Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
bUPt.exe

Overview

General Information

Sample name:bUPt.exe
Analysis ID:1436115
MD5:b0f3ca4450a2f669b927ae1517dac1e7
SHA1:7390d9dcd74c4c40f536c8f490f0ba1580523c77
SHA256:81c18c346ad57ff5c4dc07fe51b0e9411704cb9df362aefd6d6275f6f9660d47
Tags:exenjRat
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Njrat
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Self deletion via cmd or bat file
Uses dynamic DNS services
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • bUPt.exe (PID: 1308 cmdline: "C:\Users\user\Desktop\bUPt.exe" MD5: B0F3CA4450A2F669B927AE1517DAC1E7)
    • cmd.exe (PID: 2496 cmdline: cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\bUPt.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • chrome.exe (PID: 6768 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://%3cfnc1%3e(79)/ MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 7300 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1988,i,13026046254637796549,1595632273730165584,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Host": "patria.duckdns.org", "Port": "1994", "Campaign ID": "NYAN CAT", "Network Seprator": "@!#&^%$", "Registry": "f179c84c13a"}
SourceRuleDescriptionAuthorStrings
bUPt.exeJoeSecurity_NjratYara detected NjratJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1624089626.0000000000A22000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
      Process Memory Space: bUPt.exe PID: 1308JoeSecurity_NjratYara detected NjratJoe Security
        SourceRuleDescriptionAuthorStrings
        0.0.bUPt.exe.a20000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
          No Sigma rule has matched
          Timestamp:05/03/24-20:09:02.028125
          SID:2033132
          Source Port:49735
          Destination Port:1994
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:05/03/24-20:09:17.544251
          SID:2825564
          Source Port:49735
          Destination Port:1994
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:05/03/24-20:09:02.415867
          SID:2825563
          Source Port:49735
          Destination Port:1994
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: bUPt.exeAvira: detected
          Source: patria.duckdns.orgAvira URL Cloud: Label: phishing
          Source: 00000000.00000000.1624089626.0000000000A22000.00000002.00000001.01000000.00000003.sdmpMalware Configuration Extractor: Njrat {"Host": "patria.duckdns.org", "Port": "1994", "Campaign ID": "NYAN CAT", "Network Seprator": "@!#&^%$", "Registry": "f179c84c13a"}
          Source: patria.duckdns.orgVirustotal: Detection: 17%Perma Link
          Source: patria.duckdns.orgVirustotal: Detection: 17%Perma Link
          Source: bUPt.exeVirustotal: Detection: 75%Perma Link
          Source: Yara matchFile source: bUPt.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.bUPt.exe.a20000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1624089626.0000000000A22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: bUPt.exe PID: 1308, type: MEMORYSTR
          Source: bUPt.exeJoe Sandbox ML: detected
          Source: bUPt.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: C:\Users\user\Desktop\bUPt.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
          Source: unknownHTTPS traffic detected: 23.51.58.94:443 -> 192.168.2.4:49739 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 23.51.58.94:443 -> 192.168.2.4:49740 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.4:49741 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.4:49747 version: TLS 1.2
          Source: bUPt.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Networking

          barindex
          Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.4:49735 -> 46.246.80.19:1994
          Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.4:49735 -> 46.246.80.19:1994
          Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.4:49735 -> 46.246.80.19:1994
          Source: Malware configuration extractorURLs: patria.duckdns.org
          Source: unknownDNS query: name: patria.duckdns.org
          Source: global trafficTCP traffic: 192.168.2.4:49735 -> 46.246.80.19:1994
          Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
          Source: Joe Sandbox ViewASN Name: PORTLANEwwwportlanecomSE PORTLANEwwwportlanecomSE
          Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
          Source: unknownTCP traffic detected without corresponding DNS query: 104.46.162.224
          Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
          Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
          Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
          Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
          Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
          Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
          Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
          Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
          Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
          Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
          Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
          Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
          Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
          Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
          Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
          Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
          Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
          Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
          Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
          Source: unknownTCP traffic detected without corresponding DNS query: 23.51.58.94
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
          Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=O8KftrnDOnwUOdb&MD=ueCf+rxm HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
          Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=O8KftrnDOnwUOdb&MD=ueCf+rxm HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
          Source: global trafficDNS traffic detected: DNS query: google.com
          Source: global trafficDNS traffic detected: DNS query: patria.duckdns.org
          Source: global trafficDNS traffic detected: DNS query: www.google.com
          Source: bUPt.exe, 00000000.00000002.2051200133.0000000001164000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.
