Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
UtfPLaHG.exe

Overview

General Information

Sample name:UtfPLaHG.exe
Analysis ID:1432606
MD5:6a44a61f22c1f94581fe84ce077c8bc3
SHA1:0af9823081a8ac7dab63fdbc1c4360508f5ed074
SHA256:5ef1ff8185f56af614f482d00c32b2112483b0e7900b282fb28200dbe8b0cb87
Tags:exenjRat
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Njrat
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Disables zone checking for all users
Machine Learning detection for sample
Modifies the windows firewall
Sigma detected: Potentially Suspicious Malware Callback Communication
Uses dynamic DNS services
Uses netsh to modify the Windows network and firewall settings
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Detected TCP or UDP traffic on non-standard ports
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • UtfPLaHG.exe (PID: 7032 cmdline: "C:\Users\user\Desktop\UtfPLaHG.exe" MD5: 6A44A61F22C1F94581FE84CE077C8BC3)
    • netsh.exe (PID: 7156 cmdline: netsh firewall add allowedprogram "C:\Users\user\Desktop\UtfPLaHG.exe" "UtfPLaHG.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
      • conhost.exe (PID: 6336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Host": "asero23.ddns.net", "Port": "5552", "Version": "0.7d", "Campaign ID": "MyBot", "Install Name": "WindowsServices.exe", "Install Dir": "TEMP", "Network Seprator": "|'|'|"}
SourceRuleDescriptionAuthorStrings
UtfPLaHG.exeJoeSecurity_NjratYara detected NjratJoe Security
    UtfPLaHG.exeWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0x3c9a:$a1: get_Registry
    • 0x4d74:$a2: SEE_MASK_NOZONECHECKS
    • 0x4e70:$a3: Download ERROR
    • 0x4d36:$a4: cmd.exe /c ping 0 -n 2 & del "
    • 0x4cc8:$a5: netsh firewall delete allowedprogram "
    UtfPLaHG.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
    • 0x4d36:$x1: cmd.exe /c ping 0 -n 2 & del "
    • 0x4e8e:$s3: Executed As
    • 0x4e70:$s6: Download ERROR
    UtfPLaHG.exenjrat1Identify njRatBrian Wallace @botnet_hunter
    • 0x4da4:$a1: netsh firewall add allowedprogram
    • 0x4d74:$a2: SEE_MASK_NOZONECHECKS
    • 0x501e:$b1: [TAP]
    • 0x4d36:$c3: cmd.exe /c ping
    UtfPLaHG.exeNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
    • 0x4d74:$reg: SEE_MASK_NOZONECHECKS
    • 0x4e4c:$msg: Execute ERROR
    • 0x4ea8:$msg: Execute ERROR
    • 0x4d36:$ping: cmd.exe /c ping 0 -n 2 & del
    Click to see the 1 entries
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1616392139.0000000000C92000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
      00000000.00000000.1616392139.0000000000C92000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
      • 0x3a9a:$a1: get_Registry
      • 0x4b74:$a2: SEE_MASK_NOZONECHECKS
      • 0x4c70:$a3: Download ERROR
      • 0x4b36:$a4: cmd.exe /c ping 0 -n 2 & del "
      • 0x4ac8:$a5: netsh firewall delete allowedprogram "
      00000000.00000000.1616392139.0000000000C92000.00000002.00000001.01000000.00000003.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
      • 0x4ba4:$a1: netsh firewall add allowedprogram
      • 0x4b74:$a2: SEE_MASK_NOZONECHECKS
      • 0x4e1e:$b1: [TAP]
      • 0x4b36:$c3: cmd.exe /c ping
      00000000.00000000.1616392139.0000000000C92000.00000002.00000001.01000000.00000003.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
      • 0x4b74:$reg: SEE_MASK_NOZONECHECKS
      • 0x4c4c:$msg: Execute ERROR
      • 0x4ca8:$msg: Execute ERROR
      • 0x4b36:$ping: cmd.exe /c ping 0 -n 2 & del
      00000000.00000002.4081592327.00000000033E1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
        Click to see the 1 entries
        SourceRuleDescriptionAuthorStrings
        0.0.UtfPLaHG.exe.c90000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
          0.0.UtfPLaHG.exe.c90000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
          • 0x3c9a:$a1: get_Registry
          • 0x4d74:$a2: SEE_MASK_NOZONECHECKS
          • 0x4e70:$a3: Download ERROR
          • 0x4d36:$a4: cmd.exe /c ping 0 -n 2 & del "
          • 0x4cc8:$a5: netsh firewall delete allowedprogram "
          0.0.UtfPLaHG.exe.c90000.0.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
          • 0x4d36:$x1: cmd.exe /c ping 0 -n 2 & del "
          • 0x4e8e:$s3: Executed As
          • 0x4e70:$s6: Download ERROR
          0.0.UtfPLaHG.exe.c90000.0.unpacknjrat1Identify njRatBrian Wallace @botnet_hunter
          • 0x4da4:$a1: netsh firewall add allowedprogram
          • 0x4d74:$a2: SEE_MASK_NOZONECHECKS
          • 0x501e:$b1: [TAP]
          • 0x4d36:$c3: cmd.exe /c ping
          0.0.UtfPLaHG.exe.c90000.0.unpackNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
          • 0x4d74:$reg: SEE_MASK_NOZONECHECKS
          • 0x4e4c:$msg: Execute ERROR
          • 0x4ea8:$msg: Execute ERROR
          • 0x4d36:$ping: cmd.exe /c ping 0 -n 2 & del
          Click to see the 1 entries

          System Summary

          barindex
          Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 178.128.228.252, DestinationIsIpv6: false, DestinationPort: 5552, EventID: 3, Image: C:\Users\user\Desktop\UtfPLaHG.exe, Initiated: true, ProcessId: 7032, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: UtfPLaHG.exeAvira: detected
          Source: 00000000.00000000.1616392139.0000000000C92000.00000002.00000001.01000000.00000003.sdmpMalware Configuration Extractor: Njrat {"Host": "asero23.ddns.net", "Port": "5552", "Version": "0.7d", "Campaign ID": "MyBot", "Install Name": "WindowsServices.exe", "Install Dir": "TEMP", "Network Seprator": "|'|'|"}
          Source: UtfPLaHG.exeReversingLabs: Detection: 92%
          Source: UtfPLaHG.exeVirustotal: Detection: 81%Perma Link
          Source: Yara matchFile source: UtfPLaHG.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.UtfPLaHG.exe.c90000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1616392139.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.4081592327.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: UtfPLaHG.exe PID: 7032, type: MEMORYSTR
          Source: UtfPLaHG.exeJoe Sandbox ML: detected
          Source: UtfPLaHG.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: C:\Users\user\Desktop\UtfPLaHG.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
          Source: UtfPLaHG.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Networking

          barindex
          Source: Malware configuration extractorURLs: asero23.ddns.net
          Source: unknownDNS query: name: asero23.ddns.net
          Source: global trafficTCP traffic: 192.168.2.4:49730 -> 178.128.228.252:5552
          Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: asero23.ddns.net

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: UtfPLaHG.exe, kl.cs.Net Code: VKCodeToUnicode

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: UtfPLaHG.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.UtfPLaHG.exe.c90000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1616392139.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.4081592327.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: UtfPLaHG.exe PID: 7032, type: MEMORYSTR

          System Summary

          barindex
          Source: UtfPLaHG.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
          Source: UtfPLaHG.exe, type: SAMPLEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
          Source: UtfPLaHG.exe, type: SAMPLEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
          Source: UtfPLaHG.exe, type: SAMPLEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
          Source: UtfPLaHG.exe, type: SAMPLEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
          Source: 0.0.UtfPLaHG.exe.c90000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
          Source: 0.0.UtfPLaHG.exe.c90000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
          Source: 0.0.UtfPLaHG.exe.c90000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
          Source: 0.0.UtfPLaHG.exe.c90000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
          Source: 0.0.UtfPLaHG.exe.c90000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
          Source: 00000000.00000000.1616392139.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
          Source: 00000000.00000000.1616392139.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
          Source: 00000000.00000000.1616392139.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess Stats: CPU usage > 49%
          Source: UtfPLaHG.exe, 00000000.00000002.4081103091.000000000140E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs UtfPLaHG.exe
          Source: UtfPLaHG.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: UtfPLaHG.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
          Source: UtfPLaHG.exe, type: SAMPLEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: UtfPLaHG.exe, type: SAMPLEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
          Source: UtfPLaHG.exe, type: SAMPLEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
          Source: UtfPLaHG.exe, type: SAMPLEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
          Source: 0.0.UtfPLaHG.exe.c90000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
          Source: 0.0.UtfPLaHG.exe.c90000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.0.UtfPLaHG.exe.c90000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
          Source: 0.0.UtfPLaHG.exe.c90000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
          Source: 0.0.UtfPLaHG.exe.c90000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
          Source: 00000000.00000000.1616392139.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
          Source: 00000000.00000000.1616392139.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
          Source: 00000000.00000000.1616392139.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
          Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@4/1@4/1
          Source: C:\Users\user\Desktop\UtfPLaHG.exeCode function: 0_2_05561406 AdjustTokenPrivileges,0_2_05561406
          Source: C:\Users\user\Desktop\UtfPLaHG.exeCode function: 0_2_055613CF AdjustTokenPrivileges,0_2_055613CF
          Source: C:\Users\user\Desktop\UtfPLaHG.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6336:120:WilError_03
          Source: C:\Users\user\Desktop\UtfPLaHG.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
          Source: C:\Users\user\Desktop\UtfPLaHG.exeMutant created: \Sessions\1\BaseNamedObjects\9128200b315d4a4c00056ef78bb90712
          Source: UtfPLaHG.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: UtfPLaHG.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
          Source: C:\Users\user\Desktop\UtfPLaHG.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: UtfPLaHG.exeReversingLabs: Detection: 92%
          Source: UtfPLaHG.exeVirustotal: Detection: 81%
          Source: unknownProcess created: C:\Users\user\Desktop\UtfPLaHG.exe "C:\Users\user\Desktop\UtfPLaHG.exe"
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\Desktop\UtfPLaHG.exe" "UtfPLaHG.exe" ENABLE
          Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\Desktop\UtfPLaHG.exe" "UtfPLaHG.exe" ENABLEJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
          Source: UtfPLaHG.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: C:\Users\user\Desktop\UtfPLaHG.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
          Source: UtfPLaHG.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: UtfPLaHG.exe, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeMemory allocated: 1630000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeMemory allocated: 33E0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeMemory allocated: 1630000 memory commit | memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeWindow / User API: threadDelayed 409Jump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeWindow / User API: threadDelayed 3499Jump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeWindow / User API: threadDelayed 5557Jump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeWindow / User API: foregroundWindowGot 1770Jump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exe TID: 7012Thread sleep count: 409 > 30Jump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exe TID: 7012Thread sleep time: -409000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exe TID: 6044Thread sleep count: 3499 > 30Jump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exe TID: 7012Thread sleep count: 5557 > 30Jump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exe TID: 7012Thread sleep time: -5557000s >= -30000sJump to behavior
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: UtfPLaHG.exe, 00000000.00000002.4081103091.0000000001488000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWT
          Source: UtfPLaHG.exe, 00000000.00000002.4081103091.0000000001488000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000001.00000003.1705466615.00000000011F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: UtfPLaHG.exe, kl.csReference to suspicious API methods: MapVirtualKey(a, 0u)
          Source: UtfPLaHG.exe, kl.csReference to suspicious API methods: GetAsyncKeyState(num2)
          Source: UtfPLaHG.exe, OK.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, 100, ref lpszVer, 100)
          Source: UtfPLaHG.exe, 00000000.00000002.4081592327.000000000349D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: UtfPLaHG.exe, 00000000.00000002.4081592327.000000000349D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@9
          Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: C:\Users\user\Desktop\UtfPLaHG.exeRegistry value created: HKEY_CURRENT_USER\Environment SEE_MASK_NOZONECHECKSJump to behavior
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\Desktop\UtfPLaHG.exe" "UtfPLaHG.exe" ENABLE
          Source: C:\Users\user\Desktop\UtfPLaHG.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\Desktop\UtfPLaHG.exe" "UtfPLaHG.exe" ENABLE

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: UtfPLaHG.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.UtfPLaHG.exe.c90000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1616392139.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.4081592327.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: UtfPLaHG.exe PID: 7032, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: UtfPLaHG.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.UtfPLaHG.exe.c90000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1616392139.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.4081592327.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: UtfPLaHG.exe PID: 7032, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Native API
          1
          DLL Side-Loading
          1
          Access Token Manipulation
          2
          Virtualization/Sandbox Evasion
          1
          Input Capture
          1
          Security Software Discovery
          Remote Services1
          Input Capture
          1
          Non-Standard Port
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts2
          Process Injection
          31
          Disable or Modify Tools
          LSASS Memory2
          Virtualization/Sandbox Evasion
          Remote Desktop ProtocolData from Removable Media1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          DLL Side-Loading
          1
          Access Token Manipulation
          Security Account Manager1
          Process Discovery
          SMB/Windows Admin SharesData from Network Shared Drive21
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
          Process Injection
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Software Packing
          LSA Secrets12
          System Information Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          UtfPLaHG.exe92%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
          UtfPLaHG.exe82%VirustotalBrowse
          UtfPLaHG.exe100%AviraTR/Dropper.Gen7
          UtfPLaHG.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          asero23.ddns.net0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          asero23.ddns.net
          178.128.228.252
          truetrue
            unknown
            NameMaliciousAntivirus DetectionReputation
            asero23.ddns.nettrue
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            178.128.228.252
            asero23.ddns.netNetherlands
            14061DIGITALOCEAN-ASNUStrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1432606
            Start date and time:2024-04-27 16:33:07 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 6m 22s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:8
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:UtfPLaHG.exe
            Detection:MAL
            Classification:mal100.phis.troj.spyw.evad.winEXE@4/1@4/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 66
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240000 for current running targets taking high CPU consumption
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            16:34:39API Interceptor1041541x Sleep call for process: UtfPLaHG.exe modified
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            DIGITALOCEAN-ASNUS1B7E3FLOXC.elfGet hashmaliciousUnknownBrowse
            • 165.23.71.93
            RDFchOT4i0.exeGet hashmaliciousUnknownBrowse
            • 104.236.0.129
            https://wall.page/jcw7sZGet hashmaliciousUnknownBrowse
            • 159.89.38.40
            https://palmettoanimalclinic.aweb.page/p/0ac693e3-6f85-4fd6-86d7-f770e6e73d32Get hashmaliciousUnknownBrowse
            • 45.55.99.106
            http://www.superiorbillingsolutions.comGet hashmaliciousUnknownBrowse
            • 167.172.154.15
            https://gjyefv.degaris.com/Get hashmaliciousHTMLPhisherBrowse
            • 104.131.80.170
            https://mss.ehs2.com/?dilywvqcGet hashmaliciousUnknownBrowse
            • 157.245.93.173
            https://www.clktoro.com/feed/click/?t1=128&tid=859&uid=26&subid=remotescripps.org&id=62b00eca6d15ba41d06e054ec8234620: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 hashmaliciousUnknownBrowse
            • 142.93.240.225
            z55NF-Faturada-23042024.msiGet hashmaliciousMicroClipBrowse
            • 178.128.15.164
            http://relevanteduofficelogin.relevantedu.xyzGet hashmaliciousHTMLPhisherBrowse
            • 178.128.58.202
            No context
            No context
            Process:C:\Windows\SysWOW64\netsh.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):313
            Entropy (8bit):4.971939296804078
            Encrypted:false
            SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
            MD5:689E2126A85BF55121488295EE068FA1
            SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
            SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
            SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
            Malicious:false
            Reputation:high, very likely benign file
            Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Entropy (8bit):5.525839108348935
            TrID:
            • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
            • Win32 Executable (generic) a (10002005/4) 49.75%
            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
            • Windows Screen Saver (13104/52) 0.07%
            • Win16/32 Executable Delphi generic (2074/23) 0.01%
            File name:UtfPLaHG.exe
            File size:24'064 bytes
            MD5:6a44a61f22c1f94581fe84ce077c8bc3
            SHA1:0af9823081a8ac7dab63fdbc1c4360508f5ed074
