24-21:10:24.166032TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)497381994192.168.2.446.246.14.22
                04/17/24-21:10:19.272986TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)497301994192.168.2.446.246.14.22
                04/17/24-21:09:03.399283TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)497301994192.168.2.446.246.14.22
                TimestampSource PortDest PortSource IPDest IP
                Apr 17, 2024 21:09:02.964767933 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:09:03.307085037 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:09:03.307625055 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:09:03.399282932 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:09:03.881759882 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:09:03.882072926 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:09:04.269494057 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:09:08.416810036 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:09:08.858582020 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:09:52.744801044 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:09:53.169831038 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:09:55.150919914 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:09:55.571297884 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:09:57.059071064 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:09:57.457238913 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:03.463172913 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:03.869147062 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:05.918942928 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:06.369039059 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:06.369229078 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:06.933542013 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:06.978542089 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:07.271454096 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:07.271717072 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:07.319235086 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:07.319330931 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:07.602807999 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:07.603498936 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:07.758290052 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:07.758625031 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:08.090907097 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:08.091450930 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:08.409045935 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:08.479511976 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:08.479919910 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:08.746536970 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:08.746841908 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:08.957159996 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:08.957321882 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:09.269571066 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:09.269757986 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:09.459064960 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:09.459310055 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:09.769881010 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:09.769999981 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:09.969191074 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:09.969504118 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:10.174731970 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:10.175232887 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:10.371000051 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:10.371109009 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:10.573375940 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:10.573677063 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:10.761343956 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:10.761737108 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:11.056601048 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:11.056699991 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:11.164460897 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:11.164536953 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:11.496620893 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:11.500051022 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:11.850893021 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:12.071400881 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:12.076919079 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:12.196772099 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:12.197443962 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:12.449620962 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:12.458223104 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:12.458357096 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:12.723762035 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:12.770823956 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:12.771039963 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:12.786890984 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:12.787091970 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:12.970983028 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:12.971086979 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:13.055316925 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:13.055696011 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:13.278717041 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:13.357870102 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:13.357979059 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:13.469034910 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:13.469172001 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:13.610970020 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:13.611097097 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:13.809415102 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:13.809530020 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:14.080444098 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:14.080641031 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:14.260412931 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:14.260806084 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:14.516318083 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:14.758160114 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:14.758291006 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:14.847887039 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:14.851954937 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:15.115189075 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:15.191075087 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:15.193295956 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:15.440948009 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:15.448774099 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:15.568949938 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:15.569053888 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:15.785518885 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:15.785778046 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:15.972094059 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:15.972357035 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:16.269633055 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:16.269779921 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:16.470282078 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:16.472299099 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:16.658818960 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:16.658925056 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:16.971288919 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:16.971781015 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:17.160548925 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:17.163835049 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:17.431041956 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:17.470412970 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:17.470592022 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:17.658107042 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:17.658571959 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:17.764657021 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:17.764806032 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:17.980382919 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:17.980540037 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:18.109056950 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:18.109204054 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:18.330322027 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:18.370495081 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:18.370596886 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:18.560308933 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:18.560517073 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:18.664242029 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:18.664659977 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:18.871464968 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:18.871604919 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:19.009346008 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:19.009604931 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:19.263540030 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:19.272691011 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:19.272985935 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:19.458496094 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:19.461486101 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:19.625689030 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:19.625838041 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:19.771785975 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:19.773238897 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:19.959466934 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:19.964171886 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:20.069988966 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:20.072422028 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:20.272121906 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:20.274434090 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:20.406460047 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:20.406688929 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:20.661317110 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:20.661623955 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:20.892437935 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:20.892653942 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:21.066205978 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:21.066422939 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:21.270560026 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:21.270844936 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:21.470606089 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:21.470721960 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:21.522542953 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:21.522804022 CEST497301994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:21.610563993 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:21.802439928 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:21.856547117 CEST19944973046.246.14.22192.168.2.4