          Source: bUPt.exe, 00000000.00000002.2051200133.0000000001164000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.LinkId=42127
          Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
          Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
          Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
          Source: unknownHTTPS traffic detected: 23.51.58.94:443 -> 192.168.2.4:49739 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 23.51.58.94:443 -> 192.168.2.4:49740 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.4:49741 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.4:49747 version: TLS 1.2

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: bUPt.exe, Keylogger.cs.Net Code: VKCodeToUnicode

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: bUPt.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.bUPt.exe.a20000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1624089626.0000000000A22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: bUPt.exe PID: 1308, type: MEMORYSTR
          Source: C:\Users\user\Desktop\bUPt.exeCode function: 0_2_015D19F00_2_015D19F0
          Source: bUPt.exe, 00000000.00000000.1624109089.0000000000A28000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameClient1994.exe4 vs bUPt.exe
          Source: bUPt.exe, 00000000.00000002.2051200133.00000000010EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs bUPt.exe
          Source: bUPt.exeBinary or memory string: OriginalFilenameClient1994.exe4 vs bUPt.exe
          Source: bUPt.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@23/1@5/5
          Source: C:\Users\user\Desktop\bUPt.exeCode function: 0_2_052622AA AdjustTokenPrivileges,0_2_052622AA
          Source: C:\Users\user\Desktop\bUPt.exeCode function: 0_2_05262273 AdjustTokenPrivileges,0_2_05262273
          Source: C:\Users\user\Desktop\bUPt.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\bUPt.exe.logJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeMutant created: NULL
          Source: C:\Users\user\Desktop\bUPt.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
          Source: C:\Users\user\Desktop\bUPt.exeMutant created: \Sessions\1\BaseNamedObjects\f179c84c13a
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1420:120:WilError_03
          Source: bUPt.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: bUPt.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
          Source: C:\Users\user\Desktop\bUPt.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: bUPt.exeVirustotal: Detection: 75%
          Source: unknownProcess created: C:\Users\user\Desktop\bUPt.exe "C:\Users\user\Desktop\bUPt.exe"
          Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://%3cfnc1%3e(79)/
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1988,i,13026046254637796549,1595632273730165584,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Source: C:\Users\user\Desktop\bUPt.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\bUPt.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\bUPt.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\bUPt.exe"Jump to behavior
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1988,i,13026046254637796549,1595632273730165584,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\bUPt.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
          Source: bUPt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: C:\Users\user\Desktop\bUPt.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
          Source: bUPt.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: bUPt.exe, Program.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
          Source: C:\Users\user\Desktop\bUPt.exeCode function: 0_2_057D06CC push 69A2C3B0h; ret 0_2_057D06E2
          Source: C:\Users\user\Desktop\bUPt.exeCode function: 0_2_057D05A5 push 69A2C360h; ret 0_2_057D05BA

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Users\user\Desktop\bUPt.exeProcess created: cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\bUPt.exe"
          Source: C:\Users\user\Desktop\bUPt.exeProcess created: cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\bUPt.exe"Jump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeMemory allocated: 10B0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeMemory allocated: 3070000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeMemory allocated: 5070000 memory commit | memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeWindow / User API: threadDelayed 1537Jump to behavior
          Source: C:\Users\user\Desktop\bUPt.exe TID: 6888Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\bUPt.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: bUPt.exe, 00000000.00000002.2051200133.0000000001164000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\bUPt.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: bUPt.exe, Program.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, cbName, ref lpszVer, 100)
          Source: bUPt.exe, Keylogger.csReference to suspicious API methods: MapVirtualKey(a, 0u)
          Source: bUPt.exe, Keylogger.csReference to suspicious API methods: GetAsyncKeyState(num2)
          Source: bUPt.exe, 00000000.00000002.2051527998.0000000003075000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: bUPt.exe, 00000000.00000002.2051527998.0000000003075000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@9
          Source: C:\Users\user\Desktop\bUPt.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\bUPt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: bUPt.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.bUPt.exe.a20000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1624089626.0000000000A22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: bUPt.exe PID: 1308, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: bUPt.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.bUPt.exe.a20000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.1624089626.0000000000A22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: bUPt.exe PID: 1308, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Native API
          1
          DLL Side-Loading
          1
          Access Token Manipulation
          1
          Masquerading
          1
          Input Capture
          1
          Security Software Discovery
          Remote Services1
          Input Capture
          11
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts2
          Process Injection
          1
          Disable or Modify Tools