            SHA256:5ef1ff8185f56af614f482d00c32b2112483b0e7900b282fb28200dbe8b0cb87
            SHA512:295777a065601060e88afdeda7316d2ae422d5e3d371f1fb9e5c9b3cd3d800536c9739104ddc9bd7185d3de3cc0131b28d8ae4fb403aae761b47460a277a5395
            SSDEEP:384:mQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZARr:x5yBVd7Rpcnud
            TLSH:D8B2094E3FA98856C5AC1B74C6B5965003B491870413EE2FCCC954CBAFB3BD92D48AF9
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....,f.................V...........t... ........@.. ....................................@................................
            Icon Hash:90cececece8e8eb0
            Entrypoint:0x40748e
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Time Stamp:0x662CDCBA [Sat Apr 27 11:08:42 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
            Instruction
            jmp dword ptr [00402000h]
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x74380x53.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000x240.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0xa0000xc.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x20000x54940x56000308d8b9b31be958f21ea2166cc7aeb2False0.4887354651162791data5.57259259197427IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rsrc0x80000x2400x4000243c9a7f8755f2c2b18037cdad6cc91False0.310546875data4.966081339698093IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0xa0000xc0x2008f9fb76ec87ec8b0a5110a8a33506bf3False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_MANIFEST0x80580x1e7XML 1.0 document, ASCII text, with CRLF line terminators0.5338809034907598
            DLLImport
            mscoree.dll_CorExeMain
            TimestampSource PortDest PortSource IPDest IP
            Apr 27, 2024 16:34:05.675024033 CEST497305552192.168.2.4178.128.228.252
            Apr 27, 2024 16:34:06.685626030 CEST497305552192.168.2.4178.128.228.252
            Apr 27, 2024 16:34:08.701191902 CEST497305552192.168.2.4178.128.228.252
            Apr 27, 2024 16:34:12.717082024 CEST497305552192.168.2.4178.128.228.252
            Apr 27, 2024 16:34:20.732357025 CEST497305552192.168.2.4178.128.228.252
            Apr 27, 2024 16:34:29.985254049 CEST497365552192.168.2.4178.128.228.252
            Apr 27, 2024 16:34:30.982383013 CEST497365552192.168.2.4178.128.228.252
            Apr 27, 2024 16:34:32.982388973 CEST497365552192.168.2.4178.128.228.252
            Apr 27, 2024 16:34:36.982400894 CEST497365552192.168.2.4178.128.228.252
            Apr 27, 2024 16:34:44.982410908 CEST497365552192.168.2.4178.128.228.252
            Apr 27, 2024 16:34:52.999284983 CEST497385552192.168.2.4178.128.228.252
            Apr 27, 2024 16:34:53.998127937 CEST497385552192.168.2.4178.128.228.252
            Apr 27, 2024 16:34:56.013648987 CEST497385552192.168.2.4178.128.228.252
            Apr 27, 2024 16:35:00.029382944 CEST497385552192.168.2.4178.128.228.252
            Apr 27, 2024 16:35:08.045067072 CEST497385552192.168.2.4178.128.228.252
            Apr 27, 2024 16:35:16.155612946 CEST497395552192.168.2.4178.128.228.252
            Apr 27, 2024 16:35:17.232426882 CEST497395552192.168.2.4178.128.228.252
            Apr 27, 2024 16:35:19.317573071 CEST497395552192.168.2.4178.128.228.252
            Apr 27, 2024 16:35:23.438004017 CEST497395552192.168.2.4178.128.228.252
            Apr 27, 2024 16:35:31.451226950 CEST497395552192.168.2.4178.128.228.252
            Apr 27, 2024 16:35:39.471399069 CEST497405552192.168.2.4178.128.228.252
            Apr 27, 2024 16:35:40.482481956 CEST497405552192.168.2.4178.128.228.252
            Apr 27, 2024 16:35:42.482549906 CEST497405552192.168.2.4178.128.228.252
            Apr 27, 2024 16:35:46.482480049 CEST497405552192.168.2.4178.128.228.252
            Apr 27, 2024 16:35:54.529367924 CEST497405552192.168.2.4178.128.228.252
            Apr 27, 2024 16:36:03.237730026 CEST497415552192.168.2.4178.128.228.252
            Apr 27, 2024 16:36:04.341888905 CEST497415552192.168.2.4178.128.228.252
            Apr 27, 2024 16:36:06.341896057 CEST497415552192.168.2.4178.128.228.252
            Apr 27, 2024 16:36:10.341974974 CEST497415552192.168.2.4178.128.228.252
            Apr 27, 2024 16:36:18.498162031 CEST497415552192.168.2.4178.128.228.252
            Apr 27, 2024 16:36:27.018549919 CEST497425552192.168.2.4178.128.228.252
            Apr 27, 2024 16:36:28.185679913 CEST497425552192.168.2.4178.128.228.252
            Apr 27, 2024 16:36:30.186269045 CEST497425552192.168.2.4178.128.228.252
            Apr 27, 2024 16:36:34.293962002 CEST497425552192.168.2.4178.128.228.252
            Apr 27, 2024 16:36:42.295161963 CEST497425552192.168.2.4178.128.228.252
            Apr 27, 2024 16:36:50.312205076 CEST497435552192.168.2.4178.128.228.252
            Apr 27, 2024 16:36:51.326428890 CEST497435552192.168.2.4178.128.228.252
            Apr 27, 2024 16:36:53.342051983 CEST497435552192.168.2.4178.128.228.252
            Apr 27, 2024 16:36:57.357589960 CEST497435552192.168.2.4178.128.228.252
            Apr 27, 2024 16:37:05.420119047 CEST497435552192.168.2.4178.128.228.252
            Apr 27, 2024 16:37:13.438548088 CEST497445552192.168.2.4178.128.228.252
            Apr 27, 2024 16:37:14.623248100 CEST497445552192.168.2.4178.128.228.252
            Apr 27, 2024 16:37:16.623243093 CEST497445552192.168.2.4178.128.228.252
            Apr 27, 2024 16:37:20.623352051 CEST497445552192.168.2.4178.128.228.252
            Apr 27, 2024 16:37:28.623250961 CEST497445552192.168.2.4178.128.228.252
            Apr 27, 2024 16:37:36.738691092 CEST497455552192.168.2.4178.128.228.252
            Apr 27, 2024 16:37:37.748370886 CEST497455552192.168.2.4178.128.228.252
            Apr 27, 2024 16:37:39.763901949 CEST497455552192.168.2.4178.128.228.252
            Apr 27, 2024 16:37:43.779573917 CEST497455552192.168.2.4178.128.228.252
            Apr 27, 2024 16:37:51.920165062 CEST497455552192.168.2.4178.128.228.252
            TimestampSource PortDest PortSource IPDest IP
            Apr 27, 2024 16:34:05.574491024 CEST6128653192.168.2.41.1.1.1
            Apr 27, 2024 16:34:05.668378115 CEST53612861.1.1.1192.168.2.4
            Apr 27, 2024 16:35:16.061522007 CEST4958253192.168.2.41.1.1.1
            Apr 27, 2024 16:35:16.154577017 CEST53495821.1.1.1192.168.2.4
            Apr 27, 2024 16:36:26.922049999 CEST5038153192.168.2.41.1.1.1
            Apr 27, 2024 16:36:27.014946938 CEST53503811.1.1.1192.168.2.4
            Apr 27, 2024 16:37:36.643188000 CEST5510453192.168.2.41.1.1.1
            Apr 27, 2024 16:37:36.735157967 CEST53551041.1.1.1192.168.2.4
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Apr 27, 2024 16:34:05.574491024 CEST192.168.2.41.1.1.10x12e1Standard query (0)asero23.ddns.netA (IP address)IN (0x0001)false
            Apr 27, 2024 16:35:16.061522007 CEST192.168.2.41.1.1.10x9418Standard query (0)asero23.ddns.netA (IP address)IN (0x0001)false
            Apr 27, 2024 16:36:26.922049999 CEST192.168.2.41.1.1.10xfaa9Standard query (0)asero23.ddns.netA (IP address)IN (0x0001)false
            Apr 27, 2024 16:37:36.643188000 CEST192.168.2.41.1.1.10x21dStandard query (0)asero23.ddns.netA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Apr 27, 2024 16:34:05.668378115 CEST1.1.1.1192.168.2.40x12e1No error (0)asero23.ddns.net178.128.228.252A (IP address)IN (0x0001)false
            Apr 27, 2024 16:35:16.154577017 CEST1.1.1.1192.168.2.40x9418No error (0)asero23.ddns.net178.128.228.252A (IP address)IN (0x0001)false
            Apr 27, 2024 16:36:27.014946938 CEST1.1.1.1192.168.2.40xfaa9No error (0)asero23.ddns.net178.128.228.252A (IP address)IN (0x0001)false
            Apr 27, 2024 16:37:36.735157967 CEST1.1.1.1192.168.2.40x21dNo error (0)asero23.ddns.net178.128.228.252A (IP address)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:16:33:52
            Start date:27/04/2024
            Path:C:\Users\user\Desktop\UtfPLaHG.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\UtfPLaHG.exe"
            Imagebase:0xc90000
            File size:24'064 bytes
            MD5 hash:6A44A61F22C1F94581FE84CE077C8BC3
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.1616392139.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000000.1616392139.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
            • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000000.1616392139.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, Author: Brian Wallace @botnet_hunter
            • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000000.1616392139.0000000000C92000.00000002.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.4081592327.00000000033E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            Reputation:low
            Has exited:false

            Target ID:1
            Start time:16:34:00
            Start date:27/04/2024
            Path:C:\Windows\SysWOW64\netsh.exe
            Wow64 process (32bit):true
            Commandline:netsh firewall add allowedprogram "C:\Users\user\Desktop\UtfPLaHG.exe" "UtfPLaHG.exe" ENABLE
            Imagebase:0x1560000
            File size:82'432 bytes
            MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:true

            Target ID:2
            Start time:16:34:01
            Start date:27/04/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff7699e0000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:14.8%
              Dynamic/Decrypted Code Coverage:100%
              Signature Coverage:5.3%
              Total number of Nodes:114
              Total number of Limit Nodes:4
