Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
xuI8pQHlxExL.exe

Overview

General Information

Sample name:xuI8pQHlxExL.exe
Analysis ID:1429847
MD5:ed064734a0bf02c905e63d64a495364b
SHA1:b5c8e93ccd6aa3457f9727ed319384ba97c9ac71
SHA256:544a4d7177ed4b85a9c9807fa396e07e3243e2e6c4ce2b0fe0f908d6ee37bdc9
Tags:exenjRat
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Snort IDS alert for network traffic
Yara detected Njrat
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Self deletion via cmd or bat file
Uses dynamic DNS services
Allocates memory with a write watch (potentially for evading sandboxes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • xuI8pQHlxExL.exe (PID: 7096 cmdline: "C:\Users\user\Desktop\xuI8pQHlxExL.exe" MD5: ED064734A0BF02C905E63D64A495364B)
    • cmd.exe (PID: 4488 cmdline: cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\xuI8pQHlxExL.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5296 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Host": "resilencia2023.duckdns.org", "Port": "2009", "Campaign ID": "NYAN CAT", "Network Seprator": "@!#&^%$", "Registry": "8abd92e56969"}
SourceRuleDescriptionAuthorStrings
xuI8pQHlxExL.exeJoeSecurity_NjratYara detected NjratJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1653940468.00000000009C2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
      00000000.00000002.2477580512.0000000003021000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
        Process Memory Space: xuI8pQHlxExL.exe PID: 7096JoeSecurity_NjratYara detected NjratJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.xuI8pQHlxExL.exe.9c0000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
            No Sigma rule has matched
            Timestamp:04/22/24-19:06:15.002589
            SID:2825565
            Source Port:49730
            Destination Port:2009
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/22/24-19:06:09.223118
            SID:2825564
            Source Port:49730
            Destination Port:2009
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/22/24-19:06:05.495111
            SID:2825563
            Source Port:49730
            Destination Port:2009
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/22/24-19:06:05.253890
            SID:2033132
            Source Port:49730
            Destination Port:2009
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/22/24-19:07:00.449324
            SID:2825565
            Source Port:49737
            Destination Port:2009
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/22/24-19:06:56.900357
            SID:2825564
            Source Port:49737
            Destination Port:2009
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/22/24-19:06:34.186569
            SID:2825563
            Source Port:49737
            Destination Port:2009
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/22/24-19:06:33.952521
            SID:2033132
            Source Port:49737
            Destination Port:2009
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/22/24-19:07:07.929032
            SID:2033132
            Source Port:49739
            Destination Port:2009
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/22/24-19:06:30.056799
            SID:2825565
            Source Port:49736
            Destination Port:2009
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/22/24-19:06:25.711913
            SID:2825564
            Source Port:49736
            Destination Port:2009
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/22/24-19:06:22.749074
            SID:2825563
            Source Port:49736
            Destination Port:2009
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/22/24-19:06:22.528207
            SID:2033132
            Source Port:49736
            Destination Port:2009
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/22/24-19:07:17.873841
            SID:2825564
            Source Port:49739
            Destination Port:2009
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: xuI8pQHlxExL.exeAvira: detected
            Source: 00000000.00000000.1653940468.00000000009C2000.00000002.00000001.01000000.00000003.sdmpMalware Configuration Extractor: Njrat {"Host": "resilencia2023.duckdns.org", "Port": "2009", "Campaign ID": "NYAN CAT", "Network Seprator": "@!#&^%$", "Registry": "8abd92e56969"}
            Source: Yara matchFile source: xuI8pQHlxExL.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.xuI8pQHlxExL.exe.9c0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1653940468.00000000009C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2477580512.0000000003021000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: xuI8pQHlxExL.exe PID: 7096, type: MEMORYSTR
            Source: xuI8pQHlxExL.exeJoe Sandbox ML: detected
            Source: xuI8pQHlxExL.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
            Source: xuI8pQHlxExL.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49730 -> 179.14.8.182:2009
            Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49730 -> 179.14.8.182:2009
            Source: TrafficSnort IDS: 2825565 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity Sending Screenshot (CAP) 192.168.2.4:49730 -> 179.14.8.182:2009
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49730 -> 179.14.8.182:2009
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49736 -> 179.14.8.182:2009
            Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49736 -> 179.14.8.182:2009
            Source: TrafficSnort IDS: 2825565 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity Sending Screenshot (CAP) 192.168.2.4:49736 -> 179.14.8.182:2009
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49736 -> 179.14.8.182:2009
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49737 -> 179.14.8.182:2009
            Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49737 -> 179.14.8.182:2009
            Source: TrafficSnort IDS: 2825565 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity Sending Screenshot (CAP) 192.168.2.4:49737 -> 179.14.8.182:2009
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49737 -> 179.14.8.182:2009
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49739 -> 179.14.8.182:2009
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49739 -> 179.14.8.182:2009
            Source: Malware configuration extractorURLs: resilencia2023.duckdns.org
            Source: unknownDNS query: name: resilencia2023.duckdns.org
            Source: global trafficTCP traffic: 192.168.2.4:49730 -> 179.14.8.182:2009
            Source: Joe Sandbox ViewASN Name: ColombiaMovilCO ColombiaMovilCO
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownDNS traffic detected: queries for: resilencia2023.duckdns.org
            Source: xuI8pQHlxExL.exe, 00000000.00000002.2476333254.0000000000F11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.
            Source: xuI8pQHlxExL.exe, 00000000.00000002.2476333254.0000000000F11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.LinkId=42127

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: xuI8pQHlxExL.exe, Keylogger.cs.Net Code: VKCodeToUnicode

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: xuI8pQHlxExL.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.xuI8pQHlxExL.exe.9c0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1653940468.00000000009C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2477580512.0000000003021000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: xuI8pQHlxExL.exe PID: 7096, type: MEMORYSTR
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeCode function: 0_2_051719300_2_05171930
            Source: xuI8pQHlxExL.exe, 00000000.00000000.1653958739.00000000009C8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient22.exe4 vs xuI8pQHlxExL.exe
            Source: xuI8pQHlxExL.exe, 00000000.00000002.2476333254.0000000000EAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs xuI8pQHlxExL.exe
            Source: xuI8pQHlxExL.exeBinary or memory string: OriginalFilenameClient22.exe4 vs xuI8pQHlxExL.exe
            Source: xuI8pQHlxExL.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/1@3/1
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeCode function: 0_2_052C339E AdjustTokenPrivileges,0_2_052C339E
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeCode function: 0_2_052C3367 AdjustTokenPrivileges,0_2_052C3367
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\xuI8pQHlxExL.exe.logJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5296:120:WilError_03
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeMutant created: \Sessions\1\BaseNamedObjects\8abd92e56969
            Source: xuI8pQHlxExL.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: xuI8pQHlxExL.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\xuI8pQHlxExL.exe "C:\Users\user\Desktop\xuI8pQHlxExL.exe"
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\xuI8pQHlxExL.exe"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\xuI8pQHlxExL.exe"Jump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
            Source: xuI8pQHlxExL.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
            Source: xuI8pQHlxExL.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: xuI8pQHlxExL.exe, Program.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeCode function: 0_2_0577076B push 69E6C310h; ret 0_2_05770782
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeCode function: 0_2_057709B8 push 69E6C3B0h; ret 0_2_057709CE
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeCode function: 0_2_05770890 push 69E6C360h; ret 0_2_057708A6

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess created: cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\xuI8pQHlxExL.exe"
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess created: cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\xuI8pQHlxExL.exe"Jump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeMemory allocated: 1360000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeMemory allocated: 3020000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeMemory allocated: 1360000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeWindow / User API: threadDelayed 3650Jump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeWindow / User API: threadDelayed 5234Jump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeWindow / User API: foregroundWindowGot 1761Jump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe TID: 7100Thread sleep time: -196000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exe TID: 7100Thread sleep time: -5234000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: xuI8pQHlxExL.exe, 00000000.00000002.2476333254.0000000000F11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: xuI8pQHlxExL.exe, Program.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, cbName, ref lpszVer, 100)
            Source: xuI8pQHlxExL.exe, Keylogger.csReference to suspicious API methods: MapVirtualKey(a, 0u)
            Source: xuI8pQHlxExL.exe, Keylogger.csReference to suspicious API methods: GetAsyncKeyState(num2)
            Source: xuI8pQHlxExL.exe, 00000000.00000002.2477580512.000000000358A000.00000004.00000800.00020000.00000000.sdmp, xuI8pQHlxExL.exe, 00000000.00000002.2477580512.0000000003590000.00000004.00000800.00020000.00000000.sdmp, xuI8pQHlxExL.exe, 00000000.00000002.2477580512.00000000030BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: xuI8pQHlxExL.exe, 00000000.00000002.2477580512.0000000003590000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerX
            Source: xuI8pQHlxExL.exe, 00000000.00000002.2477580512.000000000358A000.00000004.00000800.00020000.00000000.sdmp, xuI8pQHlxExL.exe, 00000000.00000002.2477580512.0000000003590000.00000004.00000800.00020000.00000000.sdmp, xuI8pQHlxExL.exe, 00000000.00000002.2477580512.00000000030BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@9
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\xuI8pQHlxExL.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: xuI8pQHlxExL.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.xuI8pQHlxExL.exe.9c0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1653940468.00000000009C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2477580512.0000000003021000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: xuI8pQHlxExL.exe PID: 7096, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: xuI8pQHlxExL.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.xuI8pQHlxExL.exe.9c0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1653940468.00000000009C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2477580512.0000000003021000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: xuI8pQHlxExL.exe PID: 7096, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            1
            Access Token Manipulation
            1
            Masquerading
            1
            Input Capture
            1
            Security Software Discovery
            Remote Services1
            Input Capture
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts2
            Process Injection
            2
            Virtualization/Sandbox Evasion
            LSASS Memory2
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            1
            Disable or Modify Tools
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared Drive1
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Access Token Manipulation
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture21
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
            Process Injection
            LSA Secrets12
            System Information Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Obfuscated Files or Information
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Software Packing
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
            File Deletion
            /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            xuI8pQHlxExL.exe100%AviraTR/Dropper.Gen7
            xuI8pQHlxExL.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://go.microsoft.0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            resilencia2023.duckdns.org
            179.14.8.182
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              resilencia2023.duckdns.orgtrue
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://go.microsoft.xuI8pQHlxExL.exe, 00000000.00000002.2476333254.0000000000F11000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://go.microsoft.LinkId=42127xuI8pQHlxExL.exe, 00000000.00000002.2476333254.0000000000F11000.00000004.00000020.00020000.00000000.sdmpfalse
                  low
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  179.14.8.182
                  resilencia2023.duckdns.orgColombia
                  27831ColombiaMovilCOtrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1429847
                  Start date and time:2024-04-22 19:05:05 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 4m 24s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:8
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:xuI8pQHlxExL.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@4/1@3/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 95
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • VT rate limit hit for: xuI8pQHlxExL.exe
                  TimeTypeDescription
                  19:06:33API Interceptor80221x Sleep call for process: xuI8pQHlxExL.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  179.14.8.182xqA8bBVh2QxU.exeGet hashmaliciousNjratBrowse
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    resilencia2023.duckdns.orgxqA8bBVh2QxU.exeGet hashmaliciousNjratBrowse
                    • 179.14.8.182
                    bPdP.exeGet hashmaliciousNjratBrowse
                    • 181.52.102.110
                    bKIJ.exeGet hashmaliciousNjratBrowse
                    • 181.141.1.67
                    bJ5p.exeGet hashmaliciousNjratBrowse
                    • 181.141.1.67
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    ColombiaMovilCOYKLjlQEZKY.elfGet hashmaliciousMiraiBrowse
                    • 179.13.242.211
                    CxBkzmVHaR.elfGet hashmaliciousMiraiBrowse
                    • 181.204.131.151
                    jdsfl.arm.elfGet hashmaliciousMiraiBrowse
                    • 191.92.238.135
                    jdsfl.x86.elfGet hashmaliciousMiraiBrowse
                    • 181.204.131.163
                    dI3tFWyJ6d.elfGet hashmaliciousMiraiBrowse
                    • 177.254.72.247
                    aQvU3QHA3N.elfGet hashmaliciousUnknownBrowse
                    • 179.13.85.216
                    xPvEDYX7g1YE.exeGet hashmaliciousAsyncRATBrowse
                    • 179.13.0.175
                    xmo4WvZPV3Q0.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                    • 179.13.0.175
                    xXQ39a5f9EJP.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                    • 179.13.0.175
                    6VXQ3TUNZo.elfGet hashmaliciousMiraiBrowse
                    • 181.207.246.71
                    No context
                    No context
                    Process:C:\Users\user\Desktop\xuI8pQHlxExL.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):907
                    Entropy (8bit):5.243019596074263
                    Encrypted:false
                    SSDEEP:24:MLF2CpI329Iz52VMzffup26KTnKoO2+b2hHAa/:MwQd9IzoaXuY6Ux+SF/
                    MD5:48A0572426885EBDE53CA62C7F2E194E
                    SHA1:035628CDF6276367F6C83E9F4AA2172933850AA8
                    SHA-256:4C68E10691304CAC8DA65A05CF2580728EC0E294104F267840712AF1C46A6538
                    SHA-512:DEFE728C2312918D94BD43C98908C08CCCA5EBFB77F873779DCA784F14C607B33A4E29AC5ECB798F2F741668B7692F72BCB60DEFD536EA86B296B64FA359C42D
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Configuration\53992d421e2c7ecf6609c62b3510a6f0\System.Configuration.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\74774597e319a738b792e6a6c06d3559\System.Xml.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Management\1bd56c432cb9ff27e335d97f404caf8f\System.Management.ni.dll",0..