          LSASS Memory1
          Process Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          DLL Side-Loading
          31
          Virtualization/Sandbox Evasion
          Security Account Manager31
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive1
          Ingress Tool Transfer
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Access Token Manipulation
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput Capture2
          Non-Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
          Process Injection
          LSA Secrets12
          System Information Discovery
          SSHKeylogging23
          Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Obfuscated Files or Information
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          Software Packing
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
          File Deletion
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          bUPt.exe75%VirustotalBrowse
          bUPt.exe100%AviraTR/Dropper.Gen7
          bUPt.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          patria.duckdns.org17%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://go.microsoft.0%URL Reputationsafe
          http://go.microsoft.LinkId=421270%Avira URL Cloudsafe
          patria.duckdns.org100%Avira URL Cloudphishing
          patria.duckdns.org17%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          google.com
          142.251.40.206
          truefalse
            high
            www.google.com
            142.250.80.36
            truefalse
              high
              patria.duckdns.org
              46.246.80.19
              truetrueunknown
              NameMaliciousAntivirus DetectionReputation
              patria.duckdns.orgtrue
              • 17%, Virustotal, Browse
              • Avira URL Cloud: phishing
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://go.microsoft.bUPt.exe, 00000000.00000002.2051200133.0000000001164000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://go.microsoft.LinkId=42127bUPt.exe, 00000000.00000002.2051200133.0000000001164000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              142.250.80.36
              www.google.comUnited States
              15169GOOGLEUSfalse
              46.246.80.19
              patria.duckdns.orgSweden
              42708PORTLANEwwwportlanecomSEtrue
              239.255.255.250
              unknownReserved
              unknownunknownfalse
              IP
              192.168.2.4
              192.168.2.5
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1436115
              Start date and time:2024-05-03 20:08:06 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 15s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:10
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:bUPt.exe
              Detection:MAL
              Classification:mal100.troj.spyw.evad.winEXE@23/1@5/5
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 90
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 142.250.80.99, 142.250.72.110, 172.253.122.84, 34.104.35.123, 23.206.121.47, 192.229.211.108, 142.250.176.195, 142.250.80.78
              • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, clients2.google.com, ocsp.digicert.com, accounts.google.com, edgedl.me.gvt1.com, slscr.update.microsoft.com, update.googleapis.com, ctldl.windowsupdate.com, clientservices.googleapis.com, clients.l.google.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              No simulations
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              239.255.255.250https://acrobat.adobe.com/id/urn:aaid:sc:VA6C2:3fb1b101-3543-43ab-a071-b57438ac152eGet hashmaliciousUnknownBrowse
                http://pixelread.comGet hashmaliciousUnknownBrowse
                  https://url.us.m.mimecastprotect.com/s/rYQHCYEBgkHWJjw3h0H9oU?domain=urldefense.proofpoint.comGet hashmaliciousUnknownBrowse
                    Copy of BARBOT CONSTRUCTION.xlsxGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                      https://2fa.com-token-auth.com/XSzVobGY4SGJYQThyamZTeUpxNHFrS0k1MGw5ZEF1Z1R5MkJEL2pwVFdReFNiRG5lSEwvdkh1V1NHcFJZVXN2OVNuSWlCTS9rSlVOSmMxRUNmSmtLTHFQa045N1Fpc0t2Q2xQMkRmdVVNNjJ0LzVhRW9JZitQWkpLN1RRTHFVU3Mvd2diKzNlZUtnUi9MZjM0OHRUNUphZ2lZcWI1bGJyRWE1cHVMRzhZaXVhT1VZMjlEcmpWcTQxVi0tdFRROWJmUXFZMm1yQkVpNi0taGdOZXpUazJaaTZEUGxnZ1pIRnR0UT09?cid=1990623394Get hashmaliciousUnknownBrowse
                        https://bitli.pro/28QSa_c914f238Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                          http://88mansession.comGet hashmaliciousUnknownBrowse
                            https://www.billinginquiry.dfinsolutions.com/Get hashmaliciousUnknownBrowse
                              Scanned from Xerox KwlawMultiftr.rtfGet hashmaliciousHTMLPhisherBrowse
                                Purchase_Order_1803075641.htmGet hashmaliciousHTMLPhisherBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  patria.duckdns.orgbUHH.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                  • 46.246.84.12
                                  xVcsGL5R1Nbh.exeGet hashmaliciousNjratBrowse
                                  • 46.246.6.20
                                  bUBD.exeGet hashmaliciousNjratBrowse
                                  • 46.246.14.22
                                  x5gJuYmvL7m2.exeGet hashmaliciousNjratBrowse
                                  • 46.246.82.18
                                  bTFU.exeGet hashmaliciousNjratBrowse
                                  • 46.246.14.2
                                  bTDk.exeGet hashmaliciousNjratBrowse
                                  • 46.246.80.3
                                  bT6H.exeGet hashmaliciousNjratBrowse
                                  • 46.246.12.4
                                  bT6q.exeGet hashmaliciousNjratBrowse
                                  • 46.246.12.14
                                  bT5A.exeGet hashmaliciousNjratBrowse
                                  • 46.246.80.9
                                  bT57.exeGet hashmaliciousNjratBrowse
                                  • 46.246.80.9
                                  google.comhttps://acrobat.adobe.com/id/urn:aaid:sc:VA6C2:3fb1b101-3543-43ab-a071-b57438ac152eGet hashmaliciousUnknownBrowse
                                  • 142.250.80.68
                                  http://pixelread.comGet hashmaliciousUnknownBrowse
                                  • 142.251.35.164