              execution_graph 3866 5560652 3867 55606a2 GetComputerNameW 3866->3867 3868 55606b0 3867->3868 3973 5561551 3975 5561582 GetExitCodeProcess 3973->3975 3976 55615e0 3975->3976 3889 137bbba 3891 137bbf2 CreateFileW 3889->3891 3892 137bc41 3891->3892 4004 55613cf 4006 55613d9 AdjustTokenPrivileges 4004->4006 4007 5561457 4006->4007 4032 556124a 4033 5561286 LookupPrivilegeValueW 4032->4033 4035 55612d6 4033->4035 3921 1750b68 KiUserExceptionDispatcher 3922 1750b9c 3921->3922 4036 137a612 4038 137a646 CreateMutexW 4036->4038 4039 137a6c1 4038->4039 3977 137a710 3978 137a74e FindCloseChangeNotification 3977->3978 3980 137a788 3978->3980 4064 137bc90 4065 137bcd2 GetFileType 4064->4065 4067 137bd34 4065->4067 3981 556197c 3982 556199e RegCreateKeyExW 3981->3982 3984 5561a48 3982->3984 4040 556027a 4041 556029a WSASocketW 4040->4041 4043 556030e 4041->4043 3985 1750b58 3986 1750b68 KiUserExceptionDispatcher 3985->3986 3987 1750b9c 3986->3987 3988 5560966 3989 5560986 MapViewOfFile 3988->3989 3991 5560a0d 3989->3991 3949 137b306 3950 137b344 DuplicateHandle 3949->3950 3951 137b37c 3949->3951 3952 137b352 3950->3952 3951->3950 3881 137a2fe 3882 137a353 3881->3882 3883 137a32a SetErrorMode 3881->3883 3882->3883 3884 137a33f 3883->3884 3992 556171f 3993 5561742 SetProcessWorkingSetSize 3992->3993 3995 55617a3 3993->3995 3996 137bb7a 3998 137bbba CreateFileW 3996->3998 3999 137bc41 3998->3999 3901 5561406 3903 5561435 AdjustTokenPrivileges 3901->3903 3904 5561457 3903->3904 4044 5560006 4045 5560012 ReadFile 4044->4045 4047 5560099 4045->4047 4048 137a462 4049 137a486 RegSetValueExW 4048->4049 4051 137a507 4049->4051 4000 137a361 4001 137a392 RegQueryValueExW 4000->4001 4003 137a41b 4001->4003 4068 5561a81 4069 5561ac4 FormatMessageW 4068->4069 4071 5561b4e 4069->4071 4012 556118e 4015 55611be WSAConnect 4012->4015 4014 5561212 4015->4014 3917 137abee 3918 137ac50 3917->3918 3919 137ac1a OleInitialize 3917->3919 3918->3919 3920 137ac28 3919->3920 4072 5560eb4 4075 5560ec1 GetProcessTimes 4072->4075 4074 5560f59 4075->4074 3926 5560032 3927 5560067 ReadFile 3926->3927 3929 5560099 3927->3929 4076 137a2d2 4077 137a2d6 SetErrorMode 4076->4077 4079 137a33f 4077->4079 4016 55607b0 4017 55607d6 ConvertStringSecurityDescriptorToSecurityDescriptorW 4016->4017 4019 556084f 4017->4019 4080 137b2df 4081 137b306 DuplicateHandle 4080->4081 4083 137b352 4081->4083 4020 5560fbc 4022 5560fde getaddrinfo 4020->4022 4023 556108b 4022->4023 4052 556163b 4054 556165e GetProcessWorkingSetSize 4052->4054 4055 55616bf 4054->4055 4024 137a7c7 4025 137a7fa RegOpenKeyExW 4024->4025 4027 137a888 4025->4027 4056 5560626 4057 556062d GetComputerNameW 4056->4057 4059 55606b0 4057->4059 3953 137a646 3955 137a67e CreateMutexW 3953->3955 3956 137a6c1 3955->3956 4028 137abc1 4031 137abee OleInitialize 4028->4031 4030 137ac28 4031->4030 4084 137a8c1 4085 137a902 SendMessageTimeoutA 4084->4085 4087 137a985 4085->4087 3965 137a74e 3966 137a77a FindCloseChangeNotification 3965->3966 3967 137a7b9 3965->3967 3968 137a788 3966->3968 3967->3966
              APIs
              • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 0556144F
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: AdjustPrivilegesToken
              • String ID:
              • API String ID: 2874748243-0
              • Opcode ID: c28882dde3b8951e4c3d215428235319e4658bedadb4ff454fe6580767f4e932
              • Instruction ID: f64b21c5ebe99994027e69137e26f25ee4d471c817d2bb71eea6c0d5c4f58ed3
              • Opcode Fuzzy Hash: c28882dde3b8951e4c3d215428235319e4658bedadb4ff454fe6580767f4e932
              • Instruction Fuzzy Hash: FA21BC755097C0AFDB228F25DC40B62BFB8FF06310F08859AE9858B563D271E908DB62
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 0556144F
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: AdjustPrivilegesToken
              • String ID:
              • API String ID: 2874748243-0
              • Opcode ID: dade129bf1a09e23f09d45716c8f0030abad94ea6ce2e8838827e5690be16052
              • Instruction ID: c0326bbf1e2f59fc3073026bf25dacf86c2ee61de22d24120d3562316ee782ad
              • Opcode Fuzzy Hash: dade129bf1a09e23f09d45716c8f0030abad94ea6ce2e8838827e5690be16052
              • Instruction Fuzzy Hash: 9C119E31600A409FDB20CF55D884B76FBE8FF18220F08C96AED468B652D335E418DBA1
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 280 1750b68-1750ba6 KiUserExceptionDispatcher 283 1750ba9-1750baf 280->283 284 1750bb5-1750bb8 283->284 285 1750cad-1750cca 283->285 286 1750bba 284->286 314 1750bbc call 19805e0 286->314 315 1750bbc call 1980606 286->315 288 1750bc1-1750bee 293 1750c35-1750c38 288->293 294 1750bf0-1750bf2 288->294 293->285 296 1750c3a-1750c40 293->296 316 1750bf4 call 17514f0 294->316 317 1750bf4 call 19805e0 294->317 318 1750bf4 call 1980606 294->318 296->286 297 1750c46-1750c4d 296->297 299 1750c4f-1750c65 297->299 300 1750c9e 297->300 298 1750bfa-1750c01 301 1750c03-1750c2a 298->301 302 1750c32 298->302 299->285 306 1750c67-1750c6f 299->306 303 1750ca8 300->303 301->302 302->293 303->283 307 1750c71-1750c7c 306->307 308 1750c90-1750c98 call 1751aff 306->308 307->285 310 1750c7e-1750c88 307->310 308->300 310->308 314->288 315->288 316->298 317->298 318->298
              APIs
              • KiUserExceptionDispatcher.NTDLL ref: 01750B8F
              Memory Dump Source
              • Source File: 00000000.00000002.4081460443.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1750000_UtfPLaHG.jbxd
              Similarity
              • API ID: DispatcherExceptionUser
              • String ID:
              • API String ID: 6842923-0
              • Opcode ID: d153a1b2ddb1431fba14981ca148f5bfc4e580c9234c2d866292f022f9e69031
              • Instruction ID: 5ce2dadb252c8d8a588f3792b747a4b5ecc69cb75261aa78cbf3552607027492
              • Opcode Fuzzy Hash: d153a1b2ddb1431fba14981ca148f5bfc4e580c9234c2d866292f022f9e69031
              • Instruction Fuzzy Hash: 3A416C31A002058FCB48DF79C9846EDB7B6EF98304F148469E809DB399EB74DD45CBA0
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 320 1750b58-1750b66 321 1750b68-1750b95 KiUserExceptionDispatcher 320->321 322 1750b9c-1750ba6 321->322 324 1750ba9-1750baf 322->324 325 1750bb5-1750bb8 324->325 326 1750cad-1750cca 324->326 327 1750bba 325->327 355 1750bbc call 19805e0 327->355 356 1750bbc call 1980606 327->356 329 1750bc1-1750bee 334 1750c35-1750c38 329->334 335 1750bf0-1750bf2 329->335 334->326 337 1750c3a-1750c40 334->337 357 1750bf4 call 17514f0 335->357 358 1750bf4 call 19805e0 335->358 359 1750bf4 call 1980606 335->359 337->327 338 1750c46-1750c4d 337->338 340 1750c4f-1750c65 338->340 341 1750c9e 338->341 339 1750bfa-1750c01 342 1750c03-1750c2a 339->342 343 1750c32 339->343 340->326 347 1750c67-1750c6f 340->347 344 1750ca8 341->344 342->343 343->334 344->324 348 1750c71-1750c7c 347->348 349 1750c90-1750c98 call 1751aff 347->349 348->326 351 1750c7e-1750c88 348->351 349->341 351->349 355->329 356->329 357->339 358->339 359->339
              APIs
              • KiUserExceptionDispatcher.NTDLL ref: 01750B8F
              Memory Dump Source
              • Source File: 00000000.00000002.4081460443.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1750000_UtfPLaHG.jbxd
              Similarity
              • API ID: DispatcherExceptionUser
              • String ID:
              • API String ID: 6842923-0
              • Opcode ID: eba15ef734bb28f2e71d66180a51e97c179d612aa04f701b4944da2312f9ee8e
              • Instruction ID: 81606c833f8c2b489eed57b9b011fc6fa802c6699aa9cb6e7b7b24e147c4828d
              • Opcode Fuzzy Hash: eba15ef734bb28f2e71d66180a51e97c179d612aa04f701b4944da2312f9ee8e
              • Instruction Fuzzy Hash: BF414D31A013058FCB44DF79C9846ADB7B6EF99304F148469E809DB399EB74DD45CBA0
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 361 137bb7a-137bc12 365 137bc17-137bc23 361->365 366 137bc14 361->366 367 137bc25 365->367 368 137bc28-137bc31 365->368 366->365 367->368 369 137bc33-137bc57 CreateFileW 368->369 370 137bc82-137bc87 368->370 373 137bc89-137bc8e 369->373 374 137bc59-137bc7f 369->374 370->369 373->374
              APIs
              • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0137BC39
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: 7f60a703fc017fa6bbf136dfa633203c63f235885640e28ba631b0822c05710c
              • Instruction ID: e1a44709375bb6d33e4f7cc17dac4da523a1ef0ef121ce46e73a436f299e50bf
              • Opcode Fuzzy Hash: 7f60a703fc017fa6bbf136dfa633203c63f235885640e28ba631b0822c05710c
              • Instruction Fuzzy Hash: D93182B1505380AFEB22CB65DC44BA2BFF8EF06314F08849EE9848B652D375A919D771
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 377 556197c-55619f6 381 55619fb-5561a07 377->381 382 55619f8 377->382 383 5561a0c-5561a15 381->383 384 5561a09 381->384 382->381 385 5561a17 383->385 386 5561a1a-5561a31 383->386 384->383 385->386 388 5561a73-5561a78 386->388 389 5561a33-5561a46 RegCreateKeyExW 386->389 388->389 390 5561a7a-5561a7f 389->390 391 5561a48-5561a70 389->391 390->391
              APIs
              • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 05561A39
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: Create
              • String ID:
              • API String ID: 2289755597-0
              • Opcode ID: 20d9f9a9c067bc2033c95ddb159f149dfa7bbc8ea4a9b3eda3037ef2c62d7764
              • Instruction ID: 091ba86226cbcbbbeb3d04b68d14d9b5a484d9f537f4b37e3b8e3dfd7b0b173f
              • Opcode Fuzzy Hash: 20d9f9a9c067bc2033c95ddb159f149dfa7bbc8ea4a9b3eda3037ef2c62d7764
              • Instruction Fuzzy Hash: A3318175504784AFEB218A65CC44FB7BBECFF09610F08859AF985CB652D320E549CB71
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 396 5560187-55601a7 397 55601c9-55601fb 396->397 398 55601a9-55601c8 396->398 402 55601fe-5560256 RegQueryValueExW 397->402 398->397 404 556025c-5560272 402->404
              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 0556024E
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: 5198b695c2c58c96eaa055e07731e1d891223bcb710e3f146672ce9682d5db5e
              • Instruction ID: df746c63c844872ec98cc8597aa27ca810eb3481e458e3f0b6ea93cb79cd15b7