                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):3.8035401193939826
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                    • Win32 Executable (generic) a (10002005/4) 49.75%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Windows Screen Saver (13104/52) 0.07%
                    • Win16/32 Executable Delphi generic (2074/23) 0.01%
                    File name:xuI8pQHlxExL.exe
                    File size:32'768 bytes
                    MD5:ed064734a0bf02c905e63d64a495364b
                    SHA1:b5c8e93ccd6aa3457f9727ed319384ba97c9ac71
                    SHA256:544a4d7177ed4b85a9c9807fa396e07e3243e2e6c4ce2b0fe0f908d6ee37bdc9
                    SHA512:ea54436dec688d075b3d095fb3ea79cce1cd4bb2cb4c7d243517d819a46f8b51b812f16bf982af1db9eeb5816e8ed8578c70e1c3aabcdf50818fe8aedff8776f
                    SSDEEP:384:f0bUe5XB4e0XeOhJggUBZIGlWT1tTUFQqzFVkObbR:UT9Bu9zggUBZI567bR
                    TLSH:AAE2080A7BA58215C6BC5AFC8CB313200772E3478532EB6F5CDC88CA4B676D44645EED
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...#.&f.................P... ......~g... ........@.. ....................................@................................
                    Icon Hash:90cececece8e8eb0
                    Entrypoint:0x40677e
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66268F23 [Mon Apr 22 16:24:03 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x67280x53.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000x2a8.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xa0000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000x47840x50004fa3424137a466c469de4a76d0bd8119False0.47548828125data5.293800246831452IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0x80000x2a80x100006f784705978c77c74b103740d210ee3False0.07763671875data0.6775791141051085IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0xa0000xc0x10006c4dd48bf3226f24c0a279b97a87449dFalse0.008544921875data0.013126943721219527IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_VERSION0x80580x24cdata0.46598639455782315
                    DLLImport
                    mscoree.dll_CorExeMain
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    04/22/24-19:06:15.002589TCP2825565ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity Sending Screenshot (CAP)497302009192.168.2.4179.14.8.182
                    04/22/24-19:06:09.223118TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)497302009192.168.2.4179.14.8.182
                    04/22/24-19:06:05.495111TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)497302009192.168.2.4179.14.8.182
                    04/22/24-19:06:05.253890TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)497302009192.168.2.4179.14.8.182
                    04/22/24-19:07:00.449324TCP2825565ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity Sending Screenshot (CAP)497372009192.168.2.4179.14.8.182
                    04/22/24-19:06:56.900357TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)497372009192.168.2.4179.14.8.182
                    04/22/24-19:06:34.186569TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)497372009192.168.2.4179.14.8.182
                    04/22/24-19:06:33.952521TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)497372009192.168.2.4179.14.8.182
                    04/22/24-19:07:07.929032TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)497392009192.168.2.4179.14.8.182
                    04/22/24-19:06:30.056799TCP2825565ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity Sending Screenshot (CAP)497362009192.168.2.4179.14.8.182
                    04/22/24-19:06:25.711913TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)497362009192.168.2.4179.14.8.182
                    04/22/24-19:06:22.749074TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)497362009192.168.2.4179.14.8.182
                    04/22/24-19:06:22.528207TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)497362009192.168.2.4179.14.8.182
                    04/22/24-19:07:17.873841TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)497392009192.168.2.4179.14.8.182
                    TimestampSource PortDest PortSource IPDest IP
                    Apr 22, 2024 19:06:04.930475950 CEST497302009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:05.118997097 CEST200949730179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:05.119340897 CEST497302009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:05.253890038 CEST497302009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:05.494960070 CEST200949730179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:05.495110989 CEST497302009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:05.731220007 CEST200949730179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:05.873019934 CEST200949730179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:05.914608002 CEST497302009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:05.975680113 CEST497302009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:06.206933975 CEST200949730179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:08.906900883 CEST200949730179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:08.961483955 CEST497302009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:08.991170883 CEST497302009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:09.222949982 CEST200949730179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:09.223118067 CEST497302009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:09.457201004 CEST200949730179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:11.318907022 CEST200949730179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:11.319550037 CEST497302009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:11.553014994 CEST200949730179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:11.928942919 CEST200949730179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:11.977241039 CEST497302009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:12.580398083 CEST497302009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:12.813113928 CEST200949730179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:14.964776993 CEST200949730179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:15.002588987 CEST497302009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:15.248832941 CEST200949730179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:20.334891081 CEST200949730179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:20.334959030 CEST497302009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:22.338447094 CEST497302009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:22.340182066 CEST497362009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:22.518731117 CEST200949736179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:22.518815041 CEST497362009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:22.526794910 CEST200949730179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:22.528207064 CEST497362009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:22.748879910 CEST200949736179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:22.749073982 CEST497362009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:22.964945078 CEST200949736179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:23.040847063 CEST200949736179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:23.102132082 CEST497362009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:23.103790998 CEST497362009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:23.318680048 CEST200949736179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:25.711913109 CEST497362009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:25.936713934 CEST200949736179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:26.066813946 CEST200949736179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:26.117809057 CEST497362009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:26.128598928 CEST497362009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:26.342717886 CEST200949736179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:28.864710093 CEST200949736179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:28.914730072 CEST497362009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:29.094758034 CEST200949736179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:29.149101973 CEST497362009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:29.838649988 CEST497362009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:30.056720018 CEST200949736179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:30.056798935 CEST497362009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:30.278786898 CEST200949736179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:31.728713036 CEST200949736179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:33.745614052 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:33.938525915 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:33.938854933 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:33.952521086 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:34.186455965 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:34.186568975 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:34.424490929 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:35.146462917 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:35.195990086 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:35.250015020 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:35.480408907 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:38.184808969 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:38.217813969 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:38.444734097 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:40.124571085 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:40.125027895 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:40.358587027 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:50.290874958 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:50.336694956 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:50.368941069 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:50.600929022 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:54.334129095 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:54.383471012 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:54.427655935 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:54.666773081 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:54.666922092 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:54.898799896 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:56.900357008 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:57.130390882 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:57.362998009 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:57.414819956 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:57.418292046 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:57.656879902 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:58.162764072 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:06:58.163341999 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:06:58.400791883 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:00.397083044 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:00.445964098 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:00.449323893 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:00.686681032 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:04.170533895 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:04.170777082 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:07.088913918 CEST497372009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:07.282749891 CEST200949737179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:07.730252981 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:07.909965992 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:07.910068035 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:07.929032087 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:08.121830940 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:08.155158997 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:08.155226946 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:08.299022913 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:08.299235106 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:08.373229980 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:08.373317957 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:08.523318052 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:08.523479939 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:08.597162008 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:08.597291946 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:08.753245115 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:08.753968000 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:08.817195892 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:08.817971945 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:08.969130993 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:08.969862938 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:09.048351049 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:09.049843073 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:09.187309980 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:09.187436104 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:09.281486988 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:09.281877041 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:09.405311108 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:09.405857086 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:09.499126911 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:09.501851082 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:09.625135899 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:09.625860929 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:09.718982935 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:09.719131947 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:09.843153954 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:09.843246937 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:09.933238983 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:09.933350086 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:10.065447092 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:10.065834999 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:10.159194946 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:10.159288883 