                                  https://url.us.m.mimecastprotect.com/s/rYQHCYEBgkHWJjw3h0H9oU?domain=urldefense.proofpoint.comGet hashmaliciousUnknownBrowse
                                  • 142.251.40.196
                                  Copy of BARBOT CONSTRUCTION.xlsxGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                  • 142.251.41.4
                                  https://2fa.com-token-auth.com/XSzVobGY4SGJYQThyamZTeUpxNHFrS0k1MGw5ZEF1Z1R5MkJEL2pwVFdReFNiRG5lSEwvdkh1V1NHcFJZVXN2OVNuSWlCTS9rSlVOSmMxRUNmSmtLTHFQa045N1Fpc0t2Q2xQMkRmdVVNNjJ0LzVhRW9JZitQWkpLN1RRTHFVU3Mvd2diKzNlZUtnUi9MZjM0OHRUNUphZ2lZcWI1bGJyRWE1cHVMRzhZaXVhT1VZMjlEcmpWcTQxVi0tdFRROWJmUXFZMm1yQkVpNi0taGdOZXpUazJaaTZEUGxnZ1pIRnR0UT09?cid=1990623394Get hashmaliciousUnknownBrowse
                                  • 142.251.40.132
                                  https://bitli.pro/28QSa_c914f238Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                  • 142.250.80.100
                                  http://88mansession.comGet hashmaliciousUnknownBrowse
                                  • 142.251.40.228
                                  https://www.billinginquiry.dfinsolutions.com/Get hashmaliciousUnknownBrowse
                                  • 142.250.65.196
                                  Scanned from Xerox KwlawMultiftr.rtfGet hashmaliciousHTMLPhisherBrowse
                                  • 142.250.80.100
                                  Purchase_Order_1803075641.htmGet hashmaliciousHTMLPhisherBrowse
                                  • 142.250.80.68
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  PORTLANEwwwportlanecomSEL31owFeEHg.elfGet hashmaliciousMiraiBrowse
                                  • 188.126.80.88
                                  ORDER-290424-007994PT.vbsGet hashmaliciousWSHRat, AgentTeslaBrowse
                                  • 178.73.192.9
                                  bUHH.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                  • 46.246.84.12
                                  bUHF.exeGet hashmaliciousNjratBrowse
                                  • 46.246.84.12
                                  xkzdRi6nGpg3.exeGet hashmaliciousNjratBrowse
                                  • 46.246.84.12
                                  Price request N#U00b0DEM23000199.jsGet hashmaliciousAsyncRAT, PureLog Stealer, RedLineBrowse
                                  • 178.73.192.3
                                  xjXIE2ZFFSw4.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                  • 46.246.14.10
                                  xjXIE2ZFFSw4.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                  • 46.246.14.10
                                  BitTorrent-7.6.exeGet hashmaliciousUnknownBrowse
                                  • 188.126.94.80
                                  xVcsGL5R1Nbh.exeGet hashmaliciousNjratBrowse
                                  • 46.246.6.20
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  28a2c9bd18a11de089ef85a160da29e4https://acrobat.adobe.com/id/urn:aaid:sc:VA6C2:3fb1b101-3543-43ab-a071-b57438ac152eGet hashmaliciousUnknownBrowse
                                  • 23.51.58.94
                                  • 20.12.23.50
                                  https://url.us.m.mimecastprotect.com/s/rYQHCYEBgkHWJjw3h0H9oU?domain=urldefense.proofpoint.comGet hashmaliciousUnknownBrowse
                                  • 23.51.58.94
                                  • 20.12.23.50
                                  https://2fa.com-token-auth.com/XSzVobGY4SGJYQThyamZTeUpxNHFrS0k1MGw5ZEF1Z1R5MkJEL2pwVFdReFNiRG5lSEwvdkh1V1NHcFJZVXN2OVNuSWlCTS9rSlVOSmMxRUNmSmtLTHFQa045N1Fpc0t2Q2xQMkRmdVVNNjJ0LzVhRW9JZitQWkpLN1RRTHFVU3Mvd2diKzNlZUtnUi9MZjM0OHRUNUphZ2lZcWI1bGJyRWE1cHVMRzhZaXVhT1VZMjlEcmpWcTQxVi0tdFRROWJmUXFZMm1yQkVpNi0taGdOZXpUazJaaTZEUGxnZ1pIRnR0UT09?cid=1990623394Get hashmaliciousUnknownBrowse
                                  • 23.51.58.94
                                  • 20.12.23.50
                                  https://bitli.pro/28QSa_c914f238Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                  • 23.51.58.94
                                  • 20.12.23.50
                                  Purchase_Order_1803075641.htmGet hashmaliciousHTMLPhisherBrowse
                                  • 23.51.58.94
                                  • 20.12.23.50
                                  aaaaaaaa.exeGet hashmaliciousUnknownBrowse
                                  • 23.51.58.94
                                  • 20.12.23.50
                                  http://www.maxottawa.caGet hashmaliciousUnknownBrowse
                                  • 23.51.58.94
                                  • 20.12.23.50
                                  Order PS24S0040.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  • 23.51.58.94
                                  • 20.12.23.50
                                  https://dweb.link/ipfs/bafkreihtggm5lijbcmgnngp56fgtaxfzglditdvyi6vhk6v4yi5nmurq2u?filename=Login.html#pharmacovigilance@daiichi-sankyo.co.ukGet hashmaliciousUnknownBrowse
                                  • 23.51.58.94
                                  • 20.12.23.50
                                  XTBox.exeGet hashmaliciousUnknownBrowse
                                  • 23.51.58.94
                                  • 20.12.23.50
                                  No context
                                  Process:C:\Users\user\Desktop\bUPt.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):907
                                  Entropy (8bit):5.243019596074263
                                  Encrypted:false
                                  SSDEEP:24:MLF2CpI329Iz52VMzffup26KTnKoO2+b2hHAa/:MwQd9IzoaXuY6Ux+SF/
                                  MD5:48A0572426885EBDE53CA62C7F2E194E
                                  SHA1:035628CDF6276367F6C83E9F4AA2172933850AA8
                                  SHA-256:4C68E10691304CAC8DA65A05CF2580728EC0E294104F267840712AF1C46A6538
                                  SHA-512:DEFE728C2312918D94BD43C98908C08CCCA5EBFB77F873779DCA784F14C607B33A4E29AC5ECB798F2F741668B7692F72BCB60DEFD536EA86B296B64FA359C42D
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Configuration\53992d421e2c7ecf6609c62b3510a6f0\System.Configuration.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\74774597e319a738b792e6a6c06d3559\System.Xml.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Management\1bd56c432cb9ff27e335d97f404caf8f\System.Management.ni.dll",0..