              • Opcode Fuzzy Hash: 5198b695c2c58c96eaa055e07731e1d891223bcb710e3f146672ce9682d5db5e
              • Instruction Fuzzy Hash: 65316D6550E7C06FD3138B258C65A61BFB4EF47610B0E85CBD8C48B6A3D229A919C7B2
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 405 137a7c7-137a855 409 137a857 405->409 410 137a85a-137a871 405->410 409->410 412 137a8b3-137a8b8 410->412 413 137a873-137a886 RegOpenKeyExW 410->413 412->413 414 137a8ba-137a8bf 413->414 415 137a888-137a8b0 413->415 414->415
              APIs
              • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 0137A879
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: Open
              • String ID:
              • API String ID: 71445658-0
              • Opcode ID: 05489fce5e43dd4a1b86f32393d2a7fdd3a512354aa9d9ef38d28714af40b7ef
              • Instruction ID: 2b57bd4309a3f5fd26c88842e47b321735b27e7f974cdeea9f847ea3a47c3e70
              • Opcode Fuzzy Hash: 05489fce5e43dd4a1b86f32393d2a7fdd3a512354aa9d9ef38d28714af40b7ef
              • Instruction Fuzzy Hash: 033195715083846FE7228B65DC45FA7BFE8EF06314F08849AE984CB653D264A54DC771
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 420 5560fbc-556107b 426 55610cd-55610d2 420->426 427 556107d-5561085 getaddrinfo 420->427 426->427 429 556108b-556109d 427->429 430 55610d4-55610d9 429->430 431 556109f-55610ca 429->431 430->431
              APIs
              • getaddrinfo.WS2_32(?,00000E24), ref: 05561083
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: getaddrinfo
              • String ID:
              • API String ID: 300660673-0
              • Opcode ID: a8afd98cb59b45b459f68b2f2bb9093281015478b45882ae7872c9a72c6347bb
              • Instruction ID: 426ce0fe1947b80a17d7ae9e428a112ebc566f817262ae53ff36cea24f7dc8e1
              • Opcode Fuzzy Hash: a8afd98cb59b45b459f68b2f2bb9093281015478b45882ae7872c9a72c6347bb
              • Instruction Fuzzy Hash: 1031A2B1504344AFEB21CB51DD84FA6FBACEF04314F04489AFA489B691D375A94CCB71
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 449 5561a81-5561af3 451 5561af6-5561b48 FormatMessageW 449->451 453 5561b4e-5561b77 451->453
              APIs
              • FormatMessageW.KERNELBASE(?,00000E24,?,?), ref: 05561B46
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: FormatMessage
              • String ID:
              • API String ID: 1306739567-0
              • Opcode ID: 1a34ae75a49bc10293d700ee60fb96dbf0ba3fbc005365d235569359b18fa478
              • Instruction ID: d464264c80089fdf326c08c1a264f22012041a3fa886ab16cababac500ee4d8a
              • Opcode Fuzzy Hash: 1a34ae75a49bc10293d700ee60fb96dbf0ba3fbc005365d235569359b18fa478
              • Instruction Fuzzy Hash: FA319E7150D3C05FD7038B758C65A66BFB4EF47610F0D85CBD8848F6A3D624A919C7A2
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 435 5560eb4-5560f49 441 5560f96-5560f9b 435->441 442 5560f4b-5560f53 GetProcessTimes 435->442 441->442 443 5560f59-5560f6b 442->443 445 5560f9d-5560fa2 443->445 446 5560f6d-5560f93 443->446 445->446
              APIs
              • GetProcessTimes.KERNELBASE(?,00000E24,21E48FE7,00000000,00000000,00000000,00000000), ref: 05560F51
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: ProcessTimes
              • String ID:
              • API String ID: 1995159646-0
              • Opcode ID: ff8cee1564f875148e34a2e4a3fec72ac553298f957273680538dba6b63beee5
              • Instruction ID: 090ab9c2aa6b2add7d8a265120f00a23c2183cf42c01c31e34f153b6ef4ac23f
              • Opcode Fuzzy Hash: ff8cee1564f875148e34a2e4a3fec72ac553298f957273680538dba6b63beee5
              • Instruction Fuzzy Hash: 7031E5725097806FDB228F61DC44FA6BFB8EF46320F0884DAE8848F5A3D2659949C771
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 471 55607b0-5560831 475 5560836-556083f 471->475 476 5560833 471->476 477 5560897-556089c 475->477 478 5560841-5560849 ConvertStringSecurityDescriptorToSecurityDescriptorW 475->478 476->475 477->478 479 556084f-5560861 478->479 481 5560863-5560894 479->481 482 556089e-55608a3 479->482 482->481
              APIs
              • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 05560847
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: DescriptorSecurity$ConvertString
              • String ID:
              • API String ID: 3907675253-0
              • Opcode ID: 848e9b112c6cd2fb8c50d589a1dc1203391cdb3b2573e11941fd6cfe100229d8
              • Instruction ID: 430eb03f3db577d815b321b05219a4273f4524e88e52b11fa1c5891cf6821d84
              • Opcode Fuzzy Hash: 848e9b112c6cd2fb8c50d589a1dc1203391cdb3b2573e11941fd6cfe100229d8
              • Instruction Fuzzy Hash: BA319371504384AFEB21CB65DC45FA7BFE8FF45210F0884AAE944DB692D324A958CB61
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 455 137a612-137a695 459 137a697 455->459 460 137a69a-137a6a3 455->460 459->460 461 137a6a5 460->461 462 137a6a8-137a6b1 460->462 461->462 463 137a6b3-137a6d7 CreateMutexW 462->463 464 137a702-137a707 462->464 467 137a709-137a70e 463->467 468 137a6d9-137a6ff 463->468 464->463 467->468
              APIs
              • CreateMutexW.KERNELBASE(?,?), ref: 0137A6B9
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: CreateMutex
              • String ID:
              • API String ID: 1964310414-0
              • Opcode ID: 20bdf3da7e65d19f7cfcaf5e9b1b6083a5c379a571444f90cb131237b617aef1
              • Instruction ID: b76ca510ac5c418ab75d17f6443a4dd1bac35248954c8bf881c34e6bd5f3063d
              • Opcode Fuzzy Hash: 20bdf3da7e65d19f7cfcaf5e9b1b6083a5c379a571444f90cb131237b617aef1
              • Instruction Fuzzy Hash: F33193B15093846FE722CB65DC85B96FFF8EF06214F08849AE984CF292D375E909C761
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 05561A39
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: Create
              • String ID:
              • API String ID: 2289755597-0
              • Opcode ID: 2843197833fe2c1695df8e5b7006d2d2eb1472f92f199681f3c61163269687bb
              • Instruction ID: 12d7690c20701f6701173550cbbe4ce10663ef4362494f1fd1aa79a6473969a6
              • Opcode Fuzzy Hash: 2843197833fe2c1695df8e5b7006d2d2eb1472f92f199681f3c61163269687bb
              • Instruction Fuzzy Hash: 79219E76500744AFEB21CE65CD44FB7BBECFF18214F08895AE945C7A52D330E548CAA1
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 486 137a8c1-137a975 490 137a977-137a97f SendMessageTimeoutA 486->490 491 137a9b9-137a9be 486->491 492 137a985-137a997 490->492 491->490 494 137a9c0-137a9c5 492->494 495 137a999-137a9b6 492->495 494->495
              APIs
              • SendMessageTimeoutA.USER32(?,00000E24), ref: 0137A97D
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: MessageSendTimeout
              • String ID:
              • API String ID: 1599653421-0
              • Opcode ID: c2de550eba5a1b7e4b02c5a5a00345feea0deed487fd4050bfae4c729562a2df
              • Instruction ID: 76fff42ddb9d336e1f694046b12e0b9cb4422a42cf8dba73862c34bf6f40a2ec
              • Opcode Fuzzy Hash: c2de550eba5a1b7e4b02c5a5a00345feea0deed487fd4050bfae4c729562a2df
              • Instruction Fuzzy Hash: C431F471404384AFEB228F61DC44FA6FFB8EF06314F08849EE9848B593D275A44CCB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E24,21E48FE7,00000000,00000000,00000000,00000000), ref: 0137A40C
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: 97fd881cf79ca441bde2e3c7a1a21216065250743bd62383098b6905c98f2b8f
              • Instruction ID: b4d79fd38c6cac89404a8933afee9c863ad020f2994c89fcfa4d23bd1677fabb
              • Opcode Fuzzy Hash: 97fd881cf79ca441bde2e3c7a1a21216065250743bd62383098b6905c98f2b8f
              • Instruction Fuzzy Hash: E631B171508780AFE722CF15CC84F96BFF8EF06214F08849AE945DB292D364E848CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • getaddrinfo.WS2_32(?,00000E24), ref: 05561083
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: getaddrinfo
              • String ID:
              • API String ID: 300660673-0
              • Opcode ID: 9233b452c90b2dc5a26d6af045a91dcc450cbe0755e58791baf3498e11058c29
              • Instruction ID: b7eb009d7a236b6b3e79ece78f9b941329bd041506c102b07089a5051e588475
              • Opcode Fuzzy Hash: 9233b452c90b2dc5a26d6af045a91dcc450cbe0755e58791baf3498e11058c29
              • Instruction Fuzzy Hash: DB21BC71500244AFEB21DB61CD84FBAF7ACEF08324F04885AFA489B681D375A54CCBB1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetFileType.KERNELBASE(?,00000E24,21E48FE7,00000000,00000000,00000000,00000000), ref: 0137BD25
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: FileType
              • String ID:
              • API String ID: 3081899298-0
              • Opcode ID: 80b46b11f9fde9b3c3e0c061577a2f8c964e711255aa940c84d0a68ecb308092
              • Instruction ID: 7a4ad5c436d95806ddcde667cf438c21c98be6393d271b972ea098aa0c8d0d87
              • Opcode Fuzzy Hash: 80b46b11f9fde9b3c3e0c061577a2f8c964e711255aa940c84d0a68ecb308092
              • Instruction Fuzzy Hash: 642106754097806FD7128B21DC80BA2BFBCEF47324F0880D6E9848B2A3D2649909C771
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetExitCodeProcess.KERNELBASE(?,00000E24,21E48FE7,00000000,00000000,00000000,00000000), ref: 055615D8
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: CodeExitProcess
              • String ID:
              • API String ID: 3861947596-0
              • Opcode ID: 7fbaa44203e026c2865cee563a2c67a2e0999dd2176510a88461410e5678dab9
              • Instruction ID: dbd0b64fbfaa7f9792965c4d988b46f4a00038599547b48cc75b3ac8023447ef
              • Opcode Fuzzy Hash: 7fbaa44203e026c2865cee563a2c67a2e0999dd2176510a88461410e5678dab9
              • Instruction Fuzzy Hash: FE21C1715093806FEB12CB25DC85FA6BFB8EF46314F0884DAE984CF692D264A948C771
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • WSASocketW.WS2_32(?,?,?,?,?), ref: 05560306
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: Socket