                Apr 17, 2024 21:10:23.805253029 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:24.137129068 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:24.137213945 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:24.166032076 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:24.449816942 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:24.647708893 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:24.647804976 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:24.782586098 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:24.783333063 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:25.051983118 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:25.052119017 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:25.237078905 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:25.237201929 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:25.529417038 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:25.547234058 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:25.549266100 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:25.749913931 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:25.750037909 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:25.865838051 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:25.866028070 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:26.043003082 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:26.043095112 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:26.148665905 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:26.149241924 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:26.335767984 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:26.337218046 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:26.444174051 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:26.444272041 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:26.641627073 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:26.641839981 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:26.747646093 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:26.747823954 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:26.946157932 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:26.946521997 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:27.087281942 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:27.087392092 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:27.336044073 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:27.349133015 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:27.349248886 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:27.538331032 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:27.538477898 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:27.678749084 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:27.678848028 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:27.849509954 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:27.849611998 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:28.021361113 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:28.021476030 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:28.336086035 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:28.336167097 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:28.444941044 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:28.447369099 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:28.679737091 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:28.792821884 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:28.793175936 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:29.012048960 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:29.236915112 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:29.338048935 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:29.339658022 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:29.341031075 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:29.341160059 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:29.570746899 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:29.570888996 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:29.671555042 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:29.671749115 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:29.940232992 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:29.947014093 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:29.947171926 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:30.148905039 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:30.148981094 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:30.274274111 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:30.274349928 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:30.336806059 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:30.336873055 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:30.593193054 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:30.745592117 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:30.747175932 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:30.935553074 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:30.936589003 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:31.114701033 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:31.248577118 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:31.251806974 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:31.437560081 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:31.437870026 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:31.444859028 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:31.444895983 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:31.444933891 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:31.493932962 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:31.679358959 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:31.734746933 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:31.734860897 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:31.773386955 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:31.773435116 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:31.773493052 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:31.842921019 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:31.843028069 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:32.020754099 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:32.020853996 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:32.107625008 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:32.107701063 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:32.247802973 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:32.247919083 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:32.414040089 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:32.448076963 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:32.448183060 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:32.588176966 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:32.588280916 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:32.767015934 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:32.848686934 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:32.851857901 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:33.034166098 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:33.050606966 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:33.052202940 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:33.280606985 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:33.371371984 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:33.371572018 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:33.435383081 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:33.435466051 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:33.616142035 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:33.620732069 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:33.620832920 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:33.745131016 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:33.745232105 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:33.948501110 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:33.948849916 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:33.969497919 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:33.969598055 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:34.084331036 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:34.084453106 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:34.305653095 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:34.506542921 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:34.636296034 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:34.636545897 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:34.748363018 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:34.748506069 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:34.838537931 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:34.838866949 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:35.044194937 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:35.044363022 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:35.085299969 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:35.085453033 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:35.210522890 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:35.345328093 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:35.345434904 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:35.543873072 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:35.544150114 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:35.745311022 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:35.745413065 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:35.946286917 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:35.946455002 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:36.152849913 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:36.153004885 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:36.336365938 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:36.336726904 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:36.555432081 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:36.646018028 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:36.646225929 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:36.848191023 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:36.848445892 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:36.891577959 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:36.891720057 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:37.171647072 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:37.223112106 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:37.223288059 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:37.501535892 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:37.501683950 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:37.735896111 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:37.736145020 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:37.930979967 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:37.931087017 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:38.251032114 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:38.251156092 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:38.438880920 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:38.439249039 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:38.595467091 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:38.749722958 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:38.753160954 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:38.934772015 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:39.041666031 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:39.045116901 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:39.097517014 CEST497381994192.168.2.446.246.14.22
                Apr 17, 2024 21:10:39.149622917 CEST19944973846.246.14.22192.168.2.4
                Apr 17, 2024 21:10:39.153198957 CEST497381994192.168.2.446.246.14.22
                TimestampSource PortDest PortSource IPDest IP
                Apr 17, 2024 21:09:02.389862061 CEST6141753192.168.2.41.1.1.1
                Apr 17, 2024 21:09:02.961895943 CEST53614171.1.1.1192.168.2.4
                Apr 17, 2024 21:10:23.662367105 CEST6347253192.168.2.41.1.1.1
                Apr 17, 2024 21:10:23.801206112 CEST53634721.1.1.1192.168.2.4
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Apr 17, 2024 21:09:02.389862061 CEST192.168.2.41.1.1.10x8f6fStandard query (0)patria.duckdns.orgA (IP address)IN (0x0001)false
                Apr 17, 2024 21:10:23.662367105 CEST192.168.2.41.1.1.10xbe08Standard query (0)patria.duckdns.orgA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Apr 17, 2024 21:09:02.961895943 CEST1.1.1.1192.168.2.40x8f6fNo error (0)patria.duckdns.org46.246.14.22A (IP address)IN (0x0001)false
                Apr 17, 2024 21:10:23.801206112 CEST1.1.1.1192.168.2.40xbe08No error (0)patria.duckdns.org46.246.14.22A (IP address)IN (0x0001)false

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:21:08:54
                Start date:17/04/2024