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):3.807256628078615
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Windows Screen Saver (13104/52) 0.07%
                                  • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                  File name:bUPt.exe
                                  File size:32'768 bytes
                                  MD5:b0f3ca4450a2f669b927ae1517dac1e7
                                  SHA1:7390d9dcd74c4c40f536c8f490f0ba1580523c77
                                  SHA256:81c18c346ad57ff5c4dc07fe51b0e9411704cb9df362aefd6d6275f6f9660d47
                                  SHA512:de72099a2b301b683534a163a4b3c918a035d1f2f2e25c714e5133b3ad3a62b201b14a200b3459cfa19ae339ec9035eaedd26be27fd70fe1db5b11e84b7ca936
                                  SSDEEP:384:O0bUe5XB4e0XvObfixBr/QdWTStTUFQqzFqObbm:fT9BumTifrYfkbm
                                  TLSH:41E2F84A7BB94125C6BD2AFC8CB313210772E3478532EB5F5CDC88CA4F676D04255AEA
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....5f.................P... ......ng... ........@.. ....................................@................................
                                  Icon Hash:90cececece8e8eb0
                                  Entrypoint:0x40676e
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x66351AD6 [Fri May 3 17:11:50 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x671c0x4f.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000x2b0.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xa0000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x47740x50006d2b3ed5c9408fe653eaedb82933da1cFalse0.475439453125data5.298284360002511IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0x80000x2b00x1000b5a4502eac901202af7dd46d217cb488False0.077880859375data0.6886353743137013IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0xa0000xc0x100034585954bedb30c5084980db7d41ad8fFalse0.0087890625data0.013126943721219527IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_VERSION0x80580x254data0.46308724832214765
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                  05/03/24-20:09:02.028125TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)497351994192.168.2.446.246.80.19
                                  05/03/24-20:09:17.544251TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)497351994192.168.2.446.246.80.19
                                  05/03/24-20:09:02.415867TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)497351994192.168.2.446.246.80.19
                                  TimestampSource PortDest PortSource IPDest IP
                                  May 3, 2024 20:08:48.399949074 CEST49678443192.168.2.4104.46.162.224
                                  May 3, 2024 20:08:50.165585041 CEST49675443192.168.2.4173.222.162.32
                                  May 3, 2024 20:08:59.776361942 CEST49675443192.168.2.4173.222.162.32
                                  May 3, 2024 20:09:01.679516077 CEST497351994192.168.2.446.246.80.19
                                  May 3, 2024 20:09:01.926908970 CEST19944973546.246.80.19192.168.2.4
                                  May 3, 2024 20:09:01.926981926 CEST497351994192.168.2.446.246.80.19
                                  May 3, 2024 20:09:02.028125048 CEST497351994192.168.2.446.246.80.19
                                  May 3, 2024 20:09:02.415805101 CEST19944973546.246.80.19192.168.2.4
                                  May 3, 2024 20:09:02.415867090 CEST497351994192.168.2.446.246.80.19
                                  May 3, 2024 20:09:02.714296103 CEST19944973546.246.80.19192.168.2.4
                                  May 3, 2024 20:09:03.401492119 CEST49738443192.168.2.4142.250.80.36
                                  May 3, 2024 20:09:03.401530981 CEST44349738142.250.80.36192.168.2.4
                                  May 3, 2024 20:09:03.401629925 CEST49738443192.168.2.4142.250.80.36
                                  May 3, 2024 20:09:03.401850939 CEST49738443192.168.2.4142.250.80.36
                                  May 3, 2024 20:09:03.401865959 CEST44349738142.250.80.36192.168.2.4
                                  May 3, 2024 20:09:03.605643034 CEST44349738142.250.80.36192.168.2.4
                                  May 3, 2024 20:09:03.606256962 CEST49738443192.168.2.4142.250.80.36
                                  May 3, 2024 20:09:03.606271029 CEST44349738142.250.80.36192.168.2.4
                                  May 3, 2024 20:09:03.607464075 CEST44349738142.250.80.36192.168.2.4
                                  May 3, 2024 20:09:03.607527971 CEST49738443192.168.2.4142.250.80.36
                                  May 3, 2024 20:09:03.608624935 CEST49738443192.168.2.4142.250.80.36
                                  May 3, 2024 20:09:03.608690023 CEST44349738142.250.80.36192.168.2.4