              • String ID:
              • API String ID: 38366605-0
              • Opcode ID: 7ca1f404cffc901cdcf55db9cf9402333d76259a54262852dc3f0d359d6cf559
              • Instruction ID: 4fe86f2ba1e2b1bddedbda102a63084d7c7db5da547b44a490ad8679e3dadcc8
              • Opcode Fuzzy Hash: 7ca1f404cffc901cdcf55db9cf9402333d76259a54262852dc3f0d359d6cf559
              • Instruction Fuzzy Hash: F821B171505380AFE722CF51DC44FA6FFF8EF05210F08889EE9858B6A2C375A558CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: FileView
              • String ID:
              • API String ID: 3314676101-0
              • Opcode ID: ba7a28dd078aaed94ff911ecba84a30f70e415e5de8a2a766fdce0614ce561ea
              • Instruction ID: 76664de1d7e82b661e175ec703d62abea8af18a0dbbbb45098ce2e7df655eeb5
              • Opcode Fuzzy Hash: ba7a28dd078aaed94ff911ecba84a30f70e415e5de8a2a766fdce0614ce561ea
              • Instruction Fuzzy Hash: C221EF71405380AFE722CF51DC44FA6FBF8EF09220F08849EE9848B692D375A548CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RegSetValueExW.KERNELBASE(?,00000E24,21E48FE7,00000000,00000000,00000000,00000000), ref: 0137A4F8
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: Value
              • String ID:
              • API String ID: 3702945584-0
              • Opcode ID: 687fd21ce5ac8ed7b723ca47063979401fc564f7333e29dcdfe2988ad1ac2f87
              • Instruction ID: 3b303b422f8378804d5c4b7323e7ef858c8f93862af841b12977cb4a2618b43e
              • Opcode Fuzzy Hash: 687fd21ce5ac8ed7b723ca47063979401fc564f7333e29dcdfe2988ad1ac2f87
              • Instruction Fuzzy Hash: 1A21A4B2504380AFD7228F55DC44FA7BFB8EF46224F08849AE985DB692D364E448C771
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 05560847
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: DescriptorSecurity$ConvertString
              • String ID:
              • API String ID: 3907675253-0
              • Opcode ID: cb534e6641295a9ba61354b65c5e319b4914ddede2e11d9cd81c6a4cec1a7bd0
              • Instruction ID: 5debf5a554c4fe1ca1fd76249223f23f02ce1b039fef1604be8028230fbd0f6b
              • Opcode Fuzzy Hash: cb534e6641295a9ba61354b65c5e319b4914ddede2e11d9cd81c6a4cec1a7bd0
              • Instruction Fuzzy Hash: 6221CF72600244AFEB20DF65DD45FAAFBACFF04214F04886AE945DB691D374E5488AB1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0137BC39
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: 3ea878c098e6d40085bee0c0fb9fa80b53473335cc222ea16bdf429e8620dbfc
              • Instruction ID: 5ead0bd8123c805194bfc50c90695c424aabb7b132273f9ab0cff1a5347a3120
              • Opcode Fuzzy Hash: 3ea878c098e6d40085bee0c0fb9fa80b53473335cc222ea16bdf429e8620dbfc
              • Instruction Fuzzy Hash: 6721DEB1500204AFEB21CF65CD84F66FBE8EF08214F04886DE9858B656D775E408CB71
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E24,21E48FE7,00000000,00000000,00000000,00000000), ref: 0556075C
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: 63ace9ce405f8bd4fd639a3d6730020c3e3e565497f1b96ee1ad4a1a5117aa78
              • Instruction ID: f426acfbffee89c03047caad8f55e295ad56f6443d36d5daa7639a3bd94aeab6
              • Opcode Fuzzy Hash: 63ace9ce405f8bd4fd639a3d6730020c3e3e565497f1b96ee1ad4a1a5117aa78
              • Instruction Fuzzy Hash: A3219071504780AFD721CF51DC48FA6BBF8EF05210F08849AE9458B6A2D364E948CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 055612CE
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: LookupPrivilegeValue
              • String ID:
              • API String ID: 3899507212-0
              • Opcode ID: d1396bb5b7af1d77b633720f573c9f87357b973516aee1eb8d3f5f13cd6c0e1f
              • Instruction ID: 9f3ca22132828c5bcd7cf34a51f100e76205a00f5590800d543cb7db5411e9e0
              • Opcode Fuzzy Hash: d1396bb5b7af1d77b633720f573c9f87357b973516aee1eb8d3f5f13cd6c0e1f
              • Instruction Fuzzy Hash: 06218E726087C09FDB128B65DC55BA2BFF8AF06210F0D84EAD8C5CB663D224D808C761
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ReadFile.KERNELBASE(?,00000E24,21E48FE7,00000000,00000000,00000000,00000000), ref: 05560091
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: FileRead
              • String ID:
              • API String ID: 2738559852-0
              • Opcode ID: a29cac2c52c82ee64aeaed7d124d420085293c667d4b2ecd58dc3975d2a52d67
              • Instruction ID: 87b4967d539af9e64a6fb261b38ee49ca7b6232771959777e3b7ccc21e4359d1
              • Opcode Fuzzy Hash: a29cac2c52c82ee64aeaed7d124d420085293c667d4b2ecd58dc3975d2a52d67
              • Instruction Fuzzy Hash: 7D21B671405380AFD722CF51DC44FA7BFB8EF46324F08849AE9849B592D275A558CB71
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 0137A879
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: Open
              • String ID:
              • API String ID: 71445658-0
              • Opcode ID: 64dcdc0ccc9a58b2b6872fe85826d6248d5776423cef5c2f9be506d6fed4459a
              • Instruction ID: 89ec01d59478c25623599d57b7e14ec3152e4ba636edd86c62132ade3e075363
              • Opcode Fuzzy Hash: 64dcdc0ccc9a58b2b6872fe85826d6248d5776423cef5c2f9be506d6fed4459a
              • Instruction Fuzzy Hash: 0F21D172500204AEE7319F55DD44FABFBECEF18314F08845AED458BA42D334E44D8AB2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SetProcessWorkingSetSize.KERNEL32(?,00000E24,21E48FE7,00000000,00000000,00000000,00000000), ref: 0556179B
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: ProcessSizeWorking
              • String ID:
              • API String ID: 3584180929-0
              • Opcode ID: 4d1e7e82c993d76617a3a7d811b23f9a1babb39e483ebb9bf71c7f8fa376b26f
              • Instruction ID: 6dadfbbd9893d2ed8bd8d87fff2af6acb59052530a5b329e671ee20bec02295c
              • Opcode Fuzzy Hash: 4d1e7e82c993d76617a3a7d811b23f9a1babb39e483ebb9bf71c7f8fa376b26f
              • Instruction Fuzzy Hash: 0D21D4715083806FD722CF61DC44FA7BFA8EF46210F08C4AAE944CB692D374A548CBB5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetProcessWorkingSetSize.KERNEL32(?,00000E24,21E48FE7,00000000,00000000,00000000,00000000), ref: 055616B7
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: ProcessSizeWorking
              • String ID:
              • API String ID: 3584180929-0
              • Opcode ID: 4d1e7e82c993d76617a3a7d811b23f9a1babb39e483ebb9bf71c7f8fa376b26f
              • Instruction ID: 69edb0dcf1f9148b9b26db3fa6c1960b5d2cff04c1b02f48134223d076d4c2d3
              • Opcode Fuzzy Hash: 4d1e7e82c993d76617a3a7d811b23f9a1babb39e483ebb9bf71c7f8fa376b26f
              • Instruction Fuzzy Hash: B921D4715083806FD722CF61DC44FA6BFA8EF45210F08C4AAE944CB692D374A548CBB1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateMutexW.KERNELBASE(?,?), ref: 0137A6B9
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: CreateMutex
              • String ID:
              • API String ID: 1964310414-0
              • Opcode ID: bf6ec0eda69c045688f2449af1a4ead0343c0598607ad63b01683921aaf846f4
              • Instruction ID: 7dd29e8d589d1591b884e57c748b0124bc3c912b5c0da1208a2d8345e62c50c1
              • Opcode Fuzzy Hash: bf6ec0eda69c045688f2449af1a4ead0343c0598607ad63b01683921aaf846f4
              • Instruction Fuzzy Hash: 7321D4716002449FE721CF65DD85FAAFBE8EF14224F088469E949CB742D375E408CB71
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E24,21E48FE7,00000000,00000000,00000000,00000000), ref: 0137A40C
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: 81a05518f3aef236c3cd21cec1b5ae06cbfd193e042fb410a5aed055691d011a
              • Instruction ID: 7015eaa4e143e6d39fb619b86c4fe465046f391a887f995e87dc6a8a4e00999a
              • Opcode Fuzzy Hash: 81a05518f3aef236c3cd21cec1b5ae06cbfd193e042fb410a5aed055691d011a
              • Instruction Fuzzy Hash: 8B21AE71600204AFE731CF15CC84FAAF7ECEF04614F08845AE9459B792D374E848CA71
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • WSASocketW.WS2_32(?,?,?,?,?), ref: 05560306
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: Socket
              • String ID:
              • API String ID: 38366605-0
              • Opcode ID: 146cead8626b6e62618762b97a97dca6a17b897b2bfaab439a9e7ae057438c5e
              • Instruction ID: 498469c733a68537fa0b29b5d5c045e9cb117dbc861299b4416c48778650b9c0
              • Opcode Fuzzy Hash: 146cead8626b6e62618762b97a97dca6a17b897b2bfaab439a9e7ae057438c5e
              • Instruction Fuzzy Hash: 8621CF71500240AFEB21CF91DD44FA6FBE8EF08320F04885EE9458B691C375E458CBB1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: FileView
              • String ID:
              • API String ID: 3314676101-0
              • Opcode ID: 9f0aa62a736210d5a771cb265c3761b3c5ba818e7e36096cfaacdcb90957c14d
              • Instruction ID: 60eeb7527bb10f45e86513a79586f298b303b6300eee4d0652c1a77b4c477e7d
              • Opcode Fuzzy Hash: 9f0aa62a736210d5a771cb265c3761b3c5ba818e7e36096cfaacdcb90957c14d
              • Instruction Fuzzy Hash: 7721F071400244AFEB21CF55DD88FA6FBE8EF18324F04845DE9458BB91D375E458CBA2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 0556120A
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: Connect
              • String ID:
              • API String ID: 3144859779-0
              • Opcode ID: da16f3764c74c0f7927b13fe40927d139fe23cbd89750a9f21e503c58f3464a4
              • Instruction ID: 5f45d27afb48bc864e9399018abfa2040783f07f379019621fc256454a5efc6d
              • Opcode Fuzzy Hash: da16f3764c74c0f7927b13fe40927d139fe23cbd89750a9f21e503c58f3464a4
              • Instruction Fuzzy Hash: 07219F715087C4AFDB228F51DC44B62FFF4FF0A310F08859AE9858B662D335A819DB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • FindCloseChangeNotification.KERNELBASE(?), ref: 0137A780
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: ChangeCloseFindNotification
              • String ID:
              • API String ID: 2591292051-0