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:10.285259962 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:10.285378933 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:10.381061077 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:10.381210089 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:10.507205009 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:10.507442951 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:10.607229948 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:10.607439041 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:10.731347084 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:10.731451988 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:10.821281910 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:10.821397066 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:10.977164984 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:10.977289915 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:11.047120094 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:11.047224998 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:11.205178976 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:11.205296040 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:11.267106056 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:11.267170906 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:11.441165924 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:11.441278934 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:11.489109039 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:11.489295959 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:11.663216114 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:11.663378000 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:11.707333088 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:11.707406044 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:11.883141041 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:11.883244038 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:12.107413054 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:12.107534885 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:12.319303036 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:12.329436064 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:12.485876083 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:12.485972881 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:12.499030113 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:12.499124050 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:12.583023071 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:12.671241999 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:12.673858881 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:12.763142109 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:12.765913010 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:12.907166958 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:12.907272100 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:12.985209942 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:12.985927105 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:13.123110056 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:13.123209953 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:13.201251030 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:13.203433037 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:13.367394924 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:13.369940042 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:13.421154022 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:13.421864986 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:13.595048904 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:13.595175982 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:13.656960964 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:13.657052040 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:13.817409992 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:13.817523956 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:13.891113043 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:13.891289949 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:14.033111095 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:14.033560038 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:14.096941948 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:14.097184896 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:14.252976894 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:14.253278971 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:14.314949036 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:14.315191984 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:14.471004009 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:14.471132040 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:14.533665895 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:14.533852100 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:14.688909054 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:14.691795111 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:14.752909899 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:14.753869057 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:14.867292881 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:14.868005991 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:14.969120979 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:14.969284058 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:15.085042953 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:15.085165024 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:15.195019007 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:15.195111990 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:15.301193953 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:15.305629969 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:15.422296047 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:15.425878048 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:15.525186062 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:15.525310040 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:15.653078079 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:15.653176069 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:15.745018959 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:15.745106936 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:15.869168997 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:15.869342089 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:15.960994959 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:15.961287022 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:16.087131977 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:16.087404966 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:16.182760000 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:16.182873011 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:16.305005074 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:16.305226088 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:16.400881052 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:16.401082993 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:16.536844969 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:16.536995888 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:16.620942116 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:16.621202946 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:16.758898973 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:16.759104013 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:16.843013048 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:16.843251944 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:16.984941959 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:16.985025883 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:17.060892105 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:17.061038017 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:17.205131054 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:17.205249071 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:17.282845020 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:17.282933950 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:17.422972918 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:17.423091888 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:17.500941992 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:17.501050949 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:17.645083904 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:17.645462036 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:17.720989943 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:17.721875906 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:17.862916946 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:17.865988970 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:17.872910976 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:17.873841047 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:17.910923958 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:17.912424088 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:17.930804014 CEST497392009192.168.2.4179.14.8.182
                    Apr 22, 2024 19:07:18.048923969 CEST200949739179.14.8.182192.168.2.4
                    Apr 22, 2024 19:07:18.048994064 CEST497392009192.168.2.4179.14.8.182
                    TimestampSource PortDest PortSource IPDest IP
                    Apr 22, 2024 19:06:03.066065073 CEST5196153192.168.2.41.1.1.1
                    Apr 22, 2024 19:06:04.102905989 CEST5196153192.168.2.41.1.1.1
                    Apr 22, 2024 19:06:04.926836014 CEST53519611.1.1.1192.168.2.4
                    Apr 22, 2024 19:06:04.926897049 CEST53519611.1.1.1192.168.2.4
                    Apr 22, 2024 19:07:07.090286970 CEST5787153192.168.2.41.1.1.1
                    Apr 22, 2024 19:07:07.729243994 CEST53578711.1.1.1192.168.2.4
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Apr 22, 2024 19:06:03.066065073 CEST192.168.2.41.1.1.10x8d95Standard query (0)resilencia2023.duckdns.orgA (IP address)IN (0x0001)false
                    Apr 22, 2024 19:06:04.102905989 CEST192.168.2.41.1.1.10x8d95Standard query (0)resilencia2023.duckdns.orgA (IP address)IN (0x0001)false
                    Apr 22, 2024 19:07:07.090286970 CEST192.168.2.41.1.1.10x1434Standard query (0)resilencia2023.duckdns.orgA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Apr 22, 2024 19:06:04.926836014 CEST1.1.1.1192.168.2.40x8d95No error (0)resilencia2023.duckdns.org179.14.8.182A (IP address)IN (0x0001)false
                    Apr 22, 2024 19:06:04.926897049 CEST1.1.1.1192.168.2.40x8d95No error (0)resilencia2023.duckdns.org179.14.8.182A (IP address)IN (0x0001)false
                    Apr 22, 2024 19:07:07.729243994 CEST1.1.1.1192.168.2.40x1434No error (0)resilencia2023.duckdns.org179.14.8.182A (IP address)IN (0x0001)false

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:19:05:54
                    Start date:22/04/2024
                    Path:C:\Users\user\Desktop\xuI8pQHlxExL.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\xuI8pQHlxExL.exe"
                    Imagebase:0x9c0000
                    File size:32'768 bytes
                    MD5 hash:ED064734A0BF02C905E63D64A495364B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.1653940468.00000000009C2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.2477580512.0000000003021000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Target ID:5
                    Start time:19:07:17
                    Start date:22/04/2024
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\xuI8pQHlxExL.exe"
                    Imagebase:0x240000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:6
                    Start time:19:07:17
                    Start date:22/04/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7699e0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:17%
                      Dynamic/Decrypted Code Coverage:85.4%
                      Signature Coverage:2%
                      Total number of Nodes:151
                      Total number of Limit Nodes:8
                      execution_graph 6776 52c37ee 6777 52c383e RegEnumValueW 6776->6777 6778 52c384c 6777->6778 6779 10ba74e 6780 10ba77a FindCloseChangeNotification 6779->6780 6781 10ba7b9 6779->6781 6782 10ba788 6780->6782 6781->6780 6783 10badce 6784 10badfa OleInitialize 6783->6784 6785 10bae30 6783->6785 6786 10bae08 6784->6786 6785->6784 6705 52c222a 6708 52c225f ioctlsocket 6705->6708 6707 52c228b 6708->6707 6790 52c0366 6792 52c039e MapViewOfFile 6790->6792 6793 52c03ed 6792->6793 6709 10ba186 6710 10ba1bb send 6709->6710 6711 10ba1f3 6709->6711 6712 10ba1c9 6710->6712 6711->6710 6713 10ba486 6716 10ba4bb RegSetValueExW 6713->6716 6715 10ba507 6716->6715 6794 10ba646 6795 10ba67e CreateMutexW 6794->6795 6797 10ba6c1 6795->6797 6717 52c12a2 6719 52c12dd LoadLibraryA 6717->6719 6720 52c131a 6719->6720 6798 52c3be2 6799 52c3c17 PostMessageW 6798->6799 6801 52c3c42 6798->6801 6800 52c3c2c 6799->6800 6801->6799 6802 10ba2da 6803 10ba306 SetErrorMode 6802->6803 6805 10ba32f 6802->6805 6804 10ba31b 6803->6804 6805->6803 6721 52c09be 6722 52c09f9 getaddrinfo 6721->6722 6724 52c0a6b 6722->6724 6806 52c3e7e 6807 52c3eaa DispatchMessageW 6806->6807 6808 52c3ed3 6806->6808 6809 52c3ebf 6807->6809 6808->6807 6725 10bb61e 6727 10bb656 CreateFileW 6725->6727 6728 10bb6a5 6727->6728 6810 10bbc5e 6812 10bbc96 WSASocketW 6810->6812 6813 10bbcd2 6812->6813 6729 10ba392 6730 10ba3c7 RegQueryValueExW 6729->6730 6732 10ba41b 6730->6732 6733 52c01b6 6735 52c01ee ConvertStringSecurityDescriptorToSecurityDescriptorW 6733->6735 6736 52c022f 6735->6736 6814 52c35f6 6816 52c362b GetProcessWorkingSetSize 6814->6816 6817 52c3657 6816->6817 6737 52c0032 6738 52c0082 GetComputerNameW 6737->6738 6739 52c0090 6738->6739 6740 10bac2a 6741 10bac68 DuplicateHandle 6740->6741 6742 10baca0 6740->6742 6743 10bac76 6741->6743 6742->6741 6818 52c0e4e 6819 52c0e83 WSAConnect 6818->6819 6821 52c0ea2 6819->6821 6826 5170972 6827 5170622 6826->6827 6832 5170a13 6827->6832 6837 5170998 6827->6837 6842 5170a1a 6827->6842 6847 5170a01 6827->6847 6833 5170a18 6832->6833 6834 5170ad7 6833->6834 6852 517101c 6833->6852 6856 5171068 6833->6856 6838 51709d3 6837->6838 6839 5170ad7 6838->6839 6840 517101c 2 API calls 6838->6840 6841 5171068 2 API calls 6838->6841 6840->6839 6841->6839 6843 5170a1f 6842->6843 6844 5170ad7 6843->6844 6845 517101c 2 API calls 6843->6845 6846 5171068 2 API calls 6843->6846 6845->6844 6846->6844 6848 5170a06 6847->6848 6849 5170ad7 6848->6849 6850 517101c 2 API calls 6848->6850 6851 5171068 2 API calls 6848->6851 6850->6849 6851->6849 6853 5171021 6852->6853 6854 5171037 6853->6854 6860 5171530 6853->6860 6854->6834 6857 5171093 6856->6857 6858 51710da 6857->6858 6859 5171530 2 API calls 6857->6859 6858->6834 6859->6858 6861 5171565 6860->6861 6862 51715a3 6861->6862 6865 52c0fc0 6861->6865 6869 52c1016 6861->6869 6862->6854 6866 52c1016 GetVolumeInformationA 6865->6866 6868 52c106e 6866->6868 6868->6862 6870 52c1066 GetVolumeInformationA 6869->6870 6871 52c106e 6870->6871 6871->6862 6744 52c060a 6747 52c063f shutdown 6744->6747 6746 52c0668 6747->6746 6748 52c388a 6750 52c38bf RegDeleteKeyW 6748->6750 6751 52c38f7 6750->6751 6876 10bbd62 6877 10bbd9a setsockopt 6876->6877 6878 10bbdd2 6876->6878 6879 10bbda8 6877->6879 6878->6877 6752 52c2306 6753 52c232f select 6752->6753 6755 52c2364 6753->6755 6880 51703f8 KiUserExceptionDispatcher 6881 517042c 6880->6881 6882 10ba7fa 6883 10ba832 RegOpenKeyExW 6882->6883 6885 10ba888 6883->6885 6756 52c321e 6758 52c3247 LookupPrivilegeValueW 6756->6758 6759 52c326e 6758->6759 6760 52c339e 6763 52c33cd AdjustTokenPrivileges 6760->6763 6762 52c33ef 6763->6762 6764 52c351a 6766 52c354f GetExitCodeProcess 6764->6766 6767 52c3578 6766->6767 6768 52c289a 6770 52c28c6 LoadLibraryShim 6768->6770 6771 52c28f4 6770->6771 6886 52c205a 6887 52c2092 RegCreateKeyExW 6886->6887 6889 52c2104 6887->6889 6890 52c36da 6892 52c370f SetProcessWorkingSetSize 6890->6892 6893 52c373b 6892->6893 6772 10bb736 6773 10bb76b GetFileType 6772->6773 6775 10bb798 6773->6775 6894 10bb9f6 6897 10bba2b ReadFile 6894->6897 6896 10bba5d 6897->6896 6898 52c08d2 6900 52c0907 GetProcessTimes 6898->6900 6901 52c0939 6900->6901