                                  May 3, 2024 20:09:03.649167061 CEST49738443192.168.2.4142.250.80.36
                                  May 3, 2024 20:09:03.649188995 CEST44349738142.250.80.36192.168.2.4
                                  May 3, 2024 20:09:03.696054935 CEST49738443192.168.2.4142.250.80.36
                                  May 3, 2024 20:09:05.843946934 CEST49739443192.168.2.423.51.58.94
                                  May 3, 2024 20:09:05.843996048 CEST4434973923.51.58.94192.168.2.4
                                  May 3, 2024 20:09:05.844091892 CEST49739443192.168.2.423.51.58.94
                                  May 3, 2024 20:09:05.876461983 CEST49739443192.168.2.423.51.58.94
                                  May 3, 2024 20:09:05.876486063 CEST4434973923.51.58.94192.168.2.4
                                  May 3, 2024 20:09:06.069367886 CEST4434973923.51.58.94192.168.2.4
                                  May 3, 2024 20:09:06.069494963 CEST49739443192.168.2.423.51.58.94
                                  May 3, 2024 20:09:06.072040081 CEST49739443192.168.2.423.51.58.94
                                  May 3, 2024 20:09:06.072050095 CEST4434973923.51.58.94192.168.2.4
                                  May 3, 2024 20:09:06.072350979 CEST4434973923.51.58.94192.168.2.4
                                  May 3, 2024 20:09:06.114228010 CEST49739443192.168.2.423.51.58.94
                                  May 3, 2024 20:09:06.160114050 CEST4434973923.51.58.94192.168.2.4
                                  May 3, 2024 20:09:06.245925903 CEST4434973923.51.58.94192.168.2.4
                                  May 3, 2024 20:09:06.246170044 CEST4434973923.51.58.94192.168.2.4
                                  May 3, 2024 20:09:06.246221066 CEST49739443192.168.2.423.51.58.94
                                  May 3, 2024 20:09:06.246247053 CEST4434973923.51.58.94192.168.2.4
                                  May 3, 2024 20:09:06.246267080 CEST49739443192.168.2.423.51.58.94
                                  May 3, 2024 20:09:06.246267080 CEST49739443192.168.2.423.51.58.94
                                  May 3, 2024 20:09:06.246275902 CEST4434973923.51.58.94192.168.2.4
                                  May 3, 2024 20:09:06.246283054 CEST4434973923.51.58.94192.168.2.4
                                  May 3, 2024 20:09:06.321109056 CEST49740443192.168.2.423.51.58.94
                                  May 3, 2024 20:09:06.321182966 CEST4434974023.51.58.94192.168.2.4
                                  May 3, 2024 20:09:06.321257114 CEST49740443192.168.2.423.51.58.94
                                  May 3, 2024 20:09:06.321661949 CEST49740443192.168.2.423.51.58.94
                                  May 3, 2024 20:09:06.321677923 CEST4434974023.51.58.94192.168.2.4
                                  May 3, 2024 20:09:06.504960060 CEST4434974023.51.58.94192.168.2.4
                                  May 3, 2024 20:09:06.505090952 CEST49740443192.168.2.423.51.58.94
                                  May 3, 2024 20:09:06.506345034 CEST49740443192.168.2.423.51.58.94
                                  May 3, 2024 20:09:06.506351948 CEST4434974023.51.58.94192.168.2.4
                                  May 3, 2024 20:09:06.506593943 CEST4434974023.51.58.94192.168.2.4
                                  May 3, 2024 20:09:06.507757902 CEST49740443192.168.2.423.51.58.94
                                  May 3, 2024 20:09:06.552120924 CEST4434974023.51.58.94192.168.2.4
                                  May 3, 2024 20:09:06.683634043 CEST4434974023.51.58.94192.168.2.4
                                  May 3, 2024 20:09:06.683712006 CEST4434974023.51.58.94192.168.2.4
                                  May 3, 2024 20:09:06.683782101 CEST49740443192.168.2.423.51.58.94
                                  May 3, 2024 20:09:06.684508085 CEST49740443192.168.2.423.51.58.94
                                  May 3, 2024 20:09:06.684525967 CEST4434974023.51.58.94192.168.2.4
                                  May 3, 2024 20:09:06.684535980 CEST49740443192.168.2.423.51.58.94
                                  May 3, 2024 20:09:06.684542894 CEST4434974023.51.58.94192.168.2.4
                                  May 3, 2024 20:09:08.527920008 CEST497351994192.168.2.446.246.80.19
                                  May 3, 2024 20:09:08.818316936 CEST19944973546.246.80.19192.168.2.4
                                  May 3, 2024 20:09:08.850182056 CEST19944973546.246.80.19192.168.2.4
                                  May 3, 2024 20:09:08.905215025 CEST497351994192.168.2.446.246.80.19
                                  May 3, 2024 20:09:09.108863115 CEST497351994192.168.2.446.246.80.19
                                  May 3, 2024 20:09:09.416616917 CEST19944973546.246.80.19192.168.2.4
                                  May 3, 2024 20:09:11.500722885 CEST49741443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:11.500773907 CEST4434974120.12.23.50192.168.2.4