              • Opcode ID: 40206830b1ea116c0ba3829500197fa9afe585c9dd91c124de571433ed2c5953
              • Instruction ID: 768ad0efc5559b11d8ec876cb8f3c33e99c59cbb754db991d232b82e214dbea7
              • Opcode Fuzzy Hash: 40206830b1ea116c0ba3829500197fa9afe585c9dd91c124de571433ed2c5953
              • Instruction Fuzzy Hash: F421E7B59043809FD712CF55EC85B52BFB4EF02324F0884ABED458B653D3759905DBA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SendMessageTimeoutA.USER32(?,00000E24), ref: 0137A97D
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: MessageSendTimeout
              • String ID:
              • API String ID: 1599653421-0
              • Opcode ID: b2ff38169e95e002e82bc14a77089c2d65db962467c6baf812b93a15813417c8
              • Instruction ID: 01ebe4cf377194a1ad360771f5ed2ef6b64658c938e00725861efb149dc815ae
              • Opcode Fuzzy Hash: b2ff38169e95e002e82bc14a77089c2d65db962467c6baf812b93a15813417c8
              • Instruction Fuzzy Hash: 9421D271500204AFEB318F51DC40FA6FBA8EF09314F08845AFE859AA91D375E558CBB1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E24,21E48FE7,00000000,00000000,00000000,00000000), ref: 0556075C
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: 7ee3b96e0cafba25dae6ad591bda45c903046574d6f82b3adbb8af15a10252f3
              • Instruction ID: eec1af771b168f6ab18835e5c4008470608634704173acf9b88096b65380aa4b
              • Opcode Fuzzy Hash: 7ee3b96e0cafba25dae6ad591bda45c903046574d6f82b3adbb8af15a10252f3
              • Instruction Fuzzy Hash: 4A117275500644AFEB21CF55DC88FA6F7E8FF14610F08845AE9458B692D770E548CAB2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RegSetValueExW.KERNELBASE(?,00000E24,21E48FE7,00000000,00000000,00000000,00000000), ref: 0137A4F8
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: Value
              • String ID:
              • API String ID: 3702945584-0
              • Opcode ID: 1e9e0ec466ac60bc40123419523f170ad19649b04d1baba18bee6bdfc928558d
              • Instruction ID: 1849163cf0d815b0d6d2afc73c4b460bd4d17416d3e093ad90328a7d16fdb876
              • Opcode Fuzzy Hash: 1e9e0ec466ac60bc40123419523f170ad19649b04d1baba18bee6bdfc928558d
              • Instruction Fuzzy Hash: A711BEB2500604AFEB318F15DC44FABFBECEF14624F08845AED459BB82D375E4488AB1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetProcessTimes.KERNELBASE(?,00000E24,21E48FE7,00000000,00000000,00000000,00000000), ref: 05560F51
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: ProcessTimes
              • String ID:
              • API String ID: 1995159646-0
              • Opcode ID: e3b85b17bc904761dbe932a1cf0438ccbacd93bbfe9ed297f02f1c0f8c96b62a
              • Instruction ID: e75a9711ee351556111510c74eff610e3ccca88ecf6498e08c3b2b25b8b0958a
              • Opcode Fuzzy Hash: e3b85b17bc904761dbe932a1cf0438ccbacd93bbfe9ed297f02f1c0f8c96b62a
              • Instruction Fuzzy Hash: E811E671500240AFEB21CF51DC44FAAF7E8EF14310F04C86AE945CB691D374E5588BB1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetProcessWorkingSetSize.KERNEL32(?,00000E24,21E48FE7,00000000,00000000,00000000,00000000), ref: 055616B7
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: ProcessSizeWorking
              • String ID:
              • API String ID: 3584180929-0
              • Opcode ID: 53426a3a05dbe9bcead0685a69860728da2a1d98ba1b28c825dfb6ef6ad48720
              • Instruction ID: 57c449bafbfda42ce9c1bb1ea93b3a4ad20c663aa76396459a25d590e965bc1f
              • Opcode Fuzzy Hash: 53426a3a05dbe9bcead0685a69860728da2a1d98ba1b28c825dfb6ef6ad48720
              • Instruction Fuzzy Hash: AA11BFB5500640AFEB21CF55DD84FBAB7A8EF14224F08846AE945CBA81D374A558CBB1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SetProcessWorkingSetSize.KERNEL32(?,00000E24,21E48FE7,00000000,00000000,00000000,00000000), ref: 0556179B
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: ProcessSizeWorking
              • String ID:
              • API String ID: 3584180929-0
              • Opcode ID: 53426a3a05dbe9bcead0685a69860728da2a1d98ba1b28c825dfb6ef6ad48720
              • Instruction ID: 42d14784d21f570b9e5f5f30f65244fbde38f1d9f13299bcc8a34201b8313056
              • Opcode Fuzzy Hash: 53426a3a05dbe9bcead0685a69860728da2a1d98ba1b28c825dfb6ef6ad48720
              • Instruction Fuzzy Hash: DF11BF71600640AFEB21CF55DC84FBAB7E8EF15224F08846AE945CB682D774A548CAB6
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetExitCodeProcess.KERNELBASE(?,00000E24,21E48FE7,00000000,00000000,00000000,00000000), ref: 055615D8
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: CodeExitProcess
              • String ID:
              • API String ID: 3861947596-0
              • Opcode ID: d5767ebcba29ebbd324f9084da7857440b32ef4f6d41a22a5bd6341f9589459b
              • Instruction ID: b1f8fb87f62cbe2c5190c75e33c4371a3244f4b04c12d0f8f145e2068188814a
              • Opcode Fuzzy Hash: d5767ebcba29ebbd324f9084da7857440b32ef4f6d41a22a5bd6341f9589459b
              • Instruction Fuzzy Hash: 1511C171500640AFEB21CB15DD85FBAF7A8EF14224F08C46AE905DB681D674A548CBA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0137B34A
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: DuplicateHandle
              • String ID:
              • API String ID: 3793708945-0
              • Opcode ID: 65030a7db6f632a695907c645d63c9471d8f96dabcf6ba2ce9bc5912550e582b
              • Instruction ID: a9364a5c62c585828cadc6d1f67400079ca3c274f4bd470d4c68032f2a9144bd
              • Opcode Fuzzy Hash: 65030a7db6f632a695907c645d63c9471d8f96dabcf6ba2ce9bc5912550e582b
              • Instruction Fuzzy Hash: 1F117F71409780AFDB228F55DC44B62FFF4EF4A320F08889AED858B662C275A518DB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ReadFile.KERNELBASE(?,00000E24,21E48FE7,00000000,00000000,00000000,00000000), ref: 05560091
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: FileRead
              • String ID:
              • API String ID: 2738559852-0
              • Opcode ID: 3381ebc72fcddd3549206e8513ca0458f5f88ed7159510a8438e3ab8f0dd8955
              • Instruction ID: c7e3d7701dc8c6eafa069b2518e7392e9b369463d110f4bea99f73a8f34adf42
              • Opcode Fuzzy Hash: 3381ebc72fcddd3549206e8513ca0458f5f88ed7159510a8438e3ab8f0dd8955
              • Instruction Fuzzy Hash: 5811C471500240AFEB21CF51DD44FA6FBE8EF14324F04885AE9459B691D375A5588BB1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetComputerNameW.KERNEL32(?,00000E24,?,?), ref: 055606A2
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: ComputerName
              • String ID:
              • API String ID: 3545744682-0
              • Opcode ID: cdb5676cda000690bf0abbd46a0f8a61a75a2fcb01a57b1db8fb5ac3bbfdbb87
              • Instruction ID: 5069a9023f696c2313fa7ddf32d89934f91bbec31ef060a7c648af08599f13d2
              • Opcode Fuzzy Hash: cdb5676cda000690bf0abbd46a0f8a61a75a2fcb01a57b1db8fb5ac3bbfdbb87
              • Instruction Fuzzy Hash: E511B671909380AFD3118B16DC45F26FFB4EF86610F09819EE8449B792D325B959C7A2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: Initialize
              • String ID:
              • API String ID: 2538663250-0
              • Opcode ID: c9044850b5d4d13ff14c413bfae77e369d3b7aab00aa31f1b4a76e9770bffeac
              • Instruction ID: 33586b228666c58b4db8bf46a09a8883115d04f9e997601a007803ef0048c76d
              • Opcode Fuzzy Hash: c9044850b5d4d13ff14c413bfae77e369d3b7aab00aa31f1b4a76e9770bffeac
              • Instruction Fuzzy Hash: 161182715093C0AFDB128F25DC44B66BFB4EF47210F0884DAED848F253D275A558CBA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SetErrorMode.KERNELBASE(?), ref: 0137A330
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: ErrorMode
              • String ID:
              • API String ID: 2340568224-0
              • Opcode ID: a2269bf70886b463732a498f166f3b37228c79c0e1a0223af44e0ae0a9955b3c
              • Instruction ID: 4352e1300f2fc50564576e190cd5b79d19fb4dc28da13a4c421c6253f3ac6496
              • Opcode Fuzzy Hash: a2269bf70886b463732a498f166f3b37228c79c0e1a0223af44e0ae0a9955b3c
              • Instruction Fuzzy Hash: 7E1173758093C4AFD7238B15DC44B66BFB4EF47624F0D80DAED848B263D265A808DB72
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 055612CE
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: LookupPrivilegeValue
              • String ID:
              • API String ID: 3899507212-0
              • Opcode ID: e778ce3ef2c0929f6777f26385f8b8be6382b4e0e2cec3f65133dd6263e0b012
              • Instruction ID: b93c7f2f908fbd1365bbce475bab643a1a8916227e42063be50bb7ff9b0ba53b
              • Opcode Fuzzy Hash: e778ce3ef2c0929f6777f26385f8b8be6382b4e0e2cec3f65133dd6263e0b012
              • Instruction Fuzzy Hash: 5F118E71A046408FDB60CF6AD885B76FBE8FF15220F0884AADD49CB746D274E404CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetFileType.KERNELBASE(?,00000E24,21E48FE7,00000000,00000000,00000000,00000000), ref: 0137BD25
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: FileType
              • String ID:
              • API String ID: 3081899298-0
              • Opcode ID: e567a437124b0f16fb7adc0389a7d2432c0e81345d7a8a73aa0f8d48a5e87686
              • Instruction ID: a288fddbdbcfa09c546e4a9443a7e273427eac55f28af3cf9c0f1efaa7e83a09
              • Opcode Fuzzy Hash: e567a437124b0f16fb7adc0389a7d2432c0e81345d7a8a73aa0f8d48a5e87686
              • Instruction Fuzzy Hash: 6501C075500244AEE7218F15DC84BA6F7ACDF15628F18C0A6EE048BB96D378E4488AB2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 0556120A
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: Connect
              • String ID:
              • API String ID: 3144859779-0
              • Opcode ID: 9cb1c94c238fbb0c53bb041cb6c4bd854653ba26faed52cc22d3cd8fefc7a7b0
              • Instruction ID: 482225ade02e31c57a5a1551cb67bb46dd37fb71e17880698b5fb5baf74fd463
              • Opcode Fuzzy Hash: 9cb1c94c238fbb0c53bb041cb6c4bd854653ba26faed52cc22d3cd8fefc7a7b0