                Path:C:\Users\user\Desktop\bUBD.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\bUBD.exe"
                Imagebase:0x40000
                File size:32'768 bytes
                MD5 hash:B0EB1186DEC29582D7C86D211E2ADDF8
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.1620359262.0000000000042000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                Reputation:low
                Has exited:true

                Target ID:5
                Start time:21:10:38
                Start date:17/04/2024
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\bUBD.exe"
                Imagebase:0x240000
                File size:236'544 bytes
                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:6
                Start time:21:10:38
                Start date:17/04/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7699e0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:14.7%
                  Dynamic/Decrypted Code Coverage:82.1%
                  Signature Coverage:2%
                  Total number of Nodes:151
                  Total number of Limit Nodes:8
                  execution_graph 6614 49e0b9e 6615 49e0bd3 WSAConnect 6614->6615 6617 49e0bf2 6615->6617 6618 82a486 6619 82a4bb RegSetValueExW 6618->6619 6621 82a507 6619->6621 6622 82a186 6623 82a1bb send 6622->6623 6624 82a1f3 6622->6624 6625 82a1c9 6623->6625 6624->6623 6691 82a646 6692 82a67e CreateMutexW 6691->6692 6694 82a6c1 6692->6694 6695 b50972 6696 b50622 6695->6696 6701 b50a01 6696->6701 6706 b50a1a 6696->6706 6711 b50998 6696->6711 6716 b50a13 6696->6716 6702 b50a06 6701->6702 6703 b50ad7 6702->6703 6721 b50ce6 6702->6721 6725 b50cf8 6702->6725 6707 b50a1f 6706->6707 6708 b50ad7 6707->6708 6709 b50ce6 2 API calls 6707->6709 6710 b50cf8 2 API calls 6707->6710 6709->6708 6710->6708 6712 b509d3 6711->6712 6713 b50ad7 6712->6713 6714 b50ce6 2 API calls 6712->6714 6715 b50cf8 2 API calls 6712->6715 6714->6713 6715->6713 6717 b50a18 6716->6717 6718 b50ad7 6717->6718 6719 b50ce6 2 API calls 6717->6719 6720 b50cf8 2 API calls 6717->6720 6719->6718 6720->6718 6722 b50d23 6721->6722 6723 b50d6a 6722->6723 6729 b511c1 6722->6729 6723->6703 6726 b50d23 6725->6726 6727 b50d6a 6726->6727 6728 b511c1 2 API calls 6726->6728 6727->6703 6728->6727 6730 b511f5 6729->6730 6731 b51233 6730->6731 6734 49e0d66 6730->6734 6737 49e0d10 6730->6737 6731->6723 6735 49e0db6 GetVolumeInformationA 6734->6735 6736 49e0dbe 6735->6736 6736->6731 6738 49e0d66 GetVolumeInformationA 6737->6738 6740 49e0dbe 6738->6740 6740->6731 6741 49e2056 6742 49e207f select 6741->6742 6744 49e20b4 6742->6744 6745 82adce 6746 82ae30 6745->6746 6747 82adfa closesocket 6745->6747 6746->6747 6748 82ae08 6747->6748 6749 49e08d2 6751 49e0907 GetProcessTimes 6749->6751 6752 49e0939 6751->6752 6753 82a74e 6754 82a77a FindCloseChangeNotification 6753->6754 6755 82a7b9 6753->6755 6756 82a788 6754->6756 6755->6754 6757 b503f8 KiUserExceptionDispatcher 6758 b5042c 6757->6758 6626 82a392 6628 82a3c7 RegQueryValueExW 6626->6628 6629 82a41b 6628->6629 6630 49e388a 6631 49e38bf RegDeleteKeyW 6630->6631 6633 49e38f7 6631->6633 6634 49e060a 6636 49e063f shutdown 6634->6636 6637 49e0668 6636->6637 6638 49e2f06 6639 49e2f32 LoadLibraryShim 6638->6639 6641 49e2f60 6639->6641 6767 82a2da 6768 82a306 SetErrorMode 6767->6768 6769 82a32f 6767->6769 6770 82a31b 6768->6770 6769->6768 6642 82b61e 6644 82b656 CreateFileW 6642->6644 6645 82b6a5 6644->6645 6646 49e2502 6648 49e2537 GetProcessWorkingSetSize 6646->6648 6649 49e2563 6648->6649 6771 82bc5e 6773 82bc96 WSASocketW 6771->6773 6774 82bcd2 6773->6774 6650 49e09be 6652 49e09f9 getaddrinfo 6650->6652 6653 49e0a6b 6652->6653 6775 49e3e7e 6776 49e3eaa DispatchMessageW 6775->6776 6777 49e3ed3 6775->6777 6778 49e3ebf 6776->6778 6777->6776 6779 82bd62 6780 82bd9a setsockopt 6779->6780 6782 82bdd2 6779->6782 6781 82bda8 6780->6781 6782->6780 6783 49e1f7a 6785 49e1faf ioctlsocket 6783->6785 6786 49e1fdb 6785->6786 6654 49e01b6 6655 49e01ee ConvertStringSecurityDescriptorToSecurityDescriptorW 6654->6655 6657 49e022f 6655->6657 6658 82ac2a 6659 82aca0 6658->6659 6660 82ac68 DuplicateHandle 6658->6660 6659->6660 6661 82ac76 6660->6661 6662 49e0032 6663 49e0082 GetComputerNameW 6662->6663 6664 49e0090 6663->6664 6787 49e0ff2 6789 49e102d LoadLibraryA 6787->6789 6790 49e106a 6789->6790 6665 49e22aa 6666 49e22d9 AdjustTokenPrivileges 6665->6666 6668 49e22fb 6666->6668 6669 49e1daa 6670 49e1de2 RegCreateKeyExW 6669->6670 6672 49e1e54 6670->6672 6673 49e29aa 6674 49e29fa RegEnumValueW 6673->6674 6675 49e2a08 6674->6675 6676 82b736 6678 82b76b GetFileType 6676->6678 6679 82b798 6678->6679 6680 49e212a 6683 49e2153 LookupPrivilegeValueW 6680->6683 6682 49e217a 6683->6682 6791 82b9f6 6793 82ba2b ReadFile 6791->6793 6794 82ba5d 6793->6794 6684 49e2426 6687 49e245b GetExitCodeProcess 6684->6687 6686 49e2484 6687->6686 6795 49e25e6 6796 49e261b SetProcessWorkingSetSize 6795->6796 6798 49e2647 6796->6798 6799 82a7fa 6801 82a832 RegOpenKeyExW 6799->6801 6802 82a888 6801->6802 6803 49e0366 6804 49e039e MapViewOfFile 6803->6804 6806 49e03ed 6804->6806 6807 49e3be2 6808 49e3c17 PostMessageW 6807->6808 6809 49e3c42 6807->6809 6810 49e3c2c 6808->6810 6809->6808

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 b519f0-b51a4c 4 b51a52-b51a66 0->4 5 b52f39-b52f5a 0->5 10 b51a74-b51a85 4->10 11 b51a68-b51a6f 4->11 8 b52fc6-b53002 5->8 9 b52f5c-b52f66 5->9 29 b53004-b5304b call b513b0 8->29 30 b5304d-b53052 8->30 12 b52f6c-b52fbc 9->12 13 b53069 9->13 18 b51a87-b51ac7 call b513b0 10->18 19 b51acc-b51add 10->19 14 b5306e-b53075 11->14 12->8 27 b52fbe-b52fc0 12->27 13->14 18->14 25 b51ae3-b51aed 19->25 26 b51c12-b51c23 19->26 25->5 31 b51af3-b51b07 25->31 37 b51e61-b51e72 26->37 38 b51c29-b51c33 26->38 27->8 44 b5305d-b53067 29->44 30->44 40 b51b09-b51b13 31->40 41 b51b3b-b51b4c 31->41 53 b52288-b52299 37->53 54 b51e78-b51e82 37->54 38->5 39 b51c39-b51c40 38->39 39->5 42 b51c46-b51c4b 39->42 40->5 47 b51b19-b51b26 40->47 57 b51b52-b51b5c 41->57 58 b51bdd-b51bee 41->58 49 b51c51-b51c7a 42->49 50 b51d0d-b51d36 42->50 44->14 47->5 48 b51b2c-b51b36 call b51908 47->48 48->14 82 b51c7c-b51ca0 49->82 83 b51ccf-b51d08 call b513b0 * 2 49->83 93 b51d71-b51d8d call b513b0 50->93 68 b52583-b52594 53->68 69 b5229f-b522a9 53->69 54->5 61 b51e88-b51eb8 call b50550 54->61 57->5 66 b51b62-b51b6f 57->66 58->14 78 b51bf4-b51bfe 58->78 61->5 101 b51ebe-b51edf 61->101 66->5 71 b51b75-b51bd8 call b51908 call b50550 call b513b0 66->71 89 b52932-b52943 68->89 90 b5259a-b52761 68->90 69->5 76 b522af-b522df call b50550 69->76 71->14 76->5 127 b522e5-b52306 76->127 78->5 84 b51c04-b51c0d 78->84 104 b51ca2-b51cc5 82->104 105 b51cca 82->105 83->14 84->14 112 b529fe-b52a0f 89->112 113 b52949-b52953 89->113 90->5 311 b52767-b5277f 90->311 93->5 129 b51d93-b51dfd call b513b0 93->129 109 b51ee5-b51f63 call b513b0 101->109 110 b51f68-b51f6f 101->110 104->93 105->83 109->14 117 b51f75-b51ff1 110->117 118 b52069-b5217e call b513b0 110->118 133 b52a15-b52a1f 112->133 134 b52c51-b52c62 112->134 113->5 121 b52959-b5296d 113->121 117->5 246 b51ff7-b5202f 117->246 118->5 347 b52184-b521c8 118->347 143 b5296f 121->143 144 b5297a-b5298b 121->144 136 b5230c-b5238a call b513b0 127->136 137 b5238f-b52396 127->137 129->14 133->5 142 b52a25-b52a2c 133->142 157 b52de1-b52df2 134->157 158 b52c68-b52c6f 134->158 136->14 139 b5239c-b523e5 137->139 140 b5241f-b5257e call b513b0 * 2 137->140 204 b52f34 139->204 205 b523eb-b5241a call b51908 139->205 140->14 142->5 150 b52a32-b52a37 142->150 413 b5296f call b53081 143->413 414 b5296f call b531a0 143->414 415 b5296f call b531b2 143->415 416 b5296f call b5316c 143->416 173 b529b1-b529c2 144->173 174 b5298d-b529ac 144->174 160 b52a3d-b52a80 150->160 161 b52aeb-b52b1a 150->161 157->14 185 b52df8-b52e3b 157->185 168 b52c75-b52c9e call b513b0 158->168 169 b52cfe-b52d65 158->169 226 b52a82-b52aa8 160->226 227 b52aad-b52ae6 call b513b0 * 2 160->227 221 b52b55-b52c4c call b513b0 * 2 161->221 163 b52975 163->14 195 b52ca0-b52ca3 168->195 196 b52cdc-b52cf8 168->196 169->5 234 b52d6b-b52d94 169->234 173->14 201 b529c8-b529f9 173->201 174->14 185->204 247 b52e41-b52f2f 185->247 195->204 207 b52ca9-b52cda 195->207 196->14 196->169 201->14 204->5 205->140 207->195 207->196 221->14 226->221 227->14 234->14 261 b52d9a-b52d9e 234->261 246->204 298 b52035-b52064 call b51908 246->298 247->14 261->5 262 b52da4-b52ddc 261->262 262->14 298->118 311->5 323 b52785-b5289d call b53081 311->323 393 b528f3-b528f7 323->393 394 b5289f-b528cb 323->394 364 b521d4-b5223c 347->364 385 b5223e-b52283 364->385 386 b521ca 364->386 385->14 386->364 397 b528ff-b52928 call b513e8 393->397 403 b528d7-b528da 394->403 404 b528cd-b528cf 394->404 411 b5292d 397->411 403->204 407 b528e0-b528f1 403->407 404->204 406 b528d5 404->406 406->407 407->397 411->14 413->163 414->163 415->163 416->163
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2666243236.0000000000B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b50000_bUBD.jbxd
                  Similarity
                  • API ID:
                  • String ID: $
                  • API String ID: 0-227171996
                  • Opcode ID: 0ed20a32d963a6f3eac1a5dc9895fed7d8f2cb72cfd3374f1aee46722da4c145
                  • Instruction ID: 87f660863d822facaad250c497300a09a5afdecd6c2814d987375791f4930908
                  • Opcode Fuzzy Hash: 0ed20a32d963a6f3eac1a5dc9895fed7d8f2cb72cfd3374f1aee46722da4c145
                  • Instruction Fuzzy Hash: 1DC29D30B002149FCB14EB68D954BAD77F3AF89305F1484E9E9099B7A9DF349D89CB81
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 049E22F3
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: AdjustPrivilegesToken
                  • String ID:
                  • API String ID: 2874748243-0
                  • Opcode ID: fed285a0cdc26111a2461973c72a2cac684e4bd431f9b5d38ebeafda4e4b7d75
                  • Instruction ID: 43c044a5eef181b31d988e6022d55f4bf35ae1299f216a4dfa319f31420a2a2f
                  • Opcode Fuzzy Hash: fed285a0cdc26111a2461973c72a2cac684e4bd431f9b5d38ebeafda4e4b7d75
                  • Instruction Fuzzy Hash: 5221D3755093809FDB238F25DC44B52BFF8EF06310F0885EAE9848F563D275A908DB62
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 049E22F3
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: AdjustPrivilegesToken
                  • String ID:
                  • API String ID: 2874748243-0
                  • Opcode ID: 92928daa22b85f53caa4f933c87436d7bcb05bc5d2576bb38069622fa94f2d17
                  • Instruction ID: dd87d716915cee96a3921b56704a5f2f6df2b2c35ddf6429260bfe9e58ebad40
                  • Opcode Fuzzy Hash: 92928daa22b85f53caa4f933c87436d7bcb05bc5d2576bb38069622fa94f2d17
                  • Instruction Fuzzy Hash: AE115E766002009FEB21CF56D944B66FBE8EF08620F0889BAED458B656D375E418DF62
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 417 b503f8-b50436 KiUserExceptionDispatcher 420 b50439-b5043f 417->420 421 b50445-b50448 420->421 422 b5052d-b5053e 420->422 423 b5044a 421->423 451 b5044c call d60606 423->451 452 b5044c call d605e0 423->452 425 b50451-b50472 428 b50474-b50476 425->428 429 b504b9-b504bc 425->429 448 b50478 call d60606 428->448 449 b50478 call b51587 428->449 450 b50478 call d605e0 428->450 429->422 430 b504be-b504c4 429->430 430->423 431 b504c6-b504cd 430->431 433 b504cf-b504e5 431->433 434 b5051e 431->434 432 b5047e-b50485 435 b50487-b504ae 432->435 436 b504b6 432->436 433->422 440 b504e7-b504ef 433->440 437 b50528 434->437 435->436 436->429 437->420 441 b504f1-b504fc 440->441 442 b50510-b50516 440->442 441->422 444 b504fe-b50508 441->444 442->434 444->442 448->432 449->432 450->432 451->425 452->425
                  APIs
                  • KiUserExceptionDispatcher.NTDLL ref: 00B5041F
                  Memory Dump Source
                  • Source File: 00000000.00000002.2666243236.0000000000B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b50000_bUBD.jbxd
                  Similarity
                  • API ID: DispatcherExceptionUser
                  • String ID:
                  • API String ID: 6842923-0
                  • Opcode ID: f1ae87e9aacb284b0070a7be8b18211bb6e8594bebfade19d8891997ae8b0616
                  • Instruction ID: 7a1dbcae7b649f80b3a666152016c247cdcb1352a4b44132e7aa542e64be8be4
                  • Opcode Fuzzy Hash: f1ae87e9aacb284b0070a7be8b18211bb6e8594bebfade19d8891997ae8b0616
                  • Instruction Fuzzy Hash: 72318031A102008FCB14EF78D99469DB7F2EF88305B1485B9D909EB35AEB34DD85CBA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 453 82b5de-82b676 457 82b67b-82b687 453->457 458 82b678 453->458 459 82b689 457->459 460 82b68c-82b695 457->460 458->457 459->460 461 82b6e6-82b6eb 460->461 462 82b697-82b6bb CreateFileW 460->462 461->462 465 82b6ed-82b6f2 462->465 466 82b6bd-82b6e3 462->466 465->466