                                  May 3, 2024 20:09:11.500891924 CEST49741443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:11.501957893 CEST49741443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:11.501966953 CEST4434974120.12.23.50192.168.2.4
                                  May 3, 2024 20:09:11.812422991 CEST4434974120.12.23.50192.168.2.4
                                  May 3, 2024 20:09:11.812582970 CEST49741443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:11.815962076 CEST49741443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:11.815967083 CEST4434974120.12.23.50192.168.2.4
                                  May 3, 2024 20:09:11.816206932 CEST4434974120.12.23.50192.168.2.4
                                  May 3, 2024 20:09:11.867487907 CEST49741443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:13.509922028 CEST49741443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:13.552115917 CEST4434974120.12.23.50192.168.2.4
                                  May 3, 2024 20:09:13.584918976 CEST44349738142.250.80.36192.168.2.4
                                  May 3, 2024 20:09:13.584995031 CEST44349738142.250.80.36192.168.2.4
                                  May 3, 2024 20:09:13.585052013 CEST49738443192.168.2.4142.250.80.36
                                  May 3, 2024 20:09:13.671849966 CEST49738443192.168.2.4142.250.80.36
                                  May 3, 2024 20:09:13.671885967 CEST44349738142.250.80.36192.168.2.4
                                  May 3, 2024 20:09:13.707978010 CEST4434974120.12.23.50192.168.2.4
                                  May 3, 2024 20:09:13.708003998 CEST4434974120.12.23.50192.168.2.4
                                  May 3, 2024 20:09:13.708010912 CEST4434974120.12.23.50192.168.2.4
                                  May 3, 2024 20:09:13.708033085 CEST4434974120.12.23.50192.168.2.4
                                  May 3, 2024 20:09:13.708045959 CEST4434974120.12.23.50192.168.2.4
                                  May 3, 2024 20:09:13.708053112 CEST4434974120.12.23.50192.168.2.4
                                  May 3, 2024 20:09:13.708069086 CEST49741443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:13.708085060 CEST4434974120.12.23.50192.168.2.4
                                  May 3, 2024 20:09:13.708096981 CEST49741443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:13.708127022 CEST49741443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:13.708256960 CEST4434974120.12.23.50192.168.2.4
                                  May 3, 2024 20:09:13.708304882 CEST49741443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:13.708309889 CEST4434974120.12.23.50192.168.2.4
                                  May 3, 2024 20:09:13.708352089 CEST4434974120.12.23.50192.168.2.4
                                  May 3, 2024 20:09:13.708389997 CEST49741443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:14.052109003 CEST49741443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:14.052120924 CEST4434974120.12.23.50192.168.2.4
                                  May 3, 2024 20:09:17.544250965 CEST497351994192.168.2.446.246.80.19
                                  May 3, 2024 20:09:17.919920921 CEST19944973546.246.80.19192.168.2.4
                                  May 3, 2024 20:09:24.667407990 CEST19944973546.246.80.19192.168.2.4
                                  May 3, 2024 20:09:24.679038048 CEST497351994192.168.2.446.246.80.19
                                  May 3, 2024 20:09:25.129389048 CEST19944973546.246.80.19192.168.2.4
                                  May 3, 2024 20:09:30.303397894 CEST19944973546.246.80.19192.168.2.4
                                  May 3, 2024 20:09:30.351990938 CEST497351994192.168.2.446.246.80.19
                                  May 3, 2024 20:09:30.522245884 CEST497351994192.168.2.446.246.80.19
                                  May 3, 2024 20:09:30.832148075 CEST19944973546.246.80.19192.168.2.4
                                  May 3, 2024 20:09:33.339523077 CEST19944973546.246.80.19192.168.2.4
                                  May 3, 2024 20:09:33.385037899 CEST497351994192.168.2.446.246.80.19
                                  May 3, 2024 20:09:33.965553999 CEST19944973546.246.80.19192.168.2.4
                                  May 3, 2024 20:09:34.010073900 CEST497351994192.168.2.446.246.80.19
                                  May 3, 2024 20:09:34.427508116 CEST497351994192.168.2.446.246.80.19
                                  May 3, 2024 20:09:34.469377041 CEST497351994192.168.2.446.246.80.19
                                  May 3, 2024 20:09:50.929323912 CEST49747443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:50.929358959 CEST4434974720.12.23.50192.168.2.4