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 5171930-517198c 4 5171992-51719a6 0->4 5 5172e7d-5172e9e 0->5 8 51719b4-51719c5 4->8 9 51719a8-51719af 4->9 10 5172ea0-5172eaa 5->10 11 5172f0a-5172f46 5->11 18 51719c7-5171a07 call 5171720 8->18 19 5171a0c-5171a1d 8->19 12 5172fb2-5172fb9 9->12 13 5172eb0-5172f00 10->13 14 5172fad 10->14 30 5172f91-5172f96 11->30 31 5172f48-5172f8f call 5171720 11->31 13->11 26 5172f02-5172f04 13->26 14->12 18->12 24 5171b54-5171b65 19->24 25 5171a23-5171a2d 19->25 34 5171da3-5171db4 24->34 35 5171b6b-5171b75 24->35 25->5 28 5171a33-5171a47 25->28 26->11 39 5171a7c-5171a8d 28->39 40 5171a49-5171a53 28->40 47 5172fa1-5172fab 30->47 31->47 48 51721cb-51721dc 34->48 49 5171dba-5171dc4 34->49 35->5 41 5171b7b-5171b82 35->41 58 5171a93-5171a9d 39->58 59 5171b1f-5171b30 39->59 40->5 44 5171a59-5171a66 40->44 41->5 45 5171b88-5171b8d 41->45 44->5 50 5171a6c-5171a77 44->50 51 5171b93-5171bbc 45->51 52 5171c4f-5171c78 45->52 47->12 69 51724c7-51724d8 48->69 70 51721e2-51721ec 48->70 49->5 57 5171dca-5171dfa call 5170550 49->57 50->12 83 5171c11-5171c4a call 5171720 * 2 51->83 84 5171bbe-5171be2 51->84 95 5171cb3-5171ccf call 5171720 52->95 57->5 103 5171e00-5171e21 57->103 58->5 65 5171aa3-5171ab0 58->65 59->12 77 5171b36-5171b40 59->77 65->5 72 5171ab6-5171b1a call 5170550 call 5171720 65->72 87 5172876-5172887 69->87 88 51724de-51726a5 69->88 70->5 75 51721f2-5172222 call 5170550 70->75 72->12 75->5 123 5172228-5172249 75->123 77->5 78 5171b46-5171b4f 77->78 78->12 83->12 99 5171be4-5171c07 84->99 100 5171c0c 84->100 106 5172942-5172953 87->106 107 517288d-5172897 87->107 88->5 311 51726ab-51726c3 88->311 95->5 126 5171cd5-5171d3f call 5171720 95->126 99->95 100->83 109 5171e27-5171ea5 call 5171720 103->109 110 5171eaa-5171eb1 103->110 132 5172b95-5172ba6 106->132 133 5172959-5172963 106->133 107->5 118 517289d-51728b1 107->118 109->12 115 5171eb7-5171f33 110->115 116 5171fac-51720c1 call 5171720 110->116 115->5 243 5171f39-5171f71 115->243 116->5 343 51720c7-517210b 116->343 139 51728b3 118->139 140 51728be-51728cf 118->140 130 51722d2-51722d9 123->130 131 517224f-51722cd call 5171720 123->131 126->12 143 5172363-51724c2 call 5171720 * 2 130->143 144 51722df-5172328 130->144 131->12 155 5172d25-5172d36 132->155 156 5172bac-5172bb3 132->156 133->5 138 5172969-5172970 133->138 138->5 149 5172976-517297b 138->149 411 51728b3 call 51731b2 139->411 412 51728b3 call 51731a0 139->412 413 51728b3 call 517316c 139->413 414 51728b3 call 5173128 139->414 170 51728f5-5172906 140->170 171 51728d1-51728f0 140->171 143->12 203 5172e78 144->203 209 517232e-517235b 144->209 157 5172981-51729c4 149->157 158 5172a2f-5172a5e 149->158 155->12 181 5172d3c-5172d7f 155->181 166 5172c42-5172ca9 156->166 167 5172bb9-5172be2 call 5171720 156->167 223 51729c6-51729ec 157->223 224 51729f1-5172a2a call 5171720 * 2 157->224 217 5172a99-5172b90 call 5171720 * 2 158->217 160 51728b9 160->12 166->5 231 5172caf-5172cd8 166->231 193 5172be4-5172be7 167->193 194 5172c20-5172c3c 167->194 170->12 198 517290c-517293d 170->198 171->12 181->203 244 5172d85-5172e73 181->244 202 5172bed-5172c1e 193->202 193->203 194->12 194->166 198->12 202->193 202->194 203->5 209->143 217->12 223->217 224->12 231->12 257 5172cde-5172ce2 231->257 243->203 294 5171f77-5171fa4 243->294 244->12 257->5 266 5172ce8-5172d20 257->266 266->12 294->116 311->5 321 51726c9-51727be 311->321 408 51727c0 call 14305e0 321->408 409 51727c0 call 1430606 321->409 410 51727c0 call 5172fc1 321->410 360 5172117-517217f 343->360 380 5172181-51721c6 360->380 381 517210d 360->381 380->12 381->360 385 51727c6-51727e1 389 5172837-517283b 385->389 390 51727e3-517280f 385->390 393 5172843-517286c call 5171758 389->393 399 5172811-5172813 390->399 400 517281b-517281e 390->400 407 5172871 393->407 399->203 401 5172819 399->401 400->203 402 5172824-5172835 400->402 401->402 402->393 407->12 408->385 409->385 410->385 411->160 412->160 413->160 414->160
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479621151.0000000005170000.00000040.00000800.00020000.00000000.sdmp, Offset: 05170000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5170000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID:
                      • String ID: $
                      • API String ID: 0-227171996
                      • Opcode ID: a28827373a1b5ce52b60033a73094638dee8d032b31c090824b425eb0775c685
                      • Instruction ID: 76d72baf9bab959e47ca4879714bf5f4a19397efec40678cd3ca04e75ae5de1b
                      • Opcode Fuzzy Hash: a28827373a1b5ce52b60033a73094638dee8d032b31c090824b425eb0775c685
                      • Instruction Fuzzy Hash: 16C26B34B002149FCB24DF78C954BADB7B3BB88304F1184A9D919AB7A1DF399D85CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 052C33E7
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: AdjustPrivilegesToken
                      • String ID:
                      • API String ID: 2874748243-0
                      • Opcode ID: 422008da6024f8538dcfe5c40114f2e3333d6f51768be6c604ec6802303aa762
                      • Instruction ID: 893ae2d816d0fa8fa43df8252d1586c58fb7fbed6b76e1c25757aa0bfdfc2cd0
                      • Opcode Fuzzy Hash: 422008da6024f8538dcfe5c40114f2e3333d6f51768be6c604ec6802303aa762
                      • Instruction Fuzzy Hash: 6721BF765093809FDB22CF25DC40B62BFF4FF16310F0889DAE9858B563D275A908CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 052C33E7
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: AdjustPrivilegesToken
                      • String ID:
                      • API String ID: 2874748243-0
                      • Opcode ID: 51a7209c39cc13b902301826e07ee1aa3f158b29ae3dd778a876da3502480b56
                      • Instruction ID: 3e647c3bff6fc9610dc8c0d506903a400bf62471a2c58e322f324e2cfbbed77e
                      • Opcode Fuzzy Hash: 51a7209c39cc13b902301826e07ee1aa3f158b29ae3dd778a876da3502480b56
                      • Instruction Fuzzy Hash: B2119E316102009FDB21CF15D984B66FFE4FF04220F08C9AEED4A8BA52D775E418CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 554 51703f8-5170436 KiUserExceptionDispatcher 557 5170439-517043f 554->557 558 5170445-5170448 557->558 559 517052d-517053e 557->559 560 517044a 558->560 585 517044c call 14305e0 560->585 586 517044c call 1430606 560->586 562 5170451-5170472 565 5170474-5170476 562->565 566 51704b9-51704bc 562->566 587 5170478 call 5170ce6 565->587 588 5170478 call 14305e0 565->588 589 5170478 call 1430606 565->589 566->559 567 51704be-51704c4 566->567 567->560 569 51704c6-51704cd 567->569 568 517047e-5170485 570 5170487-51704ae 568->570 571 51704b6 568->571 572 51704cf-51704e5 569->572 573 517051e 569->573 570->571 571->566 572->559 577 51704e7-51704ef 572->577 576 5170528 573->576 576->557 578 51704f1-51704fc 577->578 579 5170510-5170516 577->579 578->559 581 51704fe-5170508 578->581 579->573 581->579 585->562 586->562 587->568 588->568 589->568
                      APIs
                      • KiUserExceptionDispatcher.NTDLL ref: 0517041F
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479621151.0000000005170000.00000040.00000800.00020000.00000000.sdmp, Offset: 05170000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5170000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: DispatcherExceptionUser
                      • String ID:
                      • API String ID: 6842923-0
                      • Opcode ID: 0f1892f9b78ef80ab93717fcbc69cdc5f9c4e0e43cf5f092a545df5df4f6a52c
                      • Instruction ID: 733afd976f7b2c99d736bcbfef9daed9c29e47d1a9a19dc17585ba2b442c0e03
                      • Opcode Fuzzy Hash: 0f1892f9b78ef80ab93717fcbc69cdc5f9c4e0e43cf5f092a545df5df4f6a52c
                      • Instruction Fuzzy Hash: 12314C71A002048FCB24DF78D98859DB7F2EF88214B6485B9D809EB35ADB39DD45CFA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 590 10bb5de-10bb676 594 10bb67b-10bb687 590->594 595 10bb678 590->595 596 10bb689 594->596 597 10bb68c-10bb695 594->597 595->594 596->597 598 10bb697-10bb6bb CreateFileW 597->598 599 10bb6e6-10bb6eb 597->599 602 10bb6ed-10bb6f2 598->602 603 10bb6bd-10bb6e3 598->603 599->598 602->603
                      APIs
                      • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 010BB69D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: 7a08035f898b87a1320b127d9df494f64f0f4e3bb3aba07bc99929ca36d8e5eb
                      • Instruction ID: c7f8c662557e3a6b9c3ab9bde69e79235f8ef86f558367763f2f4bd6b0e315cb
                      • Opcode Fuzzy Hash: 7a08035f898b87a1320b127d9df494f64f0f4e3bb3aba07bc99929ca36d8e5eb
                      • Instruction Fuzzy Hash: 8131A571505380AFE722CF65DD44BA2BFF8EF0A314F08889AE9848B652D375E909D771
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 606 51703e8-51703f6 607 51703f8-5170425 KiUserExceptionDispatcher 606->607 608 517042c-5170436 607->608 610 5170439-517043f 608->610 611 5170445-5170448 610->611 612 517052d-517053e 610->612 613 517044a 611->613 641 517044c call 14305e0 613->641 642 517044c call 1430606 613->642 615 5170451-5170472 618 5170474-5170476 615->618 619 51704b9-51704bc 615->619 638 5170478 call 5170ce6 618->638 639 5170478 call 14305e0 618->639 640 5170478 call 1430606 618->640 619->612 620 51704be-51704c4 619->620 620->613 622 51704c6-51704cd 620->622 621 517047e-5170485 623 5170487-51704ae 621->623 624 51704b6 621->624 625 51704cf-51704e5 622->625 626 517051e 622->626 623->624 624->619 625->612 630 51704e7-51704ef 625->630 629 5170528 626->629 629->610 631 51704f1-51704fc 630->631 632 5170510-5170516 630->632 631->612 634 51704fe-5170508 631->634 632->626 634->632 638->621 639->621 640->621 641->615 642->615
                      APIs
                      • KiUserExceptionDispatcher.NTDLL ref: 0517041F
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479621151.0000000005170000.00000040.00000800.00020000.00000000.sdmp, Offset: 05170000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5170000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: DispatcherExceptionUser
                      • String ID:
                      • API String ID: 6842923-0
                      • Opcode ID: e30709ec1d0bbf750772b546529708e68d2f87e760ed71ee4c215068f4da4e7a
                      • Instruction ID: 3fcceb534150b990fe6f610fcd81f5c17ddc272f266fad311b2d5f0ae203925d
                      • Opcode Fuzzy Hash: e30709ec1d0bbf750772b546529708e68d2f87e760ed71ee4c215068f4da4e7a
                      • Instruction Fuzzy Hash: 8C313271A002058FCB14DF78C99859EB7F6EF88204F5484A9D809EB359DB39DD41CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 643 52c202e-52c20b2 647 52c20b4 643->647 648 52c20b7-52c20c3 643->648 647->648 649 52c20c8-52c20d1 648->649 650 52c20c5 648->650 651 52c20d6-52c20ed 649->651 652 52c20d3 649->652 650->649 654 52c212f-52c2134 651->654 655 52c20ef-52c2102 RegCreateKeyExW 651->655 652->651 654->655 656 52c2104-52c212c 655->656 657 52c2136-52c213b 655->657 657->656
                      APIs
                      • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 052C20F5
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: 6459b309b8ac20a9a0fb0f09c86743b2564508d45d55101c0fd5b68ca0cde6fa
                      • Instruction ID: 219e0a5ee71fa0e4c2189fc343618b7bc199ea4e27cc8182a3481d7fb3a128ff
                      • Opcode Fuzzy Hash: 6459b309b8ac20a9a0fb0f09c86743b2564508d45d55101c0fd5b68ca0cde6fa
                      • Instruction Fuzzy Hash: 85318F76504344AFE722CB65CC44FA7BFFCFF15210F08859AE9898B662D724E908CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 662 10bbb4b-10bbb6b 663 10bbb8d-10bbbbf 662->663 664 10bbb6d-10bbb8c 662->664 668 10bbbc2-10bbc1a RegQueryValueExW 663->668 664->663 670 10bbc20-10bbc36 668->670
                      APIs
                      • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 010BBC12
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: 98bf0cd66defb3a7f9d391bc92082584ec8bcaab6ba8300051a4e6f897565d43
                      • Instruction ID: de2fb57fac870b16dfb441a8cf57d830cba824be9306e1a62ac410164d9f84f9
                      • Opcode Fuzzy Hash: 98bf0cd66defb3a7f9d391bc92082584ec8bcaab6ba8300051a4e6f897565d43
                      • Instruction Fuzzy Hash: 7F317C6510E7C0AFD3138B258C61A61BFB4EF47610F0E45DBD8C48F6A3D269A909D7B2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 671 10ba7c7-10ba855 675 10ba85a-10ba871 671->675 676 10ba857 671->676 678 10ba8b3-10ba8b8 675->678 679 10ba873-10ba886 RegOpenKeyExW 675->679 676->675 678->679 680 10ba8ba-10ba8bf 679->680 681 10ba888-10ba8b0 679->681 680->681
                      APIs
                      • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 010BA879
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: Open