                  APIs
                  • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0082B69D
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: CreateFile
                  • String ID:
                  • API String ID: 823142352-0
                  • Opcode ID: 95d492c1019dff6cfbd426a9465a4c062145863a4ae17dc5d8edcb6c17325135
                  • Instruction ID: 69f1db9442ab1d03809db78bcd9a56607f1a2e14d41621d84c38e3199cab5746
                  • Opcode Fuzzy Hash: 95d492c1019dff6cfbd426a9465a4c062145863a4ae17dc5d8edcb6c17325135
                  • Instruction Fuzzy Hash: 8D3180B1505380AFE722CB65DC44FA2BFE8EF16314F08849AE984CB652D375E909DB71
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 469 b503e8-b50425 KiUserExceptionDispatcher 470 b5042c-b50436 469->470 472 b50439-b5043f 470->472 473 b50445-b50448 472->473 474 b5052d-b5053e 472->474 475 b5044a 473->475 500 b5044c call d60606 475->500 501 b5044c call d605e0 475->501 477 b50451-b50472 480 b50474-b50476 477->480 481 b504b9-b504bc 477->481 502 b50478 call d60606 480->502 503 b50478 call b51587 480->503 504 b50478 call d605e0 480->504 481->474 482 b504be-b504c4 481->482 482->475 483 b504c6-b504cd 482->483 485 b504cf-b504e5 483->485 486 b5051e 483->486 484 b5047e-b50485 487 b50487-b504ae 484->487 488 b504b6 484->488 485->474 492 b504e7-b504ef 485->492 489 b50528 486->489 487->488 488->481 489->472 493 b504f1-b504fc 492->493 494 b50510-b50516 492->494 493->474 496 b504fe-b50508 493->496 494->486 496->494 500->477 501->477 502->484 503->484 504->484
                  APIs
                  • KiUserExceptionDispatcher.NTDLL ref: 00B5041F
                  Memory Dump Source
                  • Source File: 00000000.00000002.2666243236.0000000000B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b50000_bUBD.jbxd
                  Similarity
                  • API ID: DispatcherExceptionUser
                  • String ID:
                  • API String ID: 6842923-0
                  • Opcode ID: 02de40d6b596327aad663ea8a3b2cb3c4f2ff1e9dc3055e19d183c05dd69f6dc
                  • Instruction ID: 81d7418e8ee327bf0d82d06a0e0b180ad00d4f60a77243a5cc3721e3bc1c3961
                  • Opcode Fuzzy Hash: 02de40d6b596327aad663ea8a3b2cb3c4f2ff1e9dc3055e19d183c05dd69f6dc
                  • Instruction Fuzzy Hash: CB318570A102018FCB14DF78D9D4A9DB7F2EF88305B1485A9D909DB35AEB34DD85CBA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 505 49e1d7e-49e1e02 509 49e1e07-49e1e13 505->509 510 49e1e04 505->510 511 49e1e18-49e1e21 509->511 512 49e1e15 509->512 510->509 513 49e1e26-49e1e3d 511->513 514 49e1e23 511->514 512->511 516 49e1e7f-49e1e84 513->516 517 49e1e3f-49e1e52 RegCreateKeyExW 513->517 514->513 516->517 518 49e1e86-49e1e8b 517->518 519 49e1e54-49e1e7c 517->519 518->519
                  APIs
                  • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 049E1E45
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: Create
                  • String ID:
                  • API String ID: 2289755597-0
                  • Opcode ID: fb2714669792a52fd17fcf1bef13713538a8df6e01f1851bfd466838b60e20ff
                  • Instruction ID: 0036a267e4d3ff19ee8c2fd66398036d3cbe41e1519ec2acc9235870a259bd38
                  • Opcode Fuzzy Hash: fb2714669792a52fd17fcf1bef13713538a8df6e01f1851bfd466838b60e20ff
                  • Instruction Fuzzy Hash: 5A315072504344AFE722CF65DC45FA7BBECEF15210F08459AF9858B662D734E908CBA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 524 82bb4b-82bb6b 525 82bb8d-82bbbf 524->525 526 82bb6d-82bb8c 524->526 530 82bbc2-82bc1a RegQueryValueExW 525->530 526->525 532 82bc20-82bc36 530->532
                  APIs
                  • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 0082BC12
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: QueryValue
                  • String ID:
                  • API String ID: 3660427363-0
                  • Opcode ID: 276c53e462074f92168474d3f7d14defad3e8fe90a7f21830bacc9d85db16761
                  • Instruction ID: a7c696dd42ee9e729252a00796437982c91a140ecd6f26fa9360384b5b466ce2
                  • Opcode Fuzzy Hash: 276c53e462074f92168474d3f7d14defad3e8fe90a7f21830bacc9d85db16761
                  • Instruction Fuzzy Hash: 20318B6510E3C06FD3138B218C61A61BFB4EF47610F0E45CBD8C48F6A3D629A919D7B2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 533 82a7c7-82a855 537 82a857 533->537 538 82a85a-82a871 533->538 537->538 540 82a8b3-82a8b8 538->540 541 82a873-82a886 RegOpenKeyExW 538->541 540->541 542 82a8ba-82a8bf 541->542 543 82a888-82a8b0 541->543 542->543
                  APIs
                  • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 0082A879
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: Open
                  • String ID:
                  • API String ID: 71445658-0
                  • Opcode ID: 9d19392520cd251924018ea50ee445c2caa4a1d33043d26c338ab23da09b6397
                  • Instruction ID: d50a246ba77eab67d209693493f027f787eda275654dc41c87c2cffa22de3ad1
                  • Opcode Fuzzy Hash: 9d19392520cd251924018ea50ee445c2caa4a1d33043d26c338ab23da09b6397
                  • Instruction Fuzzy Hash: 203195B24083846FE7228B519C44FA7BFBCEF16314F08459AE985CB653D264E909C771
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 548 49e099c-49e0a5b 554 49e0aad-49e0ab2 548->554 555 49e0a5d-49e0a65 getaddrinfo 548->555 554->555 556 49e0a6b-49e0a7d 555->556 558 49e0a7f-49e0aaa 556->558 559 49e0ab4-49e0ab9 556->559 559->558
                  APIs
                  • getaddrinfo.WS2_32(?,00000E24), ref: 049E0A63
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: getaddrinfo
                  • String ID:
                  • API String ID: 300660673-0
                  • Opcode ID: fed494d5021c0110d41095405c1d11df365b5f745805cfedfc5102e170d8b94b
                  • Instruction ID: c019c96c24d9795ff66ecbd91e60ccbb8eac247f73961882bb91e7c98895fa7d
                  • Opcode Fuzzy Hash: fed494d5021c0110d41095405c1d11df365b5f745805cfedfc5102e170d8b94b
                  • Instruction Fuzzy Hash: C131AFB1504344AFEB21CB51DC44FA6BBACEF14314F04889AFA889B682D374E908CB71
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 563 82a612-82a695 567 82a697 563->567 568 82a69a-82a6a3 563->568 567->568 569 82a6a5 568->569 570 82a6a8-82a6b1 568->570 569->570 571 82a702-82a707 570->571 572 82a6b3-82a6d7 CreateMutexW 570->572 571->572 575 82a709-82a70e 572->575 576 82a6d9-82a6ff 572->576 575->576
                  APIs
                  • CreateMutexW.KERNELBASE(?,?), ref: 0082A6B9
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: CreateMutex
                  • String ID:
                  • API String ID: 1964310414-0
                  • Opcode ID: b807634dfc69a8f50dcf11fff4bab3364eaa3f28e6b71baf761c4bb9c5ad27d3
                  • Instruction ID: d4c92b7c050ac6b6ff58b35caf295ac5ddb90c6287c6996afcb559651b31333a
                  • Opcode Fuzzy Hash: b807634dfc69a8f50dcf11fff4bab3364eaa3f28e6b71baf761c4bb9c5ad27d3
                  • Instruction Fuzzy Hash: 33318FB55093806FE712CB25DC85B96BFF8EF16310F08849AE984CB293D375E909C762
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 594 49e0894-49e0929 599 49e092b-49e0933 GetProcessTimes 594->599 600 49e0976-49e097b 594->600 601 49e0939-49e094b 599->601 600->599 603 49e097d-49e0982 601->603 604 49e094d-49e0973 601->604 603->604
                  APIs
                  • GetProcessTimes.KERNELBASE(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 049E0931
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: ProcessTimes
                  • String ID:
                  • API String ID: 1995159646-0
                  • Opcode ID: 945b9059174bbe64b9a0770c0338145bfd31bc8befc299ea9c780e6bb6672472
                  • Instruction ID: f009131f6a3cf8ad306e3dbc6ec39194533a30a501c1dd6803a5eab064d13d6e
                  • Opcode Fuzzy Hash: 945b9059174bbe64b9a0770c0338145bfd31bc8befc299ea9c780e6bb6672472
                  • Instruction Fuzzy Hash: 1631E9725097806FE7128F61DC45FA6BFB8EF16314F0884DAE984CF193D265A909CB71
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 579 49e0190-49e0211 583 49e0216-49e021f 579->583 584 49e0213 579->584 585 49e0277-49e027c 583->585 586 49e0221-49e0229 ConvertStringSecurityDescriptorToSecurityDescriptorW 583->586 584->583 585->586 588 49e022f-49e0241 586->588 589 49e027e-49e0283 588->589 590 49e0243-49e0274 588->590 589->590
                  APIs
                  • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 049E0227
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: DescriptorSecurity$ConvertString
                  • String ID:
                  • API String ID: 3907675253-0
                  • Opcode ID: 9e9d799d532707496870fae92ecd5345a5b3c295498519581108d98d6b10d1bd
                  • Instruction ID: e4fcd3f682ce859e7af8fc16604f092f98f50f72beea5bf045b2936b0191f58e
                  • Opcode Fuzzy Hash: 9e9d799d532707496870fae92ecd5345a5b3c295498519581108d98d6b10d1bd
                  • Instruction Fuzzy Hash: E8318171504384AFEB22CF65DC45FA7BBECEF05210F0884AAE944DB652D264E908CB71
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 607 49e1daa-49e1e02 610 49e1e07-49e1e13 607->610 611 49e1e04 607->611 612 49e1e18-49e1e21 610->612 613 49e1e15 610->613 611->610 614 49e1e26-49e1e3d 612->614 615 49e1e23 612->615 613->612 617 49e1e7f-49e1e84 614->617 618 49e1e3f-49e1e52 RegCreateKeyExW 614->618 615->614 617->618 619 49e1e86-49e1e8b 618->619 620 49e1e54-49e1e7c 618->620 619->620
                  APIs
                  • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 049E1E45
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: Create
                  • String ID:
                  • API String ID: 2289755597-0
                  • Opcode ID: 60f2b3b7362725304f6785b0caf967b67dd624aa1701f089b8ef363e22b1b3d8
                  • Instruction ID: 3ad69a4ed9a00dc1e1fab8e9f2daaf8023ad0786d66ab492377e84e815a9cd91
                  • Opcode Fuzzy Hash: 60f2b3b7362725304f6785b0caf967b67dd624aa1701f089b8ef363e22b1b3d8
                  • Instruction Fuzzy Hash: 2E217172500204AFEB21DE15DC45FA7B7ECEF18614F04856AF945D6651D734F508CA71
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 625 49e09be-49e0a5b 630 49e0aad-49e0ab2 625->630 631 49e0a5d-49e0a65 getaddrinfo 625->631 630->631 632 49e0a6b-49e0a7d 631->632 634 49e0a7f-49e0aaa 632->634 635 49e0ab4-49e0ab9 632->635 635->634
                  APIs
                  • getaddrinfo.WS2_32(?,00000E24), ref: 049E0A63
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: getaddrinfo
                  • String ID:
                  • API String ID: 300660673-0
                  • Opcode ID: 75ed96ac22a6473aa204f1b84baa7993c88d377d01cf936f28704cfda65df0b6
                  • Instruction ID: 5595f858d116f87b2c0c25498b4146aae6a71315e797de462e8c7238e7e7ce96
                  • Opcode Fuzzy Hash: 75ed96ac22a6473aa204f1b84baa7993c88d377d01cf936f28704cfda65df0b6
                  • Instruction Fuzzy Hash: 1721AD71500204AEEB21DB61CC88FA6F7ACEF14314F04886AEA889A685D6B4E508CB71
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 639 49e0d10-49e0db8 GetVolumeInformationA 642 49e0dbe-49e0de7 639->642
                  APIs
                  • GetVolumeInformationA.KERNELBASE(?,00000E24,?,?), ref: 049E0DB6
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: InformationVolume
                  • String ID:
                  • API String ID: 2039140958-0
                  • Opcode ID: 8fd140751911dd3d993955c0ed42bdb5130fdf7117d0caa6bb1d5f996d984d4a
                  • Instruction ID: 45beb8df3e14b3e556add1b8fa37152c2a8dcf7e80675c1c708ff2e185b3f5c2
                  • Opcode Fuzzy Hash: 8fd140751911dd3d993955c0ed42bdb5130fdf7117d0caa6bb1d5f996d984d4a
                  • Instruction Fuzzy Hash: 0431917150D3C06FD3128B258C55B62BFB8EF47610F0980DBE884DF693D225A959C7A2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 644 82a370-82a3cf 647 82a3d1 644->647 648 82a3d4-82a3dd 644->648 647->648 649 82a3e2-82a3e8 648->649 650 82a3df 648->650 651 82a3ea 649->651 652 82a3ed-82a404 649->652 650->649 651->652 654 82a406-82a419 RegQueryValueExW 652->654 655 82a43b-82a440 652->655 656 82a442-82a447 654->656 657 82a41b-82a438 654->657 655->654 656->657
                  APIs
                  • RegQueryValueExW.KERNELBASE(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 0082A40C
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: QueryValue
                  • String ID:
                  • API String ID: 3660427363-0