              • Instruction Fuzzy Hash: 95117C315006849FDB21CF96D884B76FBE5FF18310F0889AADD858B622D335E418CBA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • FormatMessageW.KERNELBASE(?,00000E24,?,?), ref: 05561B46
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: FormatMessage
              • String ID:
              • API String ID: 1306739567-0
              • Opcode ID: 3fe9416e88b3417971caa319e1fb384815556a4388ad4a315f93701c7c5c3224
              • Instruction ID: 6b67d4f4ef25f625078fb45396ebac76cc2fa0dc341e6e7893ddff126d6d4835
              • Opcode Fuzzy Hash: 3fe9416e88b3417971caa319e1fb384815556a4388ad4a315f93701c7c5c3224
              • Instruction Fuzzy Hash: 1301B171A00200ABD310DF16DD85B76FBE8FB88B20F14812AED089BB41D731B965CBE1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0137B34A
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: DuplicateHandle
              • String ID:
              • API String ID: 3793708945-0
              • Opcode ID: 39e1926ad9d4729928f4c383e34d7040f8f6b4c1be583246dc86c8adecb7d1b3
              • Instruction ID: 910fd7efe505fc7cc232e352f69927a850f3ae649a5ed03d68d8b70344c924ac
              • Opcode Fuzzy Hash: 39e1926ad9d4729928f4c383e34d7040f8f6b4c1be583246dc86c8adecb7d1b3
              • Instruction Fuzzy Hash: FD01A131400600DFEB218F55D884B66FBF4EF18324F08845ADD898A616C375E054DF61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetComputerNameW.KERNEL32(?,00000E24,?,?), ref: 055606A2
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: ComputerName
              • String ID:
              • API String ID: 3545744682-0
              • Opcode ID: 18f7be93e892c8f15a33cd7d3ab752ca2f6a7ccf68c3dc2f72e0baefe8cb9291
              • Instruction ID: 072468769c76728a28fe67c6a9013a06dd68d21c9d7a628b1da24f5d4dc14d81
              • Opcode Fuzzy Hash: 18f7be93e892c8f15a33cd7d3ab752ca2f6a7ccf68c3dc2f72e0baefe8cb9291
              • Instruction Fuzzy Hash: 8801A271A00600ABD310DF16DD86B76FBE8FB88A20F148159ED089BB41D731F965CBE5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 0556024E
              Memory Dump Source
              • Source File: 00000000.00000002.4082648999.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5560000_UtfPLaHG.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: 323f29a8b5eec194cb35164b393ef183ab31e75afd86b31bd5ae588bbb045680
              • Instruction ID: c53c56788f583f198662013c0fb63b7e627a8de0a518402c52406dcdc7499652
              • Opcode Fuzzy Hash: 323f29a8b5eec194cb35164b393ef183ab31e75afd86b31bd5ae588bbb045680
              • Instruction Fuzzy Hash: A5018F71A00600ABD210DF16DD86B66FBE8FB88A20F14811AED089BB41D771B965CBE5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • FindCloseChangeNotification.KERNELBASE(?), ref: 0137A780
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: ChangeCloseFindNotification
              • String ID:
              • API String ID: 2591292051-0
              • Opcode ID: 38fe789a34e67199cf91d6223cc181e4b655f8548f1b7ea3a0b850d9b7bdf696
              • Instruction ID: c7cd3779c619ed48a3850b31eb482e32a11a19e83f76d902d9bbb1841ab75ca3
              • Opcode Fuzzy Hash: 38fe789a34e67199cf91d6223cc181e4b655f8548f1b7ea3a0b850d9b7bdf696
              • Instruction Fuzzy Hash: CC01D4719042448FDB218F55D884769FBE8DF14224F08C4ABDD468F746D279E404CEA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: Initialize
              • String ID:
              • API String ID: 2538663250-0
              • Opcode ID: b31276d0ccd25fc6675a776ca4599601478ad490d98a7538822d4e05ad6415a6
              • Instruction ID: 538f93b44e380b44d5f55df9f6dfdb39c20e562af05611a0ec490c7bfc6bd6ad
              • Opcode Fuzzy Hash: b31276d0ccd25fc6675a776ca4599601478ad490d98a7538822d4e05ad6415a6
              • Instruction Fuzzy Hash: 9A01A2719042449FDB20CF15D884769FBE4DF14224F0CC4AADD48CF746D279E548CAA2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SetErrorMode.KERNELBASE(?), ref: 0137A330
              Memory Dump Source
              • Source File: 00000000.00000002.4080776060.000000000137A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_137a000_UtfPLaHG.jbxd
              Similarity
              • API ID: ErrorMode
              • String ID:
              • API String ID: 2340568224-0
              • Opcode ID: 2f1e604d5869bd9e0d989a0901f1aa819b78e8b2637e84860342e2e11ef0287f
              • Instruction ID: 2704bf3ea79ca90aac5277864680923f8e2ec8759ed3fb952a1de803108a3232
              • Opcode Fuzzy Hash: 2f1e604d5869bd9e0d989a0901f1aa819b78e8b2637e84860342e2e11ef0287f
              • Instruction Fuzzy Hash: 32F0AF35904244DFEB218F19D884B69FBE4EF19324F0CC09ADD494F752D3B9E448CAA2
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.4081534381.0000000001980000.00000040.00000020.00020000.00000000.sdmp, Offset: 01980000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1980000_UtfPLaHG.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 81415fba8eadaa8f3f9c9d0d6fd123ebfee6842ab36a5f7b68b0f86497328ccb
              • Instruction ID: d7f06026880a8685ab1ef00264c234e2c20d4b323fca26cdd6e94b9683736c35
              • Opcode Fuzzy Hash: 81415fba8eadaa8f3f9c9d0d6fd123ebfee6842ab36a5f7b68b0f86497328ccb
              • Instruction Fuzzy Hash: BE11D230614284DFD711DB14D540F26BBA5AB99708F28C9ACF94D1BB53C737D84BCA82
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.4081534381.0000000001980000.00000040.00000020.00020000.00000000.sdmp, Offset: 01980000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1980000_UtfPLaHG.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2ce9d8489972c5ac6b32da9c9216b897264b26fb79ad366285fe3d0f2dfb42f7
              • Instruction ID: 3ea3b67ecce247f3ece7d20dff9e9e542f02ad771dc935ab01217103ce21b243
              • Opcode Fuzzy Hash: 2ce9d8489972c5ac6b32da9c9216b897264b26fb79ad366285fe3d0f2dfb42f7
              • Instruction Fuzzy Hash: 28216D311093C18FC713CB24C950B54BFB1AF46218F2DC9EED4885B6A3C33A884ACB52
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.4081534381.0000000001980000.00000040.00000020.00020000.00000000.sdmp, Offset: 01980000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1980000_UtfPLaHG.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1c258744b4bcc904a0fa6c03b2a5010c30b4c9269be151cbf9669575fb9136fe
              • Instruction ID: f5af1c6ce5eb2a0846efd3aeea2215fbd422f1bb4f9c2b99dd83703508f4be37
              • Opcode Fuzzy Hash: 1c258744b4bcc904a0fa6c03b2a5010c30b4c9269be151cbf9669575fb9136fe
              • Instruction Fuzzy Hash: EC01DB765097845FC7118F16EC408A3FFB8EF8663070984DFEC498B712D225A809C771
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.4081534381.0000000001980000.00000040.00000020.00020000.00000000.sdmp, Offset: 01980000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1980000_UtfPLaHG.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a63d737166a2e5ca776a926b4a2ea5ec817fe73f7c0f556bca669771502efb95
              • Instruction ID: ff9ea1048028111857364ffb5a317d3d727b6f11cc7b88f08f53ea03e55b0768
              • Opcode Fuzzy Hash: a63d737166a2e5ca776a926b4a2ea5ec817fe73f7c0f556bca669771502efb95
              • Instruction Fuzzy Hash: CA012535149380CFC303CB14D550B11BBB1FF86618F1986DAE4894B663C3369856CB92
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.4081534381.0000000001980000.00000040.00000020.00020000.00000000.sdmp, Offset: 01980000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1980000_UtfPLaHG.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7489cccc064395f2936cebe98813e0a177919cb3ffb8139302bf187ae4d94871
              • Instruction ID: 1414da86bd1e544e16de3d1b2fb9ff2a282747a5cdd1caeb883ba92df9702d74
              • Opcode Fuzzy Hash: 7489cccc064395f2936cebe98813e0a177919cb3ffb8139302bf187ae4d94871
              • Instruction Fuzzy Hash: DFF04B35104640DFC712CB04D580B15FBA2EB89718F28CAA9E84807B62C3379817DA82
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.4081534381.0000000001980000.00000040.00000020.00020000.00000000.sdmp, Offset: 01980000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1980000_UtfPLaHG.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f3343c057d385dfdee059cbfaeb7510602b700b03f9babb407ba51a58081b7ec
              • Instruction ID: 835ace7c46f889d8b53a2669f9ccd02c30b804fa891ec3a36ebeb264dcb19acc
              • Opcode Fuzzy Hash: f3343c057d385dfdee059cbfaeb7510602b700b03f9babb407ba51a58081b7ec
              • Instruction Fuzzy Hash: 4EE092B6A046444B9750CF0BFC81862F7D8EB84630B18C07FDC0D8B711D235F509CAA5
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.4080750650.0000000001372000.00000040.00000800.00020000.00000000.sdmp, Offset: 01372000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1372000_UtfPLaHG.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: eb8dd2fd1213559edac0b766884fe0c939a40d97267994ce0e7c7ed983bde856
              • Instruction ID: b95bcb0d5ed77c46bf8722d2e970536a50c6948edc1270bf9882dd15947e552a
              • Opcode Fuzzy Hash: eb8dd2fd1213559edac0b766884fe0c939a40d97267994ce0e7c7ed983bde856
              • Instruction Fuzzy Hash: 09D05E7A2096C18FE3269A1CC2A8B963BE4AB51718F4A44F9A8408BB63C76CD5C5D600
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.4080750650.0000000001372000.00000040.00000800.00020000.00000000.sdmp, Offset: 01372000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1372000_UtfPLaHG.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a1ed7aaf7560fe995e34d23e30752717b231427d258a05a27ad5aa671f5ae29e
              • Instruction ID: 5546d1dd6afdcf85d9622bb25f4897fb8bb832a9eb4219e2a3155c91c5ff56ef
              • Opcode Fuzzy Hash: a1ed7aaf7560fe995e34d23e30752717b231427d258a05a27ad5aa671f5ae29e
              • Instruction Fuzzy Hash: 4DD05E342006814BE725DA0CC2D4F5A3BD4AB40718F0644EDAC108B762C7A8D8C4CA00
              Uniqueness

              Uniqueness Score: -1.00%