                      • String ID:
                      • API String ID: 71445658-0
                      • Opcode ID: 57c9bec1f1bc3c75a93d1fe9a2ad5459f92c593ba202c6ad67cf91db1eff93e4
                      • Instruction ID: 5a88ed14c251d3ba01ec858c08fe0307aa98977db0770a5f0babcce25071dabc
                      • Opcode Fuzzy Hash: 57c9bec1f1bc3c75a93d1fe9a2ad5459f92c593ba202c6ad67cf91db1eff93e4
                      • Instruction Fuzzy Hash: DC31C772508380AFE7228B55DC44FA7BFFCEF16214F04849AE980CB653D268E90AC771
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 686 52c099c-52c0a5b 692 52c0aad-52c0ab2 686->692 693 52c0a5d-52c0a65 getaddrinfo 686->693 692->693 694 52c0a6b-52c0a7d 693->694 696 52c0a7f-52c0aaa 694->696 697 52c0ab4-52c0ab9 694->697 697->696
                      APIs
                      • getaddrinfo.WS2_32(?,00000E24), ref: 052C0A63
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: getaddrinfo
                      • String ID:
                      • API String ID: 300660673-0
                      • Opcode ID: 110a336813002f8ff3ea57686f14d86658615aa7d69f383ea0686649a66f43ff
                      • Instruction ID: bc1d34db99d7a9def5f697137226cf5c3134dda8c02d7ed43a69b8113e15cd6c
                      • Opcode Fuzzy Hash: 110a336813002f8ff3ea57686f14d86658615aa7d69f383ea0686649a66f43ff
                      • Instruction Fuzzy Hash: 1E31B1B1504340AFE721CB51CC44FA6FBACEF15724F04889AFA889B682D375E949CB71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 701 52c3786-52c3862 RegEnumValueW
                      APIs
                      • RegEnumValueW.KERNELBASE(?,00000E24,?,?), ref: 052C383E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: EnumValue
                      • String ID:
                      • API String ID: 2814608202-0
                      • Opcode ID: 6ed55b94bdfc5900ad56f64d34a804edacb1e72186995a05b8a4b9ec80e3a32c
                      • Instruction ID: 740e4c5be8b9c9335f34aa334b67827d10a8497722769625f37267a936b0ee0f
                      • Opcode Fuzzy Hash: 6ed55b94bdfc5900ad56f64d34a804edacb1e72186995a05b8a4b9ec80e3a32c
                      • Instruction Fuzzy Hash: C731E87150D3C06FD3138B219C61A61BFB4EF47614F0E84CBD8848B6A3D125690AD7B2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 706 10ba612-10ba695 710 10ba69a-10ba6a3 706->710 711 10ba697 706->711 712 10ba6a8-10ba6b1 710->712 713 10ba6a5 710->713 711->710 714 10ba6b3-10ba6d7 CreateMutexW 712->714 715 10ba702-10ba707 712->715 713->712 718 10ba709-10ba70e 714->718 719 10ba6d9-10ba6ff 714->719 715->714 718->719
                      APIs
                      • CreateMutexW.KERNELBASE(?,?), ref: 010BA6B9
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: CreateMutex
                      • String ID:
                      • API String ID: 1964310414-0
                      • Opcode ID: 43fb6281e272b1fbcd62a91d7e51002e8353de675145d82f8e14357083fe7e73
                      • Instruction ID: 94e097579b62b720d159d8416d4a97551cf13945040a5b44660cef52930ea833
                      • Opcode Fuzzy Hash: 43fb6281e272b1fbcd62a91d7e51002e8353de675145d82f8e14357083fe7e73
                      • Instruction Fuzzy Hash: D23193B15093809FE722CB25DC85B96BFF8EF06214F08849AE984CB693D375E909C761
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 722 52c0190-52c0211 726 52c0216-52c021f 722->726 727 52c0213 722->727 728 52c0277-52c027c 726->728 729 52c0221-52c0229 ConvertStringSecurityDescriptorToSecurityDescriptorW 726->729 727->726 728->729 730 52c022f-52c0241 729->730 732 52c027e-52c0283 730->732 733 52c0243-52c0274 730->733 732->733
                      APIs
                      • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 052C0227
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: DescriptorSecurity$ConvertString
                      • String ID:
                      • API String ID: 3907675253-0
                      • Opcode ID: 2497ed83c9c4e7be7ede79171f744007a1669803299e38f92786aa54bb3c408c
                      • Instruction ID: 27579ab4aef853f13d815b4f953c42fae1365f3bf052ff40a5f4af88c6304974
                      • Opcode Fuzzy Hash: 2497ed83c9c4e7be7ede79171f744007a1669803299e38f92786aa54bb3c408c
                      • Instruction Fuzzy Hash: 6831B471504344AFEB21CB65DC45FA7BFE8EF05210F0884AAE945DB652D224E908CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 737 52c0894-52c0929 742 52c092b-52c0933 GetProcessTimes 737->742 743 52c0976-52c097b 737->743 745 52c0939-52c094b 742->745 743->742 746 52c097d-52c0982 745->746 747 52c094d-52c0973 745->747 746->747
                      APIs
                      • GetProcessTimes.KERNELBASE(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 052C0931
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: ProcessTimes
                      • String ID:
                      • API String ID: 1995159646-0
                      • Opcode ID: ac3ab44ecc5fe1c896002f8b9813d955694c734dbc9d8fca4af928ce713c2b6a
                      • Instruction ID: 45661f9a525415661284cf03bff51df5fe7fc34167e7b931686e9eef45545452
                      • Opcode Fuzzy Hash: ac3ab44ecc5fe1c896002f8b9813d955694c734dbc9d8fca4af928ce713c2b6a
                      • Instruction Fuzzy Hash: 6E31F9724053809FE722CF54DC45F96BFB8EF06314F0489DAE9848F553D225A909C771
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 052C20F5
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: ad33dfb5881a378e13562107b68922f7ce309dd908e1d6d6bcd5fb37b6f00283
                      • Instruction ID: f3bcd8aed3349dc1092bbaf68b4a820ac9358e4eb87bf984feac0f76eb787668
                      • Opcode Fuzzy Hash: ad33dfb5881a378e13562107b68922f7ce309dd908e1d6d6bcd5fb37b6f00283
                      • Instruction Fuzzy Hash: D521C176500304EFEB31CE15CC44FA7BBECFF18610F04856AE989C6A52DB74E408CA61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • getaddrinfo.WS2_32(?,00000E24), ref: 052C0A63
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: getaddrinfo
                      • String ID:
                      • API String ID: 300660673-0
                      • Opcode ID: d6e1471481250abbb59471e03b42997ef39e7129bdd8498cee27858de7b5ede5
                      • Instruction ID: 048ff5363fe5d65333734f7e3c593dc78d01789aaba9be19767abf37a2cc6ae8
                      • Opcode Fuzzy Hash: d6e1471481250abbb59471e03b42997ef39e7129bdd8498cee27858de7b5ede5
                      • Instruction Fuzzy Hash: 5221B171111200AEFB30DB55CC44FAAFBACEF14714F04886AEA489A681D7B5E5498B71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetVolumeInformationA.KERNELBASE(?,00000E24,?,?), ref: 052C1066
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: InformationVolume
                      • String ID:
                      • API String ID: 2039140958-0
                      • Opcode ID: e144a04259d888b8d8cf6207472aeadc04af1dac0eaf571a4b6d7520134f9450
                      • Instruction ID: d1bda9367d5ffd961e471a2ef4630f1bddf802b6ecae9fcf9be2fe06c57733d2
                      • Opcode Fuzzy Hash: e144a04259d888b8d8cf6207472aeadc04af1dac0eaf571a4b6d7520134f9450
                      • Instruction Fuzzy Hash: D331C17150E3C06FD3128B258C51B62BFB8EF47210F0981DBE884DF693D225A949C7A2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegQueryValueExW.KERNELBASE(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 010BA40C
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: 37e5b2a7d17fb902975d3230e198f783fa93a2397afed7ae74519996eec4522c
                      • Instruction ID: 76b9c178b842123b9301f1f9ecc98fd1b078fdc7cee50300d32495a5e91ecb78
                      • Opcode Fuzzy Hash: 37e5b2a7d17fb902975d3230e198f783fa93a2397afed7ae74519996eec4522c
                      • Instruction Fuzzy Hash: 19218D71605340AFE721CF15CC84FA6BBF8EF45620F08849AE985CB652D364E949CB71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: select
                      • String ID:
                      • API String ID: 1274211008-0
                      • Opcode ID: 7671c776cbbbcf84cf791d7b1cde5ea996517324b31e076c9edadeb4377cd540
                      • Instruction ID: cb966d043742a468d8e128a36d4f6ece32ab054c02ac8e0dda89c2c84fda04bd
                      • Opcode Fuzzy Hash: 7671c776cbbbcf84cf791d7b1cde5ea996517324b31e076c9edadeb4377cd540
                      • Instruction Fuzzy Hash: 02216D755093849FD722CF25DC44A62BFF8EF06210F0984DAE988CF263D225A949DB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetExitCodeProcess.KERNELBASE(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 052C3570
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: CodeExitProcess
                      • String ID:
                      • API String ID: 3861947596-0
                      • Opcode ID: 705bc8a547992cb1961d45f87a1d2861fb4fbb240191cb4f91d44a8d347d70c2
                      • Instruction ID: 676d40347353d549bd59040a1b369b404a3f643b83e29e509886ee73fa499529
                      • Opcode Fuzzy Hash: 705bc8a547992cb1961d45f87a1d2861fb4fbb240191cb4f91d44a8d347d70c2
                      • Instruction Fuzzy Hash: B021A4715093806FE712CB15DC45F96BFB8EF46324F0884EAE944DF693D268A909C771
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • WSASocketW.WS2_32(?,?,?,?,?), ref: 010BBCCA
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: Socket
                      • String ID:
                      • API String ID: 38366605-0
                      • Opcode ID: aa07aab6db96d21741bef575de943f22218a5ef609bc86eb2f16ec0c7d0a5093
                      • Instruction ID: 4d7b234a5c4a19ac2bbf55bed09336bc0359929a5a3e46b2c317ccd7efb5ff37
                      • Opcode Fuzzy Hash: aa07aab6db96d21741bef575de943f22218a5ef609bc86eb2f16ec0c7d0a5093
                      • Instruction Fuzzy Hash: D021B171509380AFE722CF55DC45F96FFF8EF05220F0888AEE9858B652D375A509CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegSetValueExW.KERNELBASE(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 010BA4F8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: Value
                      • String ID:
                      • API String ID: 3702945584-0
                      • Opcode ID: 10e6a8813089aab0ff67dad1c68f8235c25a8515ad4369c02b1e279161277b80
                      • Instruction ID: 5397794110c39b99f68dda5c0567bc48b986d2da9d8b92557961bc3d41708e5f
                      • Opcode Fuzzy Hash: 10e6a8813089aab0ff67dad1c68f8235c25a8515ad4369c02b1e279161277b80
                      • Instruction Fuzzy Hash: 2C21B272504380AFE7228F15DC84FA7BFF8EF46620F08849AE985CB652D364E949C771
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: FileView
                      • String ID:
                      • API String ID: 3314676101-0
                      • Opcode ID: 0d18a5ecb858a34957c6013d73ebbba887f910f2c8872e9da3cf9c64f1c7e0d3
                      • Instruction ID: db038b1009d699effc1c3b3fd86b0714011e1ef79a482fb0ebcfeb66d10aa981
                      • Opcode Fuzzy Hash: 0d18a5ecb858a34957c6013d73ebbba887f910f2c8872e9da3cf9c64f1c7e0d3
                      • Instruction Fuzzy Hash: B821BF71505384AFE722CB15DD44F96FFF8EF09224F0488AEE9848B652D375A909CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 010BB69D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: 9236d76dc634f4bfc18059954e10444015c27131914d9683ba27e057465b73e0
                      • Instruction ID: 4d6689aabe284a352f67eb4dd85731480b42b6929772fd057644dc6b2ce40d1f
                      • Opcode Fuzzy Hash: 9236d76dc634f4bfc18059954e10444015c27131914d9683ba27e057465b73e0
                      • Instruction Fuzzy Hash: 60219271600200AFE721CF69DD85FA6FBE8EF08224F048869E9858B751D779E908CB71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 052C0227
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: DescriptorSecurity$ConvertString
                      • String ID:
                      • API String ID: 3907675253-0
                      • Opcode ID: 4bf78a31869aa40e911d8021722c293ab8c818ae1dfb179d37a5df0eecf33db8
                      • Instruction ID: a04ecfcfa462072c809a90b31b2c5d861dbde9416484aa9fd315cac9c33316fe
                      • Opcode Fuzzy Hash: 4bf78a31869aa40e911d8021722c293ab8c818ae1dfb179d37a5df0eecf33db8
                      • Instruction Fuzzy Hash: B421D772500204EFEB20DF65DD45FABBBECEF04624F04886AE945DBA52D774E5088A72
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetFileType.KERNELBASE(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 010BB789
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: FileType
                      • String ID:
                      • API String ID: 3081899298-0
                      • Opcode ID: af652e3c1e036a79d75cd009c52dfa2d06d9b8ba5232edf878ddfdf9087e10e2
                      • Instruction ID: 09b7b83e125d504387f29e228c322e7fc697d6c3783dc87ffe7a8ddba8cb86b2
                      • Opcode Fuzzy Hash: af652e3c1e036a79d75cd009c52dfa2d06d9b8ba5232edf878ddfdf9087e10e2
                      • Instruction Fuzzy Hash: 82212CB54087806FE722CB15DC94BA3BFFCEF46724F0884DAE9958B653D224A909C771
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegQueryValueExW.KERNELBASE(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 052C013C
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: 85ced02a1291fa1895bfaa1b89563d1af685157e5e34af437e41b56787047a27
                      • Instruction ID: 0e5f86d9455132644b453ebb59d257a0408b95b52f297d69a8ccf781311856bc
                      • Opcode Fuzzy Hash: 85ced02a1291fa1895bfaa1b89563d1af685157e5e34af437e41b56787047a27
                      • Instruction Fuzzy Hash: 4221BD72504340AFD722CB15CC84FA7FFF8EF05620F08899AE9458B652C264E949CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 010BA879
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: Open
                      • String ID:
                      • API String ID: 71445658-0
                      • Opcode ID: 413a4f598abe21bff59b6293375580e5e8bd99be9b9157b0a578670884880972
                      • Instruction ID: 2d91b892963351186a2e0a1c653d4da50605c8e9cb5a75fb58bef5b5b26294e3
                      • Opcode Fuzzy Hash: 413a4f598abe21bff59b6293375580e5e8bd99be9b9157b0a578670884880972
                      • Instruction Fuzzy Hash: A5210472500300EEF7318B55CC84FABFBECEF14224F04886AE94087A41D738E4098AB1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetProcessWorkingSetSize.KERNEL32(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 052C3733
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: ProcessSizeWorking
                      • String ID:
                      • API String ID: 3584180929-0
                      • Opcode ID: b45dcec3cc5430342d762a844567fc1421cadfa3bc9808daad60f1f2248afdd7