                  • Opcode ID: ad5ae10bda9287b6139343bac1ba8c3609d333dbd492b7b64e8e8895a3c27342
                  • Instruction ID: 945b6ba8aeecd442b1ad2d0247da6cc2c51e4c4ce550545028e53bc461654fff
                  • Opcode Fuzzy Hash: ad5ae10bda9287b6139343bac1ba8c3609d333dbd492b7b64e8e8895a3c27342
                  • Instruction Fuzzy Hash: 9B218B75504740AFE721CF11DC88FA2BBF8EF15720F08849AE985CB292D364E948CB62
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: select
                  • String ID:
                  • API String ID: 1274211008-0
                  • Opcode ID: 9847d81a4e14557da8a3d6b4af0d70d001511235e43ac74f259c5b36539a8a89
                  • Instruction ID: bafa372b8f69290a99b11d9404862c5f991358f0a0ce68c755de22679ac8ab0c
                  • Opcode Fuzzy Hash: 9847d81a4e14557da8a3d6b4af0d70d001511235e43ac74f259c5b36539a8a89
                  • Instruction Fuzzy Hash: 26216F715093849FDB22CF25DC44A62BFF8EF06310F0984DAE984CB263D275A949DB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • GetFileType.KERNELBASE(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 0082B789
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: FileType
                  • String ID:
                  • API String ID: 3081899298-0
                  • Opcode ID: bcee96a21837285c6b26f44b007a3a53868c4361eda1217b9a16fd12296043ca
                  • Instruction ID: c67e3fafcfcb70ee365d42cef419ba2105000698566b05324ae5f0535b7b5382
                  • Opcode Fuzzy Hash: bcee96a21837285c6b26f44b007a3a53868c4361eda1217b9a16fd12296043ca
                  • Instruction Fuzzy Hash: 6421D8B54093806FE7128B15DC45BA2BFACEF56324F0985D6E9848B293D2649909C771
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • GetExitCodeProcess.KERNELBASE(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 049E247C
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: CodeExitProcess
                  • String ID:
                  • API String ID: 3861947596-0
                  • Opcode ID: f8471bc1d0b63433e6324ac8303315c6b9aef51b3c78842e20dab343a1ef765b
                  • Instruction ID: b3de35077510f83b267032edfbf6baf50c2abfd1a4f561201203cc7b7271b40a
                  • Opcode Fuzzy Hash: f8471bc1d0b63433e6324ac8303315c6b9aef51b3c78842e20dab343a1ef765b
                  • Instruction Fuzzy Hash: C321A1715093806FE712CB25DC45FA6BFB8EF46314F0884EAE984DF297D268A908C771
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • RegEnumValueW.KERNELBASE(?,00000E24,?,?), ref: 049E29FA
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: EnumValue
                  • String ID:
                  • API String ID: 2814608202-0
                  • Opcode ID: 3b340a02f8a93951472bde5bd92f808b94dd01171cf18ae6ea6bd301957ed920
                  • Instruction ID: 21b61a66fb71925b77d1a25d62a399b6516a52fad414471c67c4baca34b05fa3
                  • Opcode Fuzzy Hash: 3b340a02f8a93951472bde5bd92f808b94dd01171cf18ae6ea6bd301957ed920
                  • Instruction Fuzzy Hash: 6E21C77150D3C06FD3138B258C55B62BFB4EF87610F1980CFE8888B693D625A91AD7B2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • WSASocketW.WS2_32(?,?,?,?,?), ref: 0082BCCA
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: Socket
                  • String ID:
                  • API String ID: 38366605-0
                  • Opcode ID: 198d2f51910dcad496ea26c02ecfcbdf8a915e3c32a723a6193a18d253b002cc
                  • Instruction ID: 9797b32024606cd656b2e70d56364095dd94d40e920eb7d52af24281e1b8c925
                  • Opcode Fuzzy Hash: 198d2f51910dcad496ea26c02ecfcbdf8a915e3c32a723a6193a18d253b002cc
                  • Instruction Fuzzy Hash: 54218071509380AFEB22CF51DC45F96FFB8EF15320F08889EE9858B656D375A908CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • RegSetValueExW.KERNELBASE(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 0082A4F8
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: Value
                  • String ID:
                  • API String ID: 3702945584-0
                  • Opcode ID: b925995239bc2c398a53f51ef51e39808971fdc1f778110571f88f1c979cd68f
                  • Instruction ID: f03f8f96b0d9a1d93adff539be98915a5fb7699f1cd8bc74413d2c41c71ab724
                  • Opcode Fuzzy Hash: b925995239bc2c398a53f51ef51e39808971fdc1f778110571f88f1c979cd68f
                  • Instruction Fuzzy Hash: 6B21A4725043806FD722CF51DC44F67BFB8EF55310F08849AE985DB652D264E848C772
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: FileView
                  • String ID:
                  • API String ID: 3314676101-0
                  • Opcode ID: e6695c8201184c27822bddb015dc8be34237697bc0f40fe2ef1c50f365f979d7
                  • Instruction ID: 18ce17ac050fca3d88a2d9a11683699155415f864c4d6dbb3a904e35631834ac
                  • Opcode Fuzzy Hash: e6695c8201184c27822bddb015dc8be34237697bc0f40fe2ef1c50f365f979d7
                  • Instruction Fuzzy Hash: 6F21BF71409384AFE722CF15DC44FA6FBF8EF19224F04849EE9848B652D379E908CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0082B69D
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: CreateFile
                  • String ID:
                  • API String ID: 823142352-0
                  • Opcode ID: 8079d9d40c924f9d9d44f21f9dffa525217d4f5e19b0c564f5f2af8a19cae264
                  • Instruction ID: 4557e40982517af924e12f46437da8b21aa9088642284583a3f7b9f4dc6c1c27
                  • Opcode Fuzzy Hash: 8079d9d40c924f9d9d44f21f9dffa525217d4f5e19b0c564f5f2af8a19cae264
                  • Instruction Fuzzy Hash: EF219C71501204AFEB20CF25DD84F66FBE8EF18314F088869E985CB656D375E848CB71
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 049E0227
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: DescriptorSecurity$ConvertString
                  • String ID:
                  • API String ID: 3907675253-0
                  • Opcode ID: 23d3b2a6d4b4146c73fb04217960fbdad2bd796db8b27bae3f5a2613c1eb7ae0
                  • Instruction ID: 309caac08bbfe8555dce3ca04da9ae6c3b4dfbfa179e7bd957a846636ecbe2e0
                  • Opcode Fuzzy Hash: 23d3b2a6d4b4146c73fb04217960fbdad2bd796db8b27bae3f5a2613c1eb7ae0
                  • Instruction Fuzzy Hash: 9421D172600204AFEB21DF65DC44FBABBECEF14214F08886AE948DB756D774E508CA71
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 049E2172
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: LookupPrivilegeValue
                  • String ID:
                  • API String ID: 3899507212-0
                  • Opcode ID: 882a54589efed44c43c718f5ea5d356c82aa94ba1e8290c957a967f39fb3ad27
                  • Instruction ID: 7bbf37a066b0566331c362c53473dff2bd295e798d2b280abb5493fd4df9f5f3
                  • Opcode Fuzzy Hash: 882a54589efed44c43c718f5ea5d356c82aa94ba1e8290c957a967f39fb3ad27
                  • Instruction Fuzzy Hash: 802192B25093809FE713CF25DC54B62BFA8AF56214F0984EAE948CB253D225E909C771
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • RegQueryValueExW.KERNELBASE(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 049E013C
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: QueryValue
                  • String ID:
                  • API String ID: 3660427363-0
                  • Opcode ID: 380bebf2ebc311167551452d5e3e6684d40947ebad6ec4710f05ac09e1864d6f
                  • Instruction ID: aa16a7bf7ec89b566cc842e87a808616d5420f7397ce6e418d932672a33e0c69
                  • Opcode Fuzzy Hash: 380bebf2ebc311167551452d5e3e6684d40947ebad6ec4710f05ac09e1864d6f
                  • Instruction Fuzzy Hash: A8219D72504744AFD722CF11DC44FA7BBFCEF15610F08849AE9858B692D265E908CB71
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 0082A879
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: Open
                  • String ID:
                  • API String ID: 71445658-0
                  • Opcode ID: 8075e65ff37b863a5688f50517d5712a99f8b8b538b063c3d208decf5bc7533a
                  • Instruction ID: 26f42b28b030aef5116fb62fb7dbbddd8054bd3ce5938061ac513be28403ae08
                  • Opcode Fuzzy Hash: 8075e65ff37b863a5688f50517d5712a99f8b8b538b063c3d208decf5bc7533a
                  • Instruction Fuzzy Hash: E121CFB2500204AFE7219A55DC44FABFBACEF24314F04886AE945CA655D734E8498AB2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • GetProcessWorkingSetSize.KERNEL32(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 049E255B
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: ProcessSizeWorking
                  • String ID:
                  • API String ID: 3584180929-0
                  • Opcode ID: e7a5effc9ec6976f5b9474d1634f45eb81d370f85c55b23d43c058de6c682407
                  • Instruction ID: e8719e59375703c9ff0e8bd98c095ee62838a977b99c68658fb9998f9b477b58
                  • Opcode Fuzzy Hash: e7a5effc9ec6976f5b9474d1634f45eb81d370f85c55b23d43c058de6c682407
                  • Instruction Fuzzy Hash: DC2192715093806FE722CF11DC45FAABFACEF55214F0884AAE984DB696D274E908CB71
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • SetProcessWorkingSetSize.KERNEL32(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 049E263F
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: ProcessSizeWorking
                  • String ID:
                  • API String ID: 3584180929-0
                  • Opcode ID: e7a5effc9ec6976f5b9474d1634f45eb81d370f85c55b23d43c058de6c682407
                  • Instruction ID: 9c8d028c9f42ef58a6b9c6bfcc56a6b61f5b1c09d38d3c2758d67d74bd9ac5d3
                  • Opcode Fuzzy Hash: e7a5effc9ec6976f5b9474d1634f45eb81d370f85c55b23d43c058de6c682407
                  • Instruction Fuzzy Hash: AD2195715053806FEB12CF11DC44FA6BFACEF55214F0884ABE945DB656D274A908CB71
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • CreateMutexW.KERNELBASE(?,?), ref: 0082A6B9
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: CreateMutex
                  • String ID:
                  • API String ID: 1964310414-0
                  • Opcode ID: 8013ff8e77bcb34fc24c4dfc32095e108164186db6aea113287b3b9aaef7391d
                  • Instruction ID: a54c23c174c09b710e8cd360d878f6d320c400229550c60c17dacf1f8c448335
                  • Opcode Fuzzy Hash: 8013ff8e77bcb34fc24c4dfc32095e108164186db6aea113287b3b9aaef7391d
                  • Instruction Fuzzy Hash: F521C275600200AFE720CF25DD85BA6FBE8EF24314F088869E984CF746D775E849CA72
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • shutdown.WS2_32(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 049E0660
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: shutdown
                  • String ID:
                  • API String ID: 2510479042-0
                  • Opcode ID: 3e15757c70d86dab702de4620cd809955aba49d08b2559221f2d92f3934e70b0
                  • Instruction ID: d0652b38d31a74b812d54ca39b9ac1e755ad23744fc8636863fa8a6b26bf1e50
                  • Opcode Fuzzy Hash: 3e15757c70d86dab702de4620cd809955aba49d08b2559221f2d92f3934e70b0
                  • Instruction Fuzzy Hash: 0A219571409380AFD712CB11DC44F56BFB8EF46214F0885DAE984DF656C278A548C771
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • RegDeleteKeyW.ADVAPI32(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 049E38E8
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: Delete
                  • String ID:
                  • API String ID: 1035893169-0
                  • Opcode ID: 516c37a633f551752eb6f9b88206c8b4f03b1e5d2b64712c27a19b78fbbf9264
                  • Instruction ID: 8112406ab1554be0d9430f6c1b44f2604f464a5b30d838296ba5e6be4dba0dac
                  • Opcode Fuzzy Hash: 516c37a633f551752eb6f9b88206c8b4f03b1e5d2b64712c27a19b78fbbf9264
                  • Instruction Fuzzy Hash: B8218171509380AFD722CB51DC45FA6BFBCEF56210F0884DAE9849B697D268E908C772
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • ReadFile.KERNELBASE(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 0082BA55
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: FileRead
                  • String ID:
                  • API String ID: 2738559852-0
                  • Opcode ID: 3067831a34e73092512ea7cf3514a64560f99fcbcaba4055a06953b174d7baf3
                  • Instruction ID: cc5ddc2d499b80c602388875656b642bbde00c59feea4b293a4282c71bc89e25
                  • Opcode Fuzzy Hash: 3067831a34e73092512ea7cf3514a64560f99fcbcaba4055a06953b174d7baf3
                  • Instruction Fuzzy Hash: A721A471405380AFDB22CF51DC44F97BFB8EF55310F08849AE9859B656C335A908CB71
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • RegQueryValueExW.KERNELBASE(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 0082A40C
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: QueryValue
                  • String ID:
                  • API String ID: 3660427363-0
                  • Opcode ID: 35718510f00328899581b81e72f642935247b794d1bb8fcdfcd697711c3bdabf
                  • Instruction ID: 998f020fc3b98ed0561e3fa22e30fc29a7062dbba989a2057a7a1fd0b8f7b866
                  • Opcode Fuzzy Hash: 35718510f00328899581b81e72f642935247b794d1bb8fcdfcd697711c3bdabf
                  • Instruction Fuzzy Hash: 9421AE75600204AFE720CE15DC88FA6F7ECEF14714F04846AE945CB751D374E849CA72
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: send
                  • String ID:
                  • API String ID: 2809346765-0
                  • Opcode ID: c1d7293756ed11b456d2d6e1940dabc7df0a6925bd23ab93dd68966ea0b7ff1c
                  • Instruction ID: 0f64978047a43b1e7e441f80f4de4f3e89174df1b7044a0a5928372fd4b22225
                  • Opcode Fuzzy Hash: c1d7293756ed11b456d2d6e1940dabc7df0a6925bd23ab93dd68966ea0b7ff1c
                  • Instruction Fuzzy Hash: EF219A7140D3C09FD7238B619C54A52BFB4EF07220F0A88DBD985CF5A3C279A859DB62
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • ioctlsocket.WS2_32(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 049E1FD3
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: ioctlsocket
                  • String ID:
                  • API String ID: 3577187118-0
                  • Opcode ID: 53ecb42a1c8f74b64c1f360311d2a6914a04b18eb79a571e35df346a627887ce
                  • Instruction ID: d24cd974e989ffd437e3b9ea6dd9278ba0340249c02a1c9ee5d60925adafab13
                  • Opcode Fuzzy Hash: 53ecb42a1c8f74b64c1f360311d2a6914a04b18eb79a571e35df346a627887ce
                  • Instruction Fuzzy Hash: 5621C371409380AFE722CF11DC48FA6BFBCEF55214F0884AAE9849B696C279A508C771
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • setsockopt.WS2_32(?,?,?,?,?), ref: 0082BDA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: setsockopt
                  • String ID:
                  • API String ID: 3981526788-0
                  • Opcode ID: 74eb69286ed347bad1b0505ccab2553bc7779dc8dbab0722c140af8c69a157cf
                  • Instruction ID: bc818012f367fb6b52d3f648f5d5ca9a90674385cf11bad57239451e35231780
                  • Opcode Fuzzy Hash: 74eb69286ed347bad1b0505ccab2553bc7779dc8dbab0722c140af8c69a157cf
                  • Instruction Fuzzy Hash: 5C2190721093C0AFDB128B61DC44B92BFB4EF07320F0984DAD9C48F563C225A859CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • WSASocketW.WS2_32(?,?,?,?,?), ref: 0082BCCA
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: Socket
                  • String ID:
                  • API String ID: 38366605-0
                  • Opcode ID: 36f3a225ff7fb3f4ee3f65a3700cc7580831f5a09c4ca182cc134e0a75176411
                  • Instruction ID: c34d87b2e61a8e7127bbc1e12085a8a7e3831e4999f88a4e17095f17606626f4
                  • Opcode Fuzzy Hash: 36f3a225ff7fb3f4ee3f65a3700cc7580831f5a09c4ca182cc134e0a75176411
                  • Instruction Fuzzy Hash: E421D171501200AFEB21CF55DC44BA6FBE4FF18324F14886AE9858B756C775E408DB71
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 049E0BEA
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: Connect
                  • String ID:
                  • API String ID: 3144859779-0
                  • Opcode ID: 7ab55e464063a16ff23362369692380c268c7787fcf86f2874b4c8f838acab88
                  • Instruction ID: 484c0e5e53d0fa4fb8b97f277e9bd4270a8e3159b30cff5afe04b099f98ebfe3
                  • Opcode Fuzzy Hash: 7ab55e464063a16ff23362369692380c268c7787fcf86f2874b4c8f838acab88
                  • Instruction Fuzzy Hash: 41219271508780AFDB228F51DC44B62FFF8EF06310F0884DAE9858B663D275A819DB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: FileView
                  • String ID:
                  • API String ID: 3314676101-0
                  • Opcode ID: 975b9fa35b2bf85a3ae31a7de3d31f0eefbd841e082ac548dbb11c045280db16
                  • Instruction ID: bc9c775b2394fd909ddce18b88a66e6fe953007059df9102d37aa190369bd81c
                  • Opcode Fuzzy Hash: 975b9fa35b2bf85a3ae31a7de3d31f0eefbd841e082ac548dbb11c045280db16
                  • Instruction Fuzzy Hash: 1221F371500204AFEB21CF16DD44FA6FBE8EF18224F048469E9858B756E375F408CB71
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • LoadLibraryA.KERNELBASE(?,00000E24), ref: 049E105B
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: LibraryLoad
                  • String ID:
                  • API String ID: 1029625771-0
                  • Opcode ID: 09fd9767304ffe96214d11d88c0f58f788bb6ae9754c67ff63a65e2c86fcfaa7
                  • Instruction ID: ed23076b434d2317de9cf2e9fbd3fbf7ac69beba9e8cf7e0a936cbba54318bb8
                  • Opcode Fuzzy Hash: 09fd9767304ffe96214d11d88c0f58f788bb6ae9754c67ff63a65e2c86fcfaa7
                  • Instruction Fuzzy Hash: F21106714093807FE721CB11DC85FA6FFB8DF05320F04809AF9449B292C278B948CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • RegSetValueExW.KERNELBASE(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 0082A4F8
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: Value
                  • String ID:
                  • API String ID: 3702945584-0
                  • Opcode ID: e60c0802614d8b9382bed813c8a9978fae3e712c2b86db580fbaab122430fcad
                  • Instruction ID: b043f77c35af2b9f40ff4073150118c3f7a79948da35065d2cff3b83d9aff6fd
                  • Opcode Fuzzy Hash: e60c0802614d8b9382bed813c8a9978fae3e712c2b86db580fbaab122430fcad
                  • Instruction Fuzzy Hash: A411AC72500604AFEB218E15ED44FA7BBE8EF14714F04846AED45DA796D374E848CAB2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • LoadLibraryShim.MSCOREE(?,?,?,?), ref: 049E2F51
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: LibraryLoadShim
                  • String ID:
                  • API String ID: 1475914169-0
                  • Opcode ID: ffc392ef9b25c76f55af5d8af081865dd28de2dd4351c1ddfeed8ee63337661e
                  • Instruction ID: 82461d1e73e1843afa0bb3eb2deb39b92fba58ae93e0d20514b40993bdd4870b
                  • Opcode Fuzzy Hash: ffc392ef9b25c76f55af5d8af081865dd28de2dd4351c1ddfeed8ee63337661e
                  • Instruction Fuzzy Hash: 872181755083805FD7228F15DC45B62BFF8EF56314F0984DAE9848B293D265A808CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • RegQueryValueExW.KERNELBASE(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 049E013C
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: QueryValue
                  • String ID:
                  • API String ID: 3660427363-0
                  • Opcode ID: 4deb14419afd53bb84a4dc51d7dfa7c59dca21d272d5d51bc234074096bb9337
                  • Instruction ID: 504b111cc32be1a377854b831be622c4ab24b077350a34872b7c2fc58b0d660d
                  • Opcode Fuzzy Hash: 4deb14419afd53bb84a4dc51d7dfa7c59dca21d272d5d51bc234074096bb9337
                  • Instruction Fuzzy Hash: 7011AF72500604AFE722CE16DC84FA7B7ECEF14710F08846AE9858B656D3B5F408CA71
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • FindCloseChangeNotification.KERNELBASE(?), ref: 0082A780
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: ChangeCloseFindNotification
                  • String ID:
                  • API String ID: 2591292051-0
                  • Opcode ID: 4bf4a0f2acbbf34ba77bc4ccab4cb4d3c430743abe8c0281e93de3e4591ef2ae
                  • Instruction ID: 810715d2d86372b6a67a1eb8da416b152cec181a6c8ff58ddfd19771d480f2cb
                  • Opcode Fuzzy Hash: 4bf4a0f2acbbf34ba77bc4ccab4cb4d3c430743abe8c0281e93de3e4591ef2ae
                  • Instruction Fuzzy Hash: 2021D5B15043809FD711CB55DC85752BFA8EF12324F09849BED848B653D234A909CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • GetProcessTimes.KERNELBASE(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 049E0931
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: ProcessTimes
                  • String ID:
                  • API String ID: 1995159646-0
                  • Opcode ID: aa59e1a73bef9a9f71d84d130c62b2e4917bec61a8597a75d3ac0c55c17c00b6
                  • Instruction ID: 87677b30ff2a2601617ed8582fccfd488a328fe425669d96e74fa836295958d3
                  • Opcode Fuzzy Hash: aa59e1a73bef9a9f71d84d130c62b2e4917bec61a8597a75d3ac0c55c17c00b6
                  • Instruction Fuzzy Hash: 8E119372500200AFEB21CF55DC44FA6B7E8EF14324F04C86AEA45DB655D775E508CBB1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • PostMessageW.USER32(?,?,?,?), ref: 049E3C1D
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: MessagePost
                  • String ID:
                  • API String ID: 410705778-0
                  • Opcode ID: 7dbc277c3eda039b1a827698eb18f05cf4277a6c79938f14cd4f728b8fccd990
                  • Instruction ID: f731748d5dbffd6814f1f1cfdd57d8e75388089adb7e75e93b063b1460e624ca
                  • Opcode Fuzzy Hash: 7dbc277c3eda039b1a827698eb18f05cf4277a6c79938f14cd4f728b8fccd990
                  • Instruction Fuzzy Hash: 9F216D714093C0AFDB238F26DC45A52BFB4EF17210F0984DAED848F663D265A818DB62
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • SetProcessWorkingSetSize.KERNEL32(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 049E263F
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: ProcessSizeWorking
                  • String ID:
                  • API String ID: 3584180929-0
                  • Opcode ID: 5846c4dc72b53a41597665d28fdd062740d9fcf9e1f3d4e8b2f4766bd2c2dd2b
                  • Instruction ID: a6f66980858e96630c0b75c7a02a0c324df1fda32c9edcff8716febb6a70c2b5
                  • Opcode Fuzzy Hash: 5846c4dc72b53a41597665d28fdd062740d9fcf9e1f3d4e8b2f4766bd2c2dd2b
                  • Instruction Fuzzy Hash: 8C11C171600200AFEB21CF15DC44FAAB7ACEF54624F08C8BAE945DB645D778E508CAB1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • GetComputerNameW.KERNEL32(?,00000E24,?,?), ref: 049E0082
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: ComputerName
                  • String ID:
                  • API String ID: 3545744682-0
                  • Opcode ID: ad5dda99dc49aecd9a16d5803e56d63d91dbaaef36de9ad568255ffbc732189a
                  • Instruction ID: f28d1aec81458b0ac7bfb561893362a667a3d681a900b8f34453e01c9b27a46e
                  • Opcode Fuzzy Hash: ad5dda99dc49aecd9a16d5803e56d63d91dbaaef36de9ad568255ffbc732189a
                  • Instruction Fuzzy Hash: 2D1108715093806FC311CB25CC45F26FFB4EF86610F1881DFE8889B693D625B919C7A2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • GetProcessWorkingSetSize.KERNEL32(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 049E255B
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: ProcessSizeWorking
                  • String ID:
                  • API String ID: 3584180929-0
                  • Opcode ID: 5846c4dc72b53a41597665d28fdd062740d9fcf9e1f3d4e8b2f4766bd2c2dd2b
                  • Instruction ID: 515c84e99fd1a6d109b7adf2b0c08d70e7a0a196aec04963b36345f1a8ca5c72
                  • Opcode Fuzzy Hash: 5846c4dc72b53a41597665d28fdd062740d9fcf9e1f3d4e8b2f4766bd2c2dd2b
                  • Instruction Fuzzy Hash: FE11C1B1600200AFEB21CF15DD45FAAB7ACEF54224F04C8BAEA45DB645D778E508CAB1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0082AC6E
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: DuplicateHandle
                  • String ID:
                  • API String ID: 3793708945-0
                  • Opcode ID: dc0e7dd4e0df5e333bb75e253e6ad3a9b07b3c3c406563a28ecf8b1dad39b7bb
                  • Instruction ID: 50df5931e193f88723f435b5c7272168abf442358527ac56a458ee801ba5f9a1
                  • Opcode Fuzzy Hash: dc0e7dd4e0df5e333bb75e253e6ad3a9b07b3c3c406563a28ecf8b1dad39b7bb
                  • Instruction Fuzzy Hash: 47118471409380AFDB228F51DC44A62FFF4EF4A310F0888DAED858B563C275A919DB71
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • GetExitCodeProcess.KERNELBASE(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 049E247C
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: CodeExitProcess
                  • String ID:
                  • API String ID: 3861947596-0
                  • Opcode ID: b771faa59c50ed6e4296fb80e83eb092c5a96eb131e9317e5ab42b85c1d0b1db
                  • Instruction ID: 45a3f35f9e302828002f99e6029f38edf61e85b19b032490c365e99d7bcd1696
                  • Opcode Fuzzy Hash: b771faa59c50ed6e4296fb80e83eb092c5a96eb131e9317e5ab42b85c1d0b1db
                  • Instruction Fuzzy Hash: 9311A371604204AFEB21CF16DC45BAAB7ACEF54224F04C4BAED45DF785E678E508CAB1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • ReadFile.KERNELBASE(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 0082BA55
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: FileRead
                  • String ID:
                  • API String ID: 2738559852-0
                  • Opcode ID: cd2e048c86d0bab1739e7fb6d6af71f21fc9e48fae40cf501c8ecd97a0bd895e