                      • Instruction ID: 095a557bcabf1d9f4d965bea2b940b35ebd567a4b187ac5d1e246667af6990d5
                      • Opcode Fuzzy Hash: b45dcec3cc5430342d762a844567fc1421cadfa3bc9808daad60f1f2248afdd7
                      • Instruction Fuzzy Hash: 9721D4715053806FE722CB15DC45FABBFB8EF46220F08C8AAE944DB652D274A908CB71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetProcessWorkingSetSize.KERNEL32(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 052C364F
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: ProcessSizeWorking
                      • String ID:
                      • API String ID: 3584180929-0
                      • Opcode ID: b45dcec3cc5430342d762a844567fc1421cadfa3bc9808daad60f1f2248afdd7
                      • Instruction ID: 73d95fd533e1507d8d478d018285dbb426e431bab41c8136e002c73c5bc81fd0
                      • Opcode Fuzzy Hash: b45dcec3cc5430342d762a844567fc1421cadfa3bc9808daad60f1f2248afdd7
                      • Instruction Fuzzy Hash: 8A21C2715053806FE722CB25DC48FA6BFA8EF45320F08C8AAE944DB652D274A908CB65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateMutexW.KERNELBASE(?,?), ref: 010BA6B9
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: CreateMutex
                      • String ID:
                      • API String ID: 1964310414-0
                      • Opcode ID: 792086baeef386a0a95fa89e87c488e77db512137b64b92e4fb2afad93fba91b
                      • Instruction ID: 90598dbfd71bf730b8d04201cc87c6e1d782cf7206a6f9cb02c649cf146623be
                      • Opcode Fuzzy Hash: 792086baeef386a0a95fa89e87c488e77db512137b64b92e4fb2afad93fba91b
                      • Instruction Fuzzy Hash: C221A4B16042009FF721DF29DD85BA6FBE8EF08224F04C8A9E985CB741D775E509CA71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • shutdown.WS2_32(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 052C0660
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: shutdown
                      • String ID:
                      • API String ID: 2510479042-0
                      • Opcode ID: 581e0f307c26df1d8a47b4d3dbeba395c153f7243de9fa600f2f3b21915abd4e
                      • Instruction ID: 97bcbeffa4a46ad3419fe57add75755216570ef1fb3d2386b87b046e1bec0e8a
                      • Opcode Fuzzy Hash: 581e0f307c26df1d8a47b4d3dbeba395c153f7243de9fa600f2f3b21915abd4e
                      • Instruction Fuzzy Hash: 2F21C571409380AFD722CB15CC44B56BFB8EF46224F0884DAE984DF652C378A949C761
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ReadFile.KERNELBASE(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 010BBA55
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: FileRead
                      • String ID:
                      • API String ID: 2738559852-0
                      • Opcode ID: 81aab4fde8c70a5628db641e35f0af8b059e0ce6ba0eae95336480d85b6ffb4b
                      • Instruction ID: 21f329f630aeeeec9e8d9df908d5163a70abbf792ea95c56d6b4b4f9b9be93b2
                      • Opcode Fuzzy Hash: 81aab4fde8c70a5628db641e35f0af8b059e0ce6ba0eae95336480d85b6ffb4b
                      • Instruction Fuzzy Hash: BF219271405340AFD722CF55DC84F97BFF8EF45720F08889AE9849B652C235A909CB71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegQueryValueExW.KERNELBASE(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 010BA40C
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: 52b30091a5dcce8012e113dec45dfc7fa1b3abd685c9ce7cfd567202abf9a8c2
                      • Instruction ID: 87f2251a08961d97633f1e29831bd88a6de92a9e4af14e682d4e174a2972efc8
                      • Opcode Fuzzy Hash: 52b30091a5dcce8012e113dec45dfc7fa1b3abd685c9ce7cfd567202abf9a8c2
                      • Instruction Fuzzy Hash: AB218E75600204DFE731CE19CD84FA6BBECEF44620F04C4AAE9858B651DB78E949CA71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: send
                      • String ID:
                      • API String ID: 2809346765-0
                      • Opcode ID: c40f08aff3b832ab89320c94e0a926f79838e4283f48a3f72b3291af1d2c19bd
                      • Instruction ID: 3aeaad550f760ae10cfa663c3f2058e21e17be81cda9d93012e534b683c3c421
                      • Opcode Fuzzy Hash: c40f08aff3b832ab89320c94e0a926f79838e4283f48a3f72b3291af1d2c19bd
                      • Instruction Fuzzy Hash: 1721907140D3C09FD7238B21DC54A52BFB4EF07220F0A84DBD9848F563C269A849CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ioctlsocket.WS2_32(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 052C2283
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: ioctlsocket
                      • String ID:
                      • API String ID: 3577187118-0
                      • Opcode ID: 81b8b4883f1f273a936bc11c2427fe3c2e1f0d5b265354d1202d00f4cfe0068d
                      • Instruction ID: c70d2ba4f31d6d95eeba8685d09b01c5188b914966b72ff664d5dd6af181f68a
                      • Opcode Fuzzy Hash: 81b8b4883f1f273a936bc11c2427fe3c2e1f0d5b265354d1202d00f4cfe0068d
                      • Instruction Fuzzy Hash: D921C671405380AFD722CF54DC44FA6BFB8EF45324F08C89AE9859B652C274A908C771
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • setsockopt.WS2_32(?,?,?,?,?), ref: 010BBDA0
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: setsockopt
                      • String ID:
                      • API String ID: 3981526788-0
                      • Opcode ID: e5b8b655a811b3feee57591197443de6979a1ad0b5e8fa5900682402dc186852
                      • Instruction ID: 5f4378d44a4c1f81ca8963531d194d4304cf69295fafc23933a25fb129c569e7
                      • Opcode Fuzzy Hash: e5b8b655a811b3feee57591197443de6979a1ad0b5e8fa5900682402dc186852
                      • Instruction Fuzzy Hash: 6E2190715093C09FD7128F65DC84A92BFB4EF07220F0989DAD9C48F563C229A959CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • WSASocketW.WS2_32(?,?,?,?,?), ref: 010BBCCA
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: Socket
                      • String ID:
                      • API String ID: 38366605-0
                      • Opcode ID: 23dba652159c7cfd2bd8e5dd977ffb7550db351d4c5cc6f5980e719b14263d23
                      • Instruction ID: 6c4ececcc6e10ab5e437f3531c581cc727c156087a099dc20e726f9d5507b540
                      • Opcode Fuzzy Hash: 23dba652159c7cfd2bd8e5dd977ffb7550db351d4c5cc6f5980e719b14263d23
                      • Instruction Fuzzy Hash: 5321D471500200AFE731DF59DD85B96FBE4EF08324F04886AE9858BA52D775E409CB72
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegDeleteKeyW.ADVAPI32(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 052C38E8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: Delete
                      • String ID:
                      • API String ID: 1035893169-0
                      • Opcode ID: d1672120c4188542365250ae0d61d5ba8bc67b330672fbe354de913c4d0c7e01
                      • Instruction ID: 7bec6d493f39aa2857941640a65387172ac0ff593ea525d9cb648f49506a48c5
                      • Opcode Fuzzy Hash: d1672120c4188542365250ae0d61d5ba8bc67b330672fbe354de913c4d0c7e01
                      • Instruction Fuzzy Hash: 1011D271505380AFD721CB15DC84FA7BFA8EF06620F08C89AE9449B252C268E908CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: FileView
                      • String ID:
                      • API String ID: 3314676101-0
                      • Opcode ID: 65019155a8aeb350321d2818018715ec9961affe136308501416236e66c54f52
                      • Instruction ID: 3f39835988b4e641aa01feba2c3f807bf82909dea58c154deaf8cc407bdc1e69
                      • Opcode Fuzzy Hash: 65019155a8aeb350321d2818018715ec9961affe136308501416236e66c54f52
                      • Instruction Fuzzy Hash: 1F21D171500204EFEB31CF15DD45FAAFBE8EF08224F0489ADE9458BA41D375E409CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 052C3266
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: LookupPrivilegeValue
                      • String ID:
                      • API String ID: 3899507212-0
                      • Opcode ID: 69d5d8554b8a6e97c4f1008683feb04da3cd107336cc5c2ea8571bf627484a0c
                      • Instruction ID: e97b3c8c351bdf9e877a7c5f7ec0049f4cbad045a4aa2e3c36bc3d601ea9661b
                      • Opcode Fuzzy Hash: 69d5d8554b8a6e97c4f1008683feb04da3cd107336cc5c2ea8571bf627484a0c
                      • Instruction Fuzzy Hash: 722193715093805FDB21CB25DC54B62BFE8EF56620F0889DEED45DB652D225E804C761
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • FindCloseChangeNotification.KERNELBASE(?), ref: 010BA780
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: ChangeCloseFindNotification
                      • String ID:
                      • API String ID: 2591292051-0
                      • Opcode ID: db714f6e6ccd6f1bf4eece299267f4d264766ed5c1eb3b7e449e528747c9df6f
                      • Instruction ID: 452d6ee003dfa0f0c18863cdc5d331a0821dd7ffb0face373b702d2f42969b1a
                      • Opcode Fuzzy Hash: db714f6e6ccd6f1bf4eece299267f4d264766ed5c1eb3b7e449e528747c9df6f
                      • Instruction Fuzzy Hash: 0521D2B55083809FD712CF15ED85792BFB8FF02324F0984EAED858B653D235A909DB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryA.KERNELBASE(?,00000E24), ref: 052C130B
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 38fc93c727e498ad735d5d07c0a9d4401d9248aefe35525dc52f73e4fd09df8f
                      • Instruction ID: 9123f448d99a9c370fd6d4469cbfa09f1ab7d77c0cbc53b39a8dbf722ce50a30
                      • Opcode Fuzzy Hash: 38fc93c727e498ad735d5d07c0a9d4401d9248aefe35525dc52f73e4fd09df8f
                      • Instruction Fuzzy Hash: 5E113671404340AFE721CB10CC85FA6FFB8EF46720F0484DAFD489B692C278A949CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegSetValueExW.KERNELBASE(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 010BA4F8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: Value
                      • String ID:
                      • API String ID: 3702945584-0
                      • Opcode ID: ac9c8ef707a391a344f69064b2247ee991e96c4548a4f22dfd164abcd9a339af
                      • Instruction ID: 7597d4c683c6c2f6756085f6e3657fdbc749bc7dc9b16ef7a384a21b26092589
                      • Opcode Fuzzy Hash: ac9c8ef707a391a344f69064b2247ee991e96c4548a4f22dfd164abcd9a339af
                      • Instruction Fuzzy Hash: CC11B472600300AFE7318E15DD85FA7BBECEF04624F04846AED858BA41D774E9488A71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryShim.MSCOREE(?,?,?,?), ref: 052C28E5
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: LibraryLoadShim
                      • String ID:
                      • API String ID: 1475914169-0
                      • Opcode ID: df9a0392487f4d6cfafef619685f650d37c8f0eecbfdc2ae14e95d2b11ed116d
                      • Instruction ID: 8e7b558c6973bea66c14c3326b5cefb65995c89ca3ebc61caded508fac8a0323
                      • Opcode Fuzzy Hash: df9a0392487f4d6cfafef619685f650d37c8f0eecbfdc2ae14e95d2b11ed116d
                      • Instruction Fuzzy Hash: 632190B55093809FD722CA15DC84B62BFF8FF06614F0981CAED858B253D265E909CB71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegQueryValueExW.KERNELBASE(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 052C013C
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: a89e3fd966d23ca189ea3bc2cca7793779eae8632516889c52f6010e9c695c75
                      • Instruction ID: a393dad0c7eb4c1f9697eaa46c16b8ca71eae855638f870789ccc7e4e19fd54d
                      • Opcode Fuzzy Hash: a89e3fd966d23ca189ea3bc2cca7793779eae8632516889c52f6010e9c695c75
                      • Instruction Fuzzy Hash: 5711D2725002009FEB31CE15CC84FABFBE8EF04620F04C5AAE9458A652D7B4E909CA71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetProcessTimes.KERNELBASE(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 052C0931
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: ProcessTimes
                      • String ID:
                      • API String ID: 1995159646-0
                      • Opcode ID: b6910c2b6383ac529202cb857c50a47f23558b7d60d462b31742eb4c71a86291
                      • Instruction ID: a8cd22204d39e847e6273e855112eb4cbbdb41cf19daebed40a6465516a6f644
                      • Opcode Fuzzy Hash: b6910c2b6383ac529202cb857c50a47f23558b7d60d462b31742eb4c71a86291
                      • Instruction Fuzzy Hash: F511D372500200EFEB21CF55DD84FAABBE8EF04724F04C86AE9458AA51D774A908CBB1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetComputerNameW.KERNEL32(?,00000E24,?,?), ref: 052C0082
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: ComputerName
                      • String ID:
                      • API String ID: 3545744682-0
                      • Opcode ID: 8949a64d8746106afb893f120e835dcc7b476c81a2787e42c22e9db613f83397
                      • Instruction ID: 12601dc89f37593c12e72f6ddb044340232c40ca7e34d567676de37956b3bad5
                      • Opcode Fuzzy Hash: 8949a64d8746106afb893f120e835dcc7b476c81a2787e42c22e9db613f83397
                      • Instruction Fuzzy Hash: B1110471545340AFD3118B15CC41F72BFF8EF86620F05819AEC489BA42D279BD1ACBB2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • PostMessageW.USER32(?,?,?,?), ref: 052C3C1D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: MessagePost
                      • String ID:
                      • API String ID: 410705778-0
                      • Opcode ID: 40524cf45ab854eec7dbe2ae56c7a2cecef231e9a1f00a31444d7422d3f13c95
                      • Instruction ID: 1902412d26b075e48352bd78bb16f89cfe7f1f5323067cf1b4e6d8b54fb1e6f1
                      • Opcode Fuzzy Hash: 40524cf45ab854eec7dbe2ae56c7a2cecef231e9a1f00a31444d7422d3f13c95
                      • Instruction Fuzzy Hash: CF2190724093C09FDB138F25DC44A62BFB4EF17220F0985DAE9848F563D225A958DB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetProcessWorkingSetSize.KERNEL32(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 052C364F
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: ProcessSizeWorking
                      • String ID:
                      • API String ID: 3584180929-0
                      • Opcode ID: 06f03b70aea99bbb4727b2088b00ece9a519a043ed685e2e0b532f4ea5d8c498
                      • Instruction ID: 028e39964d97e4a7c88a9c8b6421ec84713a60720a1539f459ae4dba1d2ef13f
                      • Opcode Fuzzy Hash: 06f03b70aea99bbb4727b2088b00ece9a519a043ed685e2e0b532f4ea5d8c498
                      • Instruction Fuzzy Hash: 9311E2715003009FEB21CF15DD45BAABBE8EF04724F14CCAAE905CB741D778A908CAB5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetProcessWorkingSetSize.KERNEL32(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 052C3733
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: ProcessSizeWorking
                      • String ID:
                      • API String ID: 3584180929-0
                      • Opcode ID: 06f03b70aea99bbb4727b2088b00ece9a519a043ed685e2e0b532f4ea5d8c498
                      • Instruction ID: d1654f03a50042172b741894c4297650e9482592338633a9badc21347e424999
                      • Opcode Fuzzy Hash: 06f03b70aea99bbb4727b2088b00ece9a519a043ed685e2e0b532f4ea5d8c498
                      • Instruction Fuzzy Hash: C01104B1500200AFE721CF14DD45BAABBE8EF04724F04C8AAED04CB641D778A9088BB1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010BAC6E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 4e0af473fb24308d38df81aa8bcc1f7fcd9866525724a89bcdae3bdbbb2ca847
                      • Instruction ID: bd0b2dcfd49537d638787ba2624fb9b3643ba164253c70fa06d2b54877e8cd1a
                      • Opcode Fuzzy Hash: 4e0af473fb24308d38df81aa8bcc1f7fcd9866525724a89bcdae3bdbbb2ca847
                      • Instruction Fuzzy Hash: 7611B471509380AFDB228F55DC44A62FFF4EF4A320F0888DAED858B563C235A418DB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetExitCodeProcess.KERNELBASE(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 052C3570
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: CodeExitProcess
                      • String ID:
                      • API String ID: 3861947596-0
                      • Opcode ID: 0a74d568b2a2d14a8c718400883ca679ad3df82cd74079d73b2e474dc9e6d161
                      • Instruction ID: 0bde6440d350b070f2965eea8c2954f28a23d5241bcf9e165227819d0deb667c
                      • Opcode Fuzzy Hash: 0a74d568b2a2d14a8c718400883ca679ad3df82cd74079d73b2e474dc9e6d161
                      • Instruction Fuzzy Hash: CF11E7715002009FEB21CB15DD45BAABBE8EF04624F04C8AAED05DB741D678E9088AB1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ReadFile.KERNELBASE(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 010BBA55
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: FileRead
                      • String ID:
                      • API String ID: 2738559852-0
                      • Opcode ID: 78e974c057ece1dce78c5377978f5dc002cf75ebcca00097e990fde42895814f
                      • Instruction ID: f53699b64d513324fd529d241118c18163e9cf2049482d645103f1b751de4357
                      • Opcode Fuzzy Hash: 78e974c057ece1dce78c5377978f5dc002cf75ebcca00097e990fde42895814f
                      • Instruction Fuzzy Hash: 4211C871500300AFE731CF55DD84FAAFBE8EF04724F04C86AE9859B651C775A5098BB1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 052C0E9A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: Connect
                      • String ID:
                      • API String ID: 3144859779-0
                      • Opcode ID: cedeea4d3c21a2cb4065f8fce0bdac30d673104016600e77bb6c7784551dc782
                      • Instruction ID: 30dcad123c5f58a5df16a09d6f07247c64d7f335f03e1dc7a66635e8c6ae87ee
                      • Opcode Fuzzy Hash: cedeea4d3c21a2cb4065f8fce0bdac30d673104016600e77bb6c7784551dc782
                      • Instruction Fuzzy Hash: E22190715093809FDB21CF55DC84A52FFF4FF06220F09899EE9898B662D375A858CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ioctlsocket.WS2_32(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 052C2283
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: ioctlsocket
                      • String ID:
                      • API String ID: 3577187118-0
                      • Opcode ID: b249bbd39d5fdbe1afeea456704263deee8396504c261c23bb375a29a2b3d9cf
                      • Instruction ID: 7cd996339b32f07f5d653dcee8984a333d9f6b09e8151213bcf22c28d69b2656
                      • Opcode Fuzzy Hash: b249bbd39d5fdbe1afeea456704263deee8396504c261c23bb375a29a2b3d9cf
                      • Instruction Fuzzy Hash: 4711E375500200AFEB31CF54DD44FAAFBE8EF44724F04C8AAE9859B641C778A5088AB2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • shutdown.WS2_32(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 052C0660
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: shutdown
                      • String ID:
                      • API String ID: 2510479042-0
                      • Opcode ID: 9645d51b5ea462b45f0048a3ccd2311fb629e095f693c82692156c22da3cd589
                      • Instruction ID: ff3387a414f6eafd6327a72f0c1e8bdb9e4a2cfa56127fc6901d74c1dfb89917
                      • Opcode Fuzzy Hash: 9645d51b5ea462b45f0048a3ccd2311fb629e095f693c82692156c22da3cd589
                      • Instruction Fuzzy Hash: 6411C671500200AFEB21DF15DD84BAABBE8EF44724F14C8AAED449F641D778A5498AB1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegDeleteKeyW.ADVAPI32(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 052C38E8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: Delete
                      • String ID:
                      • API String ID: 1035893169-0
                      • Opcode ID: fbd835725bd77674bc05fb8904b48fbf982d5c2a905fc61eecefb4914e9c76ba
                      • Instruction ID: 6743f3bdb8ac4e21f1bda467a60768a5aa21943a726f90c3b91f474c71101b8d
                      • Opcode Fuzzy Hash: fbd835725bd77674bc05fb8904b48fbf982d5c2a905fc61eecefb4914e9c76ba
                      • Instruction Fuzzy Hash: DC11C272510200AFE720DA05DD85FA6BBECEF14624F04C9AAE9059B742D778E9088AB1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetErrorMode.KERNELBASE(?), ref: 010BA30C
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: ErrorMode
                      • String ID:
                      • API String ID: 2340568224-0
                      • Opcode ID: be4b9b5d8302c11e9016cbccab97dc9c217182b6e6c05132a045ee72287cd1f8
                      • Instruction ID: 053909cc6d6d38d0dc0ad519c2b01b09c8613fccd2e4302d55b3a003c7361a49
                      • Opcode Fuzzy Hash: be4b9b5d8302c11e9016cbccab97dc9c217182b6e6c05132a045ee72287cd1f8
                      • Instruction Fuzzy Hash: A71191715093C0AFDB238B15DC946A2BFB4DF47624F0980CBED848F663D266A848C772
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • PostMessageW.USER32(?,?,?,?), ref: 052C4009
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: MessagePost
                      • String ID:
                      • API String ID: 410705778-0
                      • Opcode ID: 0eac98ce5e7f3c75e0d4f74b63860a1b87c2e0d1e1de10d76806aa7ed43d5c15
                      • Instruction ID: f5163869b6bcfa3f83383d6b8a492d60f3c82a8b53341d3a14fc34f4d9517452
                      • Opcode Fuzzy Hash: 0eac98ce5e7f3c75e0d4f74b63860a1b87c2e0d1e1de10d76806aa7ed43d5c15
                      • Instruction Fuzzy Hash: 5C1104715093809FDB228F11DC44A52FFB4EF06220F08C4DEED858B663C275A818CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryA.KERNELBASE(?,00000E24), ref: 052C130B
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 5542bfa0207e87fc7c1e2aef38e0d98f4fe37e13432b9f32ede2549675bd815c
                      • Instruction ID: 3dfcdf6a7f67f734a94cb613e5042ed92d1409ee0f2565ad7c08f6b3f0c7c2c5
                      • Opcode Fuzzy Hash: 5542bfa0207e87fc7c1e2aef38e0d98f4fe37e13432b9f32ede2549675bd815c
                      • Instruction Fuzzy Hash: 6B110231910200AEE720CB15DD42FB6FBA8DF04724F1484A9EE085BB82C2B9A549CAA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: select
                      • String ID:
                      • API String ID: 1274211008-0
                      • Opcode ID: 28b09a6c0833a74ed38a0bd7de45de6bb676317e667db38d4a1503e62b79b6d4
                      • Instruction ID: 023562d3f3bb91158a7861b76a29b6d89192ccb6e9c2f31a12c4b8e00dc5f78d
                      • Opcode Fuzzy Hash: 28b09a6c0833a74ed38a0bd7de45de6bb676317e667db38d4a1503e62b79b6d4
                      • Instruction Fuzzy Hash: F3116D79614244CFDB20CF15D984B62FBE8EF04620F0885AADD89CB652D774E948CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: Initialize
                      • String ID:
                      • API String ID: 2538663250-0
                      • Opcode ID: 45ba7c9c792473f503c124a605a6bea3a371f2f9224735b5450ff53c8f1bc51c
                      • Instruction ID: 6a55fbef5d1b5609fec92cb1fa52060e8f3adcf543a383c09b3690968931acad
                      • Opcode Fuzzy Hash: 45ba7c9c792473f503c124a605a6bea3a371f2f9224735b5450ff53c8f1bc51c
                      • Instruction Fuzzy Hash: 6F119D715493809FDB12CB15DC84B52BFB4EF06224F0884DAED848F693D279A808CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 052C3266
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: LookupPrivilegeValue
                      • String ID:
                      • API String ID: 3899507212-0
                      • Opcode ID: 7024b08d87f0c033912c7ce0be70cc6e0f494cc7728f0d5133605611f4bdf5a7
                      • Instruction ID: 6f71379182233f547223414799f63e68d7981e880e281c35e704b15faab71516
                      • Opcode Fuzzy Hash: 7024b08d87f0c033912c7ce0be70cc6e0f494cc7728f0d5133605611f4bdf5a7
                      • Instruction Fuzzy Hash: B111A9726142018FEB20CF19D844B56FFE8EF54620F08CDAEDD4ADB742D674E904CA62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetFileType.KERNELBASE(?,00000E24,9ECD5732,00000000,00000000,00000000,00000000), ref: 010BB789
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: FileType
                      • String ID:
                      • API String ID: 3081899298-0
                      • Opcode ID: b7646669b99675678d49a059c9e7c07011e39e211c37d8e5871e7ab34674e6ba
                      • Instruction ID: d1e38a1c7bed538e14424634dd93d2b3fdd5a834f3ea0d04b601f7f22132ea05
                      • Opcode Fuzzy Hash: b7646669b99675678d49a059c9e7c07011e39e211c37d8e5871e7ab34674e6ba
                      • Instruction Fuzzy Hash: AE01C071540200AFE721CB19DD85BAAF7E8EF04624F08C4A6EE449BB41D778E9498AA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 052C0E9A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: Connect
                      • String ID:
                      • API String ID: 3144859779-0
                      • Opcode ID: 78c4f193cd251fbff75d802dea8f401632cadca98c66a796e9bfba619d52f13d
                      • Instruction ID: b6668f8a735422823b7427effc7ff23cf56bb7fef54c547f4b315bf6249feb5d
                      • Opcode Fuzzy Hash: 78c4f193cd251fbff75d802dea8f401632cadca98c66a796e9bfba619d52f13d
                      • Instruction Fuzzy Hash: 3A117C75510600DFDB20CF55D988B66FBE5FF09320F08C9AADD898BA22D375E458CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • DispatchMessageW.USER32(?), ref: 052C3EB0
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: DispatchMessage
                      • String ID:
                      • API String ID: 2061451462-0
                      • Opcode ID: f0308041767b9137e80e5ca175851446863aafc8938aa5ca7c47821d04f05b03
                      • Instruction ID: a25a602116d9152080c7f94d5d9d12350765e76a02a07e2c2e29dd9552516fe7
                      • Opcode Fuzzy Hash: f0308041767b9137e80e5ca175851446863aafc8938aa5ca7c47821d04f05b03
                      • Instruction Fuzzy Hash: DA11A171509384AFD7128B15DC44B62FFB4EF46624F08C4CAED858B653D275A808CB72
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetVolumeInformationA.KERNELBASE(?,00000E24,?,?), ref: 052C1066
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: InformationVolume
                      • String ID:
                      • API String ID: 2039140958-0
                      • Opcode ID: bfa5069489e3f040cd1ad557ffd5b31976ac0252218f715ad109c4912b26d803
                      • Instruction ID: 1d4675429d85c6d094abe03eae3becd27511a3fe94ae34afaf87f137df27a0fd
                      • Opcode Fuzzy Hash: bfa5069489e3f040cd1ad557ffd5b31976ac0252218f715ad109c4912b26d803
                      • Instruction Fuzzy Hash: 3E01B171600200AFD310DF16DD46B66FBE8FB88A20F14852AED089BB41D735F955CBE1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryShim.MSCOREE(?,?,?,?), ref: 052C28E5
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: LibraryLoadShim
                      • String ID:
                      • API String ID: 1475914169-0
                      • Opcode ID: b2517dc3b8b4f6b4923e77bba5fd6015439acef22f67fb436ac95b6c23ea1a61
                      • Instruction ID: 54e190b9fe7a32ee24f19f7f7a7809253afd6622a1c2a31372519a9c728bc4ae
                      • Opcode Fuzzy Hash: b2517dc3b8b4f6b4923e77bba5fd6015439acef22f67fb436ac95b6c23ea1a61
                      • Instruction Fuzzy Hash: BC016D75514200DFDB20CE19D984B22FBE4EF04620F08C6AADD898B752D675E448CB71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010BAC6E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 3e16e0257fa8e21270111e5ed1e847faeb106c6f0a013bc3e438f07d9683ac0b
                      • Instruction ID: 03a564af37ca1e12b6f115dd6c2a75132e8fa704eae9fe3b6495c022dc64a0e2
                      • Opcode Fuzzy Hash: 3e16e0257fa8e21270111e5ed1e847faeb106c6f0a013bc3e438f07d9683ac0b
                      • Instruction Fuzzy Hash: 9B016132500604DFDB21CF55D984B66FBE0EF48720F08C9AADD894BA56C375E418DF61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • FindCloseChangeNotification.KERNELBASE(?), ref: 010BA780
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: ChangeCloseFindNotification
                      • String ID:
                      • API String ID: 2591292051-0
                      • Opcode ID: 48bc1accac90dff17af1deedce40cd46de00ee833c30b9c950377661c5f31738
                      • Instruction ID: c634e6ea9b0b3ef8fb4d9d6d7e7c46297df6c008fb0e7c03f1e1c229dc70351e
                      • Opcode Fuzzy Hash: 48bc1accac90dff17af1deedce40cd46de00ee833c30b9c950377661c5f31738
                      • Instruction Fuzzy Hash: 9F01D471604200DFEB10CF19DD847A6FBE4EF04220F08C4ABDD868FB42D679E448CAA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 010BBC12
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: b16ef9e5350d08f11511d27e83fb9bf23a968267f33df670c93310b5083c8c7d
                      • Instruction ID: 0a351c51ab79452308f96bebce8c15aed04f9e32d952bbeb713b0005e79c84df
                      • Opcode Fuzzy Hash: b16ef9e5350d08f11511d27e83fb9bf23a968267f33df670c93310b5083c8c7d
                      • Instruction Fuzzy Hash: 4E01A271500200ABD210DF1ADD46B66FBE8FB88A20F14811AED089BB41D775F956CBE5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • setsockopt.WS2_32(?,?,?,?,?), ref: 010BBDA0
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: setsockopt
                      • String ID:
                      • API String ID: 3981526788-0
                      • Opcode ID: 85afd3e60da91f7d33f1c2e5954fabb9a4b039eefb249079c102ec833be0130d
                      • Instruction ID: 4a81e739c5cc347a1b1de7572a757df6ade51496728dc49f5042c3433311e450
                      • Opcode Fuzzy Hash: 85afd3e60da91f7d33f1c2e5954fabb9a4b039eefb249079c102ec833be0130d