                  • Instruction ID: 760334a620ddac010aafda981ef3b72b01cef5e99a992858f7d9fb240974fb46
                  • Opcode Fuzzy Hash: cd2e048c86d0bab1739e7fb6d6af71f21fc9e48fae40cf501c8ecd97a0bd895e
                  • Instruction Fuzzy Hash: B8110471501200AFEB21CF51DC44FA6FBE8EF14324F04886AE945DB655C335E448DBB1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • ioctlsocket.WS2_32(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 049E1FD3
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: ioctlsocket
                  • String ID:
                  • API String ID: 3577187118-0
                  • Opcode ID: efe5042ac2135dae434dea8187772ae6336132f1e5220be92dadd245fd1af516
                  • Instruction ID: 9cbcee398e31fd41bbebf50c33c87cb1d0bc494c463ceb772a74b3323c5e4ce9
                  • Opcode Fuzzy Hash: efe5042ac2135dae434dea8187772ae6336132f1e5220be92dadd245fd1af516
                  • Instruction Fuzzy Hash: 5B11C171500200AFEB21CF55DC44FA6B7A8EF14224F04886AE9449B686D379A508CAB1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • RegDeleteKeyW.ADVAPI32(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 049E38E8
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: Delete
                  • String ID:
                  • API String ID: 1035893169-0
                  • Opcode ID: c3fb6984bbec4319450e3b0eacee38318fe5cfe6d3f719de42f9cf571308b450
                  • Instruction ID: a5e09ffb2c170a477adfdcbd4eec45e0615b434afcb3974949055ad5b9cab14f
                  • Opcode Fuzzy Hash: c3fb6984bbec4319450e3b0eacee38318fe5cfe6d3f719de42f9cf571308b450
                  • Instruction Fuzzy Hash: CC11C271500200AEE721CE16DC45FA6B7ACDF14624F04C46AEE449B746D778F508CAB1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • shutdown.WS2_32(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 049E0660
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: shutdown
                  • String ID:
                  • API String ID: 2510479042-0
                  • Opcode ID: 886a71ebd7871d0a2ef5e53639aba3679dcbe82fa60029511ea45c750e0b28be
                  • Instruction ID: 492f9383cb0ee5df548fd6b8430f8d37d596ab9d8f5cbbe76b86dbc6ef124197
                  • Opcode Fuzzy Hash: 886a71ebd7871d0a2ef5e53639aba3679dcbe82fa60029511ea45c750e0b28be
                  • Instruction Fuzzy Hash: 34117071500204AEEB21CF15DC84BAAB7A8EF54724F04C86AE944AF645D6B9E5088AB5
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • SetErrorMode.KERNELBASE(?), ref: 0082A30C
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: ErrorMode
                  • String ID:
                  • API String ID: 2340568224-0
                  • Opcode ID: 64cee67674d58b732e82a7cf788b2125234f8017b074ffe2487ebcd36f7a829e
                  • Instruction ID: 9aa7252d2f287ead051532c17f92c10b8c82926abf6e79f09d2e21e1b3513a5f
                  • Opcode Fuzzy Hash: 64cee67674d58b732e82a7cf788b2125234f8017b074ffe2487ebcd36f7a829e
                  • Instruction Fuzzy Hash: 561191714093C0AFDB238B15DC54662BFB4DF57224F0984DBED848F263D2656858D772
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • PostMessageW.USER32(?,?,?,?), ref: 049E4009
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: MessagePost
                  • String ID:
                  • API String ID: 410705778-0
                  • Opcode ID: fd8e40bf677dfc3acd67bbfa3b1bde96888a496227899cdd1caa7d6566d13723
                  • Instruction ID: 5f4d68765c2cae46ae8c88d901eee9f6eaf04f600ad8bbd5d77958e48f50cd3b
                  • Opcode Fuzzy Hash: fd8e40bf677dfc3acd67bbfa3b1bde96888a496227899cdd1caa7d6566d13723
                  • Instruction Fuzzy Hash: E811E375509780AFDB228F11DC45A52FFB4EF16220F08C4AEED858B663D275A818DB62
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • LoadLibraryA.KERNELBASE(?,00000E24), ref: 049E105B
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: LibraryLoad
                  • String ID:
                  • API String ID: 1029625771-0
                  • Opcode ID: 38dd28897a8100317c47847d37ba20c2cc5fb60ab2828980b728b9bc891f18ae
                  • Instruction ID: 39a7777288edd42ea8ab874835d3224d4ddc428b0ee87b610f6b7a6819e4eb56
                  • Opcode Fuzzy Hash: 38dd28897a8100317c47847d37ba20c2cc5fb60ab2828980b728b9bc891f18ae
                  • Instruction Fuzzy Hash: D2112571500240AEE721CF16DC45FB6F7A8DF14720F04846AEE449E785D3B8F408CAA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: select
                  • String ID:
                  • API String ID: 1274211008-0
                  • Opcode ID: fba46e1302bfcb3da23c448a89820873cb311b386f7b864ae06a26917135e75b
                  • Instruction ID: c715c7fe2fbd329980f9fd67e2347b453f5ea71bfb220044e6489574f31e757e
                  • Opcode Fuzzy Hash: fba46e1302bfcb3da23c448a89820873cb311b386f7b864ae06a26917135e75b
                  • Instruction Fuzzy Hash: 9E115B716002049FEB21CF16D984B62FBECEF04311F0888BADD49CB696D335F548CA62
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: closesocket
                  • String ID:
                  • API String ID: 2781271927-0
                  • Opcode ID: 5d31b2fa605aa13ea21e73c1d33839d57c73ee4c5f42ca6d928dccf52c46b4a0
                  • Instruction ID: 4ad425cf051707e59e208b5f788a9b328109466bab9924de03a9ee7558813410
                  • Opcode Fuzzy Hash: 5d31b2fa605aa13ea21e73c1d33839d57c73ee4c5f42ca6d928dccf52c46b4a0
                  • Instruction Fuzzy Hash: 4911BF754093C0AFDB12CB11DC45B52BFB4EF06224F0884DBED848F293D279A809CB62
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 049E2172
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: LookupPrivilegeValue
                  • String ID:
                  • API String ID: 3899507212-0
                  • Opcode ID: 1430242c45b8ea240f63736a3f405a124368273a9b678319a714841129a28eae
                  • Instruction ID: 4b7e12ea34b363fd7cba8890b37b8faf4803cb135ed0b338469596592a5f6fb1
                  • Opcode Fuzzy Hash: 1430242c45b8ea240f63736a3f405a124368273a9b678319a714841129a28eae
                  • Instruction Fuzzy Hash: C31152716042409FEB21CF5ADC85B66FBECEF04220F08C4BADE49DB756D675E504CA61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • GetFileType.KERNELBASE(?,00000E24,8A63A454,00000000,00000000,00000000,00000000), ref: 0082B789
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: FileType
                  • String ID:
                  • API String ID: 3081899298-0
                  • Opcode ID: 5f068d648f49555a332c5dca3a0bcc26080907f594401af0cc08fd9d5ed27eee
                  • Instruction ID: c5c294ffb53b64ff1f056b0f0ad6eeb479219c7f52f3a8270e4ecf314881dddf
                  • Opcode Fuzzy Hash: 5f068d648f49555a332c5dca3a0bcc26080907f594401af0cc08fd9d5ed27eee
                  • Instruction Fuzzy Hash: 6C01C071500204AFE720CB15EC84FA6F7A8EF64724F14C0A6EE449B785D778E848CAB1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 049E0BEA
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: Connect
                  • String ID:
                  • API String ID: 3144859779-0
                  • Opcode ID: 4264d9cc0b1316217af24fe3c21f40201569e3dd211626639dc04ebef5a51e65
                  • Instruction ID: 7cdd26235ac3d639019a52c2f152f594115107ec652f53781bb939ca5f68c998
                  • Opcode Fuzzy Hash: 4264d9cc0b1316217af24fe3c21f40201569e3dd211626639dc04ebef5a51e65
                  • Instruction Fuzzy Hash: 661170715006449FEB21CF56D844B62FBE4FF08310F0888AAED498B662D375F418DB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • DispatchMessageW.USER32(?), ref: 049E3EB0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: DispatchMessage
                  • String ID:
                  • API String ID: 2061451462-0
                  • Opcode ID: 8c34058773cd13f1070514923f2c188607070d24bf4bc632fa9b842553cf2540
                  • Instruction ID: fc6ab33487b40c6edb2f93ae8a92b0a0b320efe5828501db3bf11be9fef3a6f8
                  • Opcode Fuzzy Hash: 8c34058773cd13f1070514923f2c188607070d24bf4bc632fa9b842553cf2540
                  • Instruction Fuzzy Hash: FE11A171509384AFDB228F15DC48B62FFB8DF46224F0880DAED858B253D275A808CB72
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • GetVolumeInformationA.KERNELBASE(?,00000E24,?,?), ref: 049E0DB6
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: InformationVolume
                  • String ID:
                  • API String ID: 2039140958-0
                  • Opcode ID: e95154502f2246d8aad56136547bd6d833a2e5dffc400e902c747439185618c1
                  • Instruction ID: 6407e829289d57c56e6289e64ea809f7f8c301a4d81bf15fe192fec6052c2b84
                  • Opcode Fuzzy Hash: e95154502f2246d8aad56136547bd6d833a2e5dffc400e902c747439185618c1
                  • Instruction Fuzzy Hash: E501B171600200ABD310DF16DC45B76FBE8EB88A20F14812AED489BB46D735F925CBE1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • LoadLibraryShim.MSCOREE(?,?,?,?), ref: 049E2F51
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: LibraryLoadShim
                  • String ID:
                  • API String ID: 1475914169-0
                  • Opcode ID: 5c76b7d9bf38bffed5cc5a46689dc904f3e1f49e94439a8c66fbadf83ab297ad
                  • Instruction ID: 4e2b02d759f58bb2c823eedca4f4c715512061dfdd51da9af91065ee475f1536
                  • Opcode Fuzzy Hash: 5c76b7d9bf38bffed5cc5a46689dc904f3e1f49e94439a8c66fbadf83ab297ad
                  • Instruction Fuzzy Hash: ED0180716002009FDB21CF1ADD45B22FBECEF04610F08C8A9DD498B752D375F408CA61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0082AC6E
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: DuplicateHandle
                  • String ID:
                  • API String ID: 3793708945-0
                  • Opcode ID: 6da60c8add996ac0bd30e5f4a1d215421b9824e74bba63c0239f93c1ae0f874e
                  • Instruction ID: 4cbfa6bc9940bb90c2668bd70ebb141e2c75ece0f1d4c6864a0745c020bcbd7c
                  • Opcode Fuzzy Hash: 6da60c8add996ac0bd30e5f4a1d215421b9824e74bba63c0239f93c1ae0f874e
                  • Instruction Fuzzy Hash: 5501AD32500200DFDB21CF55E944B62FBE0FF48320F08C8AAEE498A652C336E458DF62
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 0082BC12
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: QueryValue
                  • String ID:
                  • API String ID: 3660427363-0
                  • Opcode ID: 8a06d444775d69cb3243c7c105c6f2399b1dfc7436d0ec95f8a550959de7df41
                  • Instruction ID: c3b151d018df98ed02856ef8f0a0028d791266765d4560da1e2a8c446e096f47
                  • Opcode Fuzzy Hash: 8a06d444775d69cb3243c7c105c6f2399b1dfc7436d0ec95f8a550959de7df41
                  • Instruction Fuzzy Hash: A401A271500200ABD310DF16DC46B66FBE8FB98A20F14811AED489BB82D775F925CBE5
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • FindCloseChangeNotification.KERNELBASE(?), ref: 0082A780
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: ChangeCloseFindNotification
                  • String ID:
                  • API String ID: 2591292051-0
                  • Opcode ID: 913e25d1ef9733556ef5fe888944bbad9aa635615b86dcf72d5ce61505b8585a
                  • Instruction ID: ecd5db5f02b1fbc2d60f10d4c01ef51c2738ab339451e2f81466324a4e5fe1cf
                  • Opcode Fuzzy Hash: 913e25d1ef9733556ef5fe888944bbad9aa635615b86dcf72d5ce61505b8585a
                  • Instruction Fuzzy Hash: 7101BC716002409FEB10CF19E984766FBA4EF04324F08C4AADD89CF756D279A848CAA2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • setsockopt.WS2_32(?,?,?,?,?), ref: 0082BDA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: setsockopt
                  • String ID:
                  • API String ID: 3981526788-0
                  • Opcode ID: 85eed6f83a6fd0ab2741b2662a642410fc9c1c2123c741b0ff2987e9c3e493ea
                  • Instruction ID: ea5031a35ecd4ac400549a68b245ab04c1da4f9fde6f76c7ec1e294e3b7e4f25
                  • Opcode Fuzzy Hash: 85eed6f83a6fd0ab2741b2662a642410fc9c1c2123c741b0ff2987e9c3e493ea
                  • Instruction Fuzzy Hash: 1D019272504244DFDB20CF55E944B95FBE0FF14324F08C8AADE898F656C375A458DB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • RegEnumValueW.KERNELBASE(?,00000E24,?,?), ref: 049E29FA
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: EnumValue
                  • String ID:
                  • API String ID: 2814608202-0
                  • Opcode ID: af28ecdec5a34b9eef9e2dc21fbd145fc9f38d2bdaaf1d1301d7e389ae3b86f0
                  • Instruction ID: 14e1ceefb91e100cbcfb8d98a936c0990abdba3c85209f83740cf612f4bd1524
                  • Opcode Fuzzy Hash: af28ecdec5a34b9eef9e2dc21fbd145fc9f38d2bdaaf1d1301d7e389ae3b86f0
                  • Instruction Fuzzy Hash: E601A271500200ABD310DF16DC46B66FBE8FB98A20F14811AED089BB42D735F925CBE5
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • GetComputerNameW.KERNEL32(?,00000E24,?,?), ref: 049E0082
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: ComputerName
                  • String ID:
                  • API String ID: 3545744682-0
                  • Opcode ID: d153b57e625c1540a9df1adc6d6ac6c9ae5e20f4498447c227efa75cca5644f8
                  • Instruction ID: 7e417250ba876c7e527082267736da8c3212b27ebad5b14538802519bdb14f32
                  • Opcode Fuzzy Hash: d153b57e625c1540a9df1adc6d6ac6c9ae5e20f4498447c227efa75cca5644f8
                  • Instruction Fuzzy Hash: 6101D671500200ABD310DF16DC46B76FBE8FB88A20F148159ED089BB42D735F925CBE5
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: send
                  • String ID:
                  • API String ID: 2809346765-0
                  • Opcode ID: 37df1b44430342e3abfb8d4ab336ebf44051098b64e96b50050cfb4663eeff04
                  • Instruction ID: 71dc6dfea353c55d98153486b2885c7e5a2131c5102cc7199ec55f204befd8d7
                  • Opcode Fuzzy Hash: 37df1b44430342e3abfb8d4ab336ebf44051098b64e96b50050cfb4663eeff04
                  • Instruction Fuzzy Hash: 17019E715042409FEB20CF55E944B62FBE4FF04324F08C8AADE4A8F656C279A458DBA2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • PostMessageW.USER32(?,?,?,?), ref: 049E4009
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: MessagePost
                  • String ID:
                  • API String ID: 410705778-0
                  • Opcode ID: a3c47c1401463ba203f59bf23551fc37c1ce80145b5daaa1bac5a9e5f126cd69
                  • Instruction ID: 36415d87787f29186d1ffd21b46cebf5834235c588302a7a72b4b6caa40c6e27
                  • Opcode Fuzzy Hash: a3c47c1401463ba203f59bf23551fc37c1ce80145b5daaa1bac5a9e5f126cd69
                  • Instruction Fuzzy Hash: 2A017136500640DFEB228F16D844B65FBE4EF14225F08C4BEDD494B762D275E458DFA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: closesocket
                  • String ID:
                  • API String ID: 2781271927-0
                  • Opcode ID: 17b1184c777473bc5d1573a80dca8c6172929196e745b2fdfe09085152a2d71c
                  • Instruction ID: a3b92bcf4ac95db43538ec31e2e366918b3015df9ba186cf425606d7de6ac355
                  • Opcode Fuzzy Hash: 17b1184c777473bc5d1573a80dca8c6172929196e745b2fdfe09085152a2d71c
                  • Instruction Fuzzy Hash: 0501D175904244DFEB20CF15E984762FBE4EF44324F08C4AADD49CF756D279A888DAA2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • PostMessageW.USER32(?,?,?,?), ref: 049E3C1D
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: MessagePost
                  • String ID:
                  • API String ID: 410705778-0
                  • Opcode ID: c2e454e81210b51ca824d6ad7df35aa168ed9064d41cddb1e0b74df8ca39b6d3
                  • Instruction ID: daaf26a49653325de8281f156a2eafee7ece6bb2cd274220ce075c1839aab385
                  • Opcode Fuzzy Hash: c2e454e81210b51ca824d6ad7df35aa168ed9064d41cddb1e0b74df8ca39b6d3
                  • Instruction Fuzzy Hash: C4017C315006409FDB318F06D845B65FBA4EF18620F08C4AADE494B662D276E468DAA2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • SetErrorMode.KERNELBASE(?), ref: 0082A30C
                  Memory Dump Source
                  • Source File: 00000000.00000002.2665835152.000000000082A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_82a000_bUBD.jbxd
                  Similarity
                  • API ID: ErrorMode
                  • String ID:
                  • API String ID: 2340568224-0
                  • Opcode ID: 5f71aa822617f7bc1b678bce3255539399884fb9cfab695868b6032671730ab5
                  • Instruction ID: 265439606b3939b33a7d48c26a04578629517172ee2312ac4c0f17ee31d8ca1b
                  • Opcode Fuzzy Hash: 5f71aa822617f7bc1b678bce3255539399884fb9cfab695868b6032671730ab5
                  • Instruction Fuzzy Hash: BAF0A435504244DFDB20CF05E988761FBE0EF04724F08C0AADD098F756D379A848CAA2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • DispatchMessageW.USER32(?), ref: 049E3EB0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2668350477.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_49e0000_bUBD.jbxd
                  Similarity
                  • API ID: DispatchMessage
                  • String ID:
                  • API String ID: 2061451462-0
                  • Opcode ID: 6496c559ac46b9f1b674ac0a6386f6cd58dce9ac8a603fafd688708a0525bcf9
                  • Instruction ID: c5b756b0746455a3814d75bf5c6758e91d2fc3d9ced993237fe0e63973b4da30
                  • Opcode Fuzzy Hash: 6496c559ac46b9f1b674ac0a6386f6cd58dce9ac8a603fafd688708a0525bcf9
                  • Instruction Fuzzy Hash: 9FF0AF35A042449FEB21CF16D988761FBE4EF04324F08C4BADD095F756D379B408CAA2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2668494961.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_bUBD.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8183ae71d85234015f3fe3031f7cf00b4389ea86a764291babd4e5183bd9bc51
                  • Instruction ID: 8a8a0811f9c3b4e76c66a4b15f02a3bd50fc5eae0c4193fec0d0550f03969179
                  • Opcode Fuzzy Hash: 8183ae71d85234015f3fe3031f7cf00b4389ea86a764291babd4e5183bd9bc51
                  • Instruction Fuzzy Hash: 5011C9B5908341AFD350CF19D880A5BFBE4FB98664F04896EF998D7311D235E918CFA2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2666324421.0000000000D60000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_d60000_bUBD.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1948437b5639d8f3a57713e640a2414c659056a3d402cfbc2b9fc3e2708315ad
                  • Instruction ID: d23d060f2d522e0be9f6c495ad7e284dd1b2f9c8dc3e1b21902d2a9ac02f2ca7
                  • Opcode Fuzzy Hash: 1948437b5639d8f3a57713e640a2414c659056a3d402cfbc2b9fc3e2708315ad
                  • Instruction Fuzzy Hash: 6E21293514D3C09FD713CB10C850B55BFB1AF47308F2986DAD4888B6A3C27A981ADB62
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2666324421.0000000000D60000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_d60000_bUBD.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f119a01effe3d69f30aa44bbd5e470a55b8c960eea6310f66943abeaf2916718
                  • Instruction ID: f106430658f9124e737ed40531778e19fb5c84f91c293067e136420d31f63f95
                  • Opcode Fuzzy Hash: f119a01effe3d69f30aa44bbd5e470a55b8c960eea6310f66943abeaf2916718
                  • Instruction Fuzzy Hash: 3011B430208280DFD715DB14D540B16BBA5AB89718F28C9ACE4495BB93C77BDC17CAA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2665943478.000000000083A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0083A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_83a000_bUBD.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0cfaadef139788c08a26e2a047f5940001aad78d7f9827acac5509365e938eba
                  • Instruction ID: d72fb01a4f44c644d988d088d85f0f8f351271985e46974f3f8a4a669dce20d8
                  • Opcode Fuzzy Hash: 0cfaadef139788c08a26e2a047f5940001aad78d7f9827acac5509365e938eba
                  • Instruction Fuzzy Hash: 3C11FAB5908301AFD350CF09DC44E5BFBE8EB98660F04892EF95897311D231E908CFA2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2666324421.0000000000D60000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_d60000_bUBD.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c331e0d3221595d32838e6eae7e62c6532ed8436a66f3c6d8e90c525f13160a6
                  • Instruction ID: d441f04c13e351b79129e350bd820d927a8b2a9331ac5f495379d7bc3b4e6bc9
                  • Opcode Fuzzy Hash: c331e0d3221595d32838e6eae7e62c6532ed8436a66f3c6d8e90c525f13160a6
                  • Instruction Fuzzy Hash: 5B01A9B65097806FD711CB16AC44862FFE8DF86620B09C4AFED498B752D235B908CB72
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2666324421.0000000000D60000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_d60000_bUBD.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8b20d2f2522f3efdc57f4dce64ef5859c6247a4207e8078ccbf98b92fe3abc66
                  • Instruction ID: fafc676fb4974aad01254b4699ee444745bcd8680057a32f23b74742c8f19c6a
                  • Opcode Fuzzy Hash: 8b20d2f2522f3efdc57f4dce64ef5859c6247a4207e8078ccbf98b92fe3abc66
                  • Instruction Fuzzy Hash: 22011235109380DFC303CB10D540B15BFB1FB8A718F2986EAD5854B6A2C37ADC16DB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2666324421.0000000000D60000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_d60000_bUBD.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0e3ffe0ab8b8bec43b0eca7ca5da45ad1ed39b609236ae5c53b800e7332b5d85
                  • Instruction ID: 29fd122ae4129e672ffee19a7c4856a7fce4f06edbe2aaa7ccfbb1f4d90ef729
                  • Opcode Fuzzy Hash: 0e3ffe0ab8b8bec43b0eca7ca5da45ad1ed39b609236ae5c53b800e7332b5d85
                  • Instruction Fuzzy Hash: 49F01D35148644DFC306CF00D540B16FBA2FB89718F24CAADE94917B62C737E823DA91
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2666324421.0000000000D60000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_d60000_bUBD.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 55e138aa4e81abcd4ed9d6db91b96114021abb8b6882af4cd00230972c87a176
                  • Instruction ID: 7cf92fe90b25b9326af43be2385860356fe39dc596d9d6a2600bc3933ed750f1
                  • Opcode Fuzzy Hash: 55e138aa4e81abcd4ed9d6db91b96114021abb8b6882af4cd00230972c87a176
                  • Instruction Fuzzy Hash: CEE092B66006409B9650CF0BFC41452F7D8EB84630708C47FDD0D8B701D23AB509CAA6
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2665943478.000000000083A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0083A000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_83a000_bUBD.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a3d3274f40c8f932faa282f67809857a8743485bc190ca307ba9aa11218cf75c
                  • Instruction ID: ed0c8b26089d93f817c97ad74ef751a769adf5c7bc7bc339d26314cdc64292ee
                  • Opcode Fuzzy Hash: a3d3274f40c8f932faa282f67809857a8743485bc190ca307ba9aa11218cf75c
                  • Instruction Fuzzy Hash: AEE0D8B254020467D2108F06AC45F62F798DB54931F08C567EE085F742D176B514CAF1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2668494961.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_bUBD.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 31f2c7962f21e67083d6d095ae177836f53df2b011222da77bc8e7be190813bf
                  • Instruction ID: d4c568b46b4a8c8fd9616a560969c206b299d5fec308a759ebd9b24d83bb7cda
                  • Opcode Fuzzy Hash: 31f2c7962f21e67083d6d095ae177836f53df2b011222da77bc8e7be190813bf
                  • Instruction Fuzzy Hash: D3E0D8B254020067D6208F06AC45F52FB98DB54931F08C467ED081F742D176B518CAE1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2668494961.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_bUBD.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f1de364ba037469856f796527cc91633b3b79cccef3f73d2aa62f2806ee2210e
                  • Instruction ID: c026c178b119c0f025547c529a9fe16d42797e768b0f86ef3a48e2d6f9d96984
                  • Opcode Fuzzy Hash: f1de364ba037469856f796527cc91633b3b79cccef3f73d2aa62f2806ee2210e
                  • Instruction Fuzzy Hash: 50E0D8B250020067D2109F06AC49F53FB98DB50930F08C467EE081F742D176B514CAE1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2665812828.0000000000822000.00000040.00000800.00020000.00000000.sdmp, Offset: 00822000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_822000_bUBD.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 62d9e078ad201ae7fa0123326428a3da2bdd5ebbf00e54908ee38c646890e509
                  • Instruction ID: 6a9196a9231bd9f894ba797dbdff605e58533f3cd4bfe796e35deb03bc443466
                  • Opcode Fuzzy Hash: 62d9e078ad201ae7fa0123326428a3da2bdd5ebbf00e54908ee38c646890e509
                  • Instruction Fuzzy Hash: E0D02E392006E04FD322EA0CD2A8B8537D4BB41704F0A08FAAC00CB763CB68D8C0DA00
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2665812828.0000000000822000.00000040.00000800.00020000.00000000.sdmp, Offset: 00822000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_822000_bUBD.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7d64baa27c3378901efa277c1558e5f518f0f8347a30c6d94cbba836f0295557
                  • Instruction ID: f8c97bcd646b0906923734f35858366305fa3d19608d82a7935c97671ca3add1
                  • Opcode Fuzzy Hash: 7d64baa27c3378901efa277c1558e5f518f0f8347a30c6d94cbba836f0295557
                  • Instruction Fuzzy Hash: 71D05E342002914BC729DA0CD6D8F5937D4BF45714F0648E8AC10CB772C7A8D8C0DA00
                  Uniqueness

                  Uniqueness Score: -1.00%