                      • Instruction Fuzzy Hash: 5C019232500200DFDB21DF55D984B96FBE0EF04320F08C8AADD854BA12D379E458CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetComputerNameW.KERNEL32(?,00000E24,?,?), ref: 052C0082
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: ComputerName
                      • String ID:
                      • API String ID: 3545744682-0
                      • Opcode ID: 4a177dd9947a8bb4eace30fc61d271066713873fe215ecbfad425e4047535625
                      • Instruction ID: 8950e16d9e6ed7a6ee584c9809adcc654f50c3030d09cd6f99b9b88f4d029f28
                      • Opcode Fuzzy Hash: 4a177dd9947a8bb4eace30fc61d271066713873fe215ecbfad425e4047535625
                      • Instruction Fuzzy Hash: 3801D671500200AFD310DF1ADD46B66FBE8FB88A20F148159ED089BB41D775F956CBE5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RegEnumValueW.KERNELBASE(?,00000E24,?,?), ref: 052C383E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: EnumValue
                      • String ID:
                      • API String ID: 2814608202-0
                      • Opcode ID: f4b966fae24f6d98a17aa1027ae51e646546b4931f0833ab7dd05c3eb089b954
                      • Instruction ID: d1bc0fea7d568e6aab2739243e3849a8deae667f2f1ef482a197ec161705bd7e
                      • Opcode Fuzzy Hash: f4b966fae24f6d98a17aa1027ae51e646546b4931f0833ab7dd05c3eb089b954
                      • Instruction Fuzzy Hash: 4F01A271500200ABD210DF1ADD46B66FBE8FB88A20F14811AED089BB41D775F956CBE5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: send
                      • String ID:
                      • API String ID: 2809346765-0
                      • Opcode ID: c4b197d2fa97073e6ea7b4d2cb136b478dc2de290ce15ffdbcda25283a233392
                      • Instruction ID: 6d015e60f0c7b45a3dc9044bda6c4fbbd937925c92e3919d23f6fdb0cb1d5395
                      • Opcode Fuzzy Hash: c4b197d2fa97073e6ea7b4d2cb136b478dc2de290ce15ffdbcda25283a233392
                      • Instruction Fuzzy Hash: 38019231504240DFDB60CF59D984B96FBE0EF04320F08C8AADD854BA12C279A448CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • PostMessageW.USER32(?,?,?,?), ref: 052C4009
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: MessagePost
                      • String ID:
                      • API String ID: 410705778-0
                      • Opcode ID: d201138cddde56a5e5cbad53b796d85cfc5fb9a5c95ebb74777b15089fc4f37a
                      • Instruction ID: 4159caff03f6032af34a6f2fec8a36eff83999c43906ae4b21be24f7c1b0f1b9
                      • Opcode Fuzzy Hash: d201138cddde56a5e5cbad53b796d85cfc5fb9a5c95ebb74777b15089fc4f37a
                      • Instruction Fuzzy Hash: 2401BC32910200CFEB209F15D884B66FFE0EF04325F08C5AEDE494BA62C675E458CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: Initialize
                      • String ID:
                      • API String ID: 2538663250-0
                      • Opcode ID: dfdbee3b325e1d6920b38f294423322d2fd1c24c887015cad48c3e02d8abb254
                      • Instruction ID: 46a84a556c1608e9c8b3a390d69d3c49e2ab954241af91cca751b2dc4081292a
                      • Opcode Fuzzy Hash: dfdbee3b325e1d6920b38f294423322d2fd1c24c887015cad48c3e02d8abb254
                      • Instruction Fuzzy Hash: 5401D671A00240DFDB20CF19D9847A6FBE4EF44320F08C4AADD899F756D279E448CAA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • PostMessageW.USER32(?,?,?,?), ref: 052C3C1D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: MessagePost
                      • String ID:
                      • API String ID: 410705778-0
                      • Opcode ID: 9a899118941b86b794c8afa25cd4a146d232674586f9fddb45bc1ad7207ad8e7
                      • Instruction ID: 1f09d5ea5549aec6c1a41f0fd99596a8e13d9a1c22e75d7afc5e726eefce0988
                      • Opcode Fuzzy Hash: 9a899118941b86b794c8afa25cd4a146d232674586f9fddb45bc1ad7207ad8e7
                      • Instruction Fuzzy Hash: DE017C32410240DFDB20CF05D985B65FFE1FF14620F18C9AEDD494AA52C276E558CAA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetErrorMode.KERNELBASE(?), ref: 010BA30C
                      Memory Dump Source
                      • Source File: 00000000.00000002.2476763037.00000000010BA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010BA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ba000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: ErrorMode
                      • String ID:
                      • API String ID: 2340568224-0
                      • Opcode ID: 4c7794f9a95af781e9e3fef44e1200c88f69c52711ba746a4287b2bbc4a3e4b8
                      • Instruction ID: 3bf3492d22e9d54016da2e9ae04bb0dca27588cef41dfe77542e6433b598add3
                      • Opcode Fuzzy Hash: 4c7794f9a95af781e9e3fef44e1200c88f69c52711ba746a4287b2bbc4a3e4b8
                      • Instruction Fuzzy Hash: 16F0A475505240CFDB20CF09D9847A5FBE0EF04A24F08C0AADD454F752D3B9E448CA62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • DispatchMessageW.USER32(?), ref: 052C3EB0
                      Memory Dump Source
                      • Source File: 00000000.00000002.2479927522.00000000052C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52c0000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID: DispatchMessage
                      • String ID:
                      • API String ID: 2061451462-0
                      • Opcode ID: c813f58a8d36a560a36bc7d27a1c442b3fc9bb5ef1b8daaf36b127a4cb88eda9
                      • Instruction ID: f80a6cad7caea7516eb6d71c3ba2555e4f9b7a0e6f3c7ed24e30a82bfe06c900
                      • Opcode Fuzzy Hash: c813f58a8d36a560a36bc7d27a1c442b3fc9bb5ef1b8daaf36b127a4cb88eda9
                      • Instruction Fuzzy Hash: 33F08C359142448FDB20CF05D984B62FFE0EF15624F08C9EADD494BB52D2B9A448CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2477521088.0000000001430000.00000040.00000020.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1430000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f78ba6f152ca2456b9ccb7a0846d093fec3e5cfb301d49647b4ea18d7a63606a
                      • Instruction ID: 944ebd0e071f2d4e91d8b229e4cc89424213eac4fc1bad8f1cc626a5402918b2
                      • Opcode Fuzzy Hash: f78ba6f152ca2456b9ccb7a0846d093fec3e5cfb301d49647b4ea18d7a63606a
                      • Instruction Fuzzy Hash: 6C311E3414E3C08FC7178B2489607557FB1AF47614F1D86DBD8858F6A3C239981AD762
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2480262197.0000000005770000.00000040.00000800.00020000.00000000.sdmp, Offset: 05770000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5770000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 653d626ea530183e808c068113ce7fb49819bfd05fd5d2f9aadc56c2b47abe83
                      • Instruction ID: b856ce67ada596a7979b67db5c32cf839ccfe1b0fcb17a4c11108a714dc56689
                      • Opcode Fuzzy Hash: 653d626ea530183e808c068113ce7fb49819bfd05fd5d2f9aadc56c2b47abe83
                      • Instruction Fuzzy Hash: 5311C9B5948341AFD350CF19D880A5BFBE4FB88664F14896EF998D7311D235E9088FA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2477521088.0000000001430000.00000040.00000020.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1430000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fd1397426344945601be3cd36346de19e63f1cc88174b3bf917048ad1027d300
                      • Instruction ID: 7ca4d8037c0d77a53f75bbb913121d9f00bc534598ae576b1997a3a87abce67e
                      • Opcode Fuzzy Hash: fd1397426344945601be3cd36346de19e63f1cc88174b3bf917048ad1027d300
                      • Instruction Fuzzy Hash: 6311A230204280DFD719CB14D540B16BBA5ABCC718F24CAAEE5491BB63C77BD853CA91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2480262197.0000000005770000.00000040.00000800.00020000.00000000.sdmp, Offset: 05770000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5770000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 81388e343b9943d4957b5ba2723149d91e3450835af642b38c2753c6bddaad60
                      • Instruction ID: 1d9ee8e264be003123db5a0c0417d485d63352ae64e7aeae4ed3712f43ea133f
                      • Opcode Fuzzy Hash: 81388e343b9943d4957b5ba2723149d91e3450835af642b38c2753c6bddaad60
                      • Instruction Fuzzy Hash: ED11FEB5508301AFD350CF09DC80E57FBE8EB88660F14892EF95897711D235E9088FA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2476871383.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ca000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 727387f9c2007519eff3fef4efc15dc4633f0453438c3cf0dc9eb2414f731fda
                      • Instruction ID: 5a2a36ee79ffc7047a02f14c4781c04c3a996e096ed2edb5d2753c551bd6345c
                      • Opcode Fuzzy Hash: 727387f9c2007519eff3fef4efc15dc4633f0453438c3cf0dc9eb2414f731fda
                      • Instruction Fuzzy Hash: D311FEB5548301AFD350CF09DC40E57FBE8EB88660F14892EF95897711D235E9088FA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2477521088.0000000001430000.00000040.00000020.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1430000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 35fb5661cec4669a538950135271f953f74cd00ddb81a36d38b8350c873386fd
                      • Instruction ID: bf7326feb3a162dd4e997e3cd14e87f9c63245449a04c3986858cdc95414356b
                      • Opcode Fuzzy Hash: 35fb5661cec4669a538950135271f953f74cd00ddb81a36d38b8350c873386fd
                      • Instruction Fuzzy Hash: 3A0162755497809FC7118F19AC41892BBE8EF4663070984ABED498B612C235A959CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2477521088.0000000001430000.00000040.00000020.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1430000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 74b9f174851936b42c91253ba0377f3a0e724fe011995a5d7daf0febe73ee2ff
                      • Instruction ID: 70b825e357d72134cee76062946a89f55afa039a8b4e6deef2ea5d5dcc158ef4
                      • Opcode Fuzzy Hash: 74b9f174851936b42c91253ba0377f3a0e724fe011995a5d7daf0febe73ee2ff
                      • Instruction Fuzzy Hash: DBF0BB35144644DFC716CB44D540B16FBA2EB89718F24CAADE94917B62C737D813DA81
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2477521088.0000000001430000.00000040.00000020.00020000.00000000.sdmp, Offset: 01430000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1430000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ca7b7a956808c8d8e05bc7bce81307601f2dea4fb329f749c1666dc5fa4a39c5
                      • Instruction ID: 8f5fc919a2d15ffc8575e3ddffff3db819a993526b59de1ff4e742ff94136a9f
                      • Opcode Fuzzy Hash: ca7b7a956808c8d8e05bc7bce81307601f2dea4fb329f749c1666dc5fa4a39c5
                      • Instruction Fuzzy Hash: F6E092B66006008B9650CF0AFC81452F7D8EB88630718C47FDC0D8B711D23AB948CAA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2480262197.0000000005770000.00000040.00000800.00020000.00000000.sdmp, Offset: 05770000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5770000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1acd7daedafc13b4aa70eb6bbc80995a5b02767d826f76137ccfc44f3c8361c2
                      • Instruction ID: cb436693c8fcf19ff17a11ea8a676ddd50d634929fd1313af25dcff3baba96b7
                      • Opcode Fuzzy Hash: 1acd7daedafc13b4aa70eb6bbc80995a5b02767d826f76137ccfc44f3c8361c2
                      • Instruction Fuzzy Hash: 2EE0D8B255020067D210DE06AC46F53FBD8DB40A30F14C467ED085B701D176B514C9E1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2480262197.0000000005770000.00000040.00000800.00020000.00000000.sdmp, Offset: 05770000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5770000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 00ee28dd77dad7264a6d00e667fc729d2aa84d773cbad29bf866f413dbb376d2
                      • Instruction ID: 3c53c744c5b494a8d0fdff288f0034b6f6f8cb99ff3a2e3cae6d23bef52107ec
                      • Opcode Fuzzy Hash: 00ee28dd77dad7264a6d00e667fc729d2aa84d773cbad29bf866f413dbb376d2
                      • Instruction Fuzzy Hash: 36E0D8B254020467D2509E06AC85F53FBD8DB40A31F14C567ED081B702D176B50489F1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2480262197.0000000005770000.00000040.00000800.00020000.00000000.sdmp, Offset: 05770000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_5770000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5fbc330596482f8c7c49d1b7e0d58bb0f91b0f675d681188c08c7467e39b3768
                      • Instruction ID: 02d8e172de874391adbcaa5c836ef888d20a306e29a18446a2a65efba9fa2c50
                      • Opcode Fuzzy Hash: 5fbc330596482f8c7c49d1b7e0d58bb0f91b0f675d681188c08c7467e39b3768
                      • Instruction Fuzzy Hash: F9E0D8B255020067D2108E06AC45F52FBDCDB54A31F14C467ED081B741D176B51889E1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2476871383.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10ca000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4ba0e4d0a9e3e854ec24eb67ab82acea018b67010adbdf5178e55dbeeefefd87
                      • Instruction ID: 060de3885bf1e786092d5537c9e00760ddefe8282006f67548e6e0576b964492
                      • Opcode Fuzzy Hash: 4ba0e4d0a9e3e854ec24eb67ab82acea018b67010adbdf5178e55dbeeefefd87
                      • Instruction Fuzzy Hash: 91E0D8B2540204A7D2108E06AC45F62F7D8DB54A31F14C567ED085B702D176B50489F1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2476714408.00000000010B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B2000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10b2000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a8ff6188f22d350e96afd4e1f3c46b1a25d79bc6068f1b38b1c1d7acd4d26407
                      • Instruction ID: fd27fafc747675fecac3b3e3c377e3c124cc274b0008a96e191afa0256f742c2
                      • Opcode Fuzzy Hash: a8ff6188f22d350e96afd4e1f3c46b1a25d79bc6068f1b38b1c1d7acd4d26407
                      • Instruction Fuzzy Hash: A7D02E79200AC04FE3228A0CC2A4BC53FE4AF40704F0A04F9A840CBB63CB2CE5C0C200
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2476714408.00000000010B2000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B2000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_10b2000_xuI8pQHlxExL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f24676892c9361de50bf2c45b6845837d7e7d58ce114a9ca81b4a9f707a1997a
                      • Instruction ID: 55479f43bcab5be59d98ecd5fc6947eed9b9b7afa6095328cb11a298bc08cb51
                      • Opcode Fuzzy Hash: f24676892c9361de50bf2c45b6845837d7e7d58ce114a9ca81b4a9f707a1997a
                      • Instruction Fuzzy Hash: 19D05E342012814BD725DA0CC2D4F997BD4AB44B14F0684F8AC508B762C7B4E8C0DA00
                      Uniqueness

                      Uniqueness Score: -1.00%