                                  May 3, 2024 20:09:50.929425955 CEST49747443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:50.930213928 CEST49747443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:50.930226088 CEST4434974720.12.23.50192.168.2.4
                                  May 3, 2024 20:09:51.237323999 CEST4434974720.12.23.50192.168.2.4
                                  May 3, 2024 20:09:51.237509966 CEST49747443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:51.241369009 CEST49747443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:51.241374969 CEST4434974720.12.23.50192.168.2.4
                                  May 3, 2024 20:09:51.241628885 CEST4434974720.12.23.50192.168.2.4
                                  May 3, 2024 20:09:51.250333071 CEST49747443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:51.292118073 CEST4434974720.12.23.50192.168.2.4
                                  May 3, 2024 20:09:51.533731937 CEST4434974720.12.23.50192.168.2.4
                                  May 3, 2024 20:09:51.533756971 CEST4434974720.12.23.50192.168.2.4
                                  May 3, 2024 20:09:51.533775091 CEST4434974720.12.23.50192.168.2.4
                                  May 3, 2024 20:09:51.533817053 CEST49747443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:51.533827066 CEST4434974720.12.23.50192.168.2.4
                                  May 3, 2024 20:09:51.533865929 CEST49747443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:51.533879995 CEST49747443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:51.535000086 CEST4434974720.12.23.50192.168.2.4
                                  May 3, 2024 20:09:51.535038948 CEST4434974720.12.23.50192.168.2.4
                                  May 3, 2024 20:09:51.535047054 CEST49747443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:51.535079002 CEST49747443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:51.535084009 CEST4434974720.12.23.50192.168.2.4
                                  May 3, 2024 20:09:51.535094976 CEST4434974720.12.23.50192.168.2.4
                                  May 3, 2024 20:09:51.535124063 CEST49747443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:51.535144091 CEST49747443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:51.542033911 CEST49747443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:51.542048931 CEST4434974720.12.23.50192.168.2.4
                                  May 3, 2024 20:09:51.542066097 CEST49747443192.168.2.420.12.23.50
                                  May 3, 2024 20:09:51.542072058 CEST4434974720.12.23.50192.168.2.4
                                  May 3, 2024 20:10:03.363476992 CEST49749443192.168.2.4142.250.80.36
                                  May 3, 2024 20:10:03.363488913 CEST44349749142.250.80.36192.168.2.4
                                  May 3, 2024 20:10:03.363574028 CEST49749443192.168.2.4142.250.80.36
                                  May 3, 2024 20:10:03.363864899 CEST49749443192.168.2.4142.250.80.36
                                  May 3, 2024 20:10:03.363873959 CEST44349749142.250.80.36192.168.2.4
                                  May 3, 2024 20:10:03.553366899 CEST44349749142.250.80.36192.168.2.4
                                  May 3, 2024 20:10:03.569869995 CEST49749443192.168.2.4142.250.80.36
                                  May 3, 2024 20:10:03.569888115 CEST44349749142.250.80.36192.168.2.4
                                  May 3, 2024 20:10:03.570328951 CEST44349749142.250.80.36192.168.2.4
                                  May 3, 2024 20:10:03.583549023 CEST49749443192.168.2.4142.250.80.36
                                  May 3, 2024 20:10:03.583642960 CEST44349749142.250.80.36192.168.2.4
                                  May 3, 2024 20:10:03.640125990 CEST49749443192.168.2.4142.250.80.36
                                  May 3, 2024 20:10:13.544414043 CEST44349749142.250.80.36192.168.2.4
                                  May 3, 2024 20:10:13.544481993 CEST44349749142.250.80.36192.168.2.4
                                  May 3, 2024 20:10:13.544538021 CEST49749443192.168.2.4142.250.80.36
                                  May 3, 2024 20:10:13.603730917 CEST49749443192.168.2.4142.250.80.36
                                  May 3, 2024 20:10:13.603773117 CEST44349749142.250.80.36192.168.2.4
                                  TimestampSource PortDest PortSource IPDest IP
                                  May 3, 2024 20:08:59.007039070 CEST53621881.1.1.1192.168.2.4
                                  May 3, 2024 20:08:59.027780056 CEST53524841.1.1.1192.168.2.4
                                  May 3, 2024 20:08:59.143109083 CEST6143453192.168.2.48.8.8.8
                                  May 3, 2024 20:08:59.143488884 CEST5479353192.168.2.41.1.1.1
                                  May 3, 2024 20:08:59.231730938 CEST53547931.1.1.1192.168.2.4
                                  May 3, 2024 20:08:59.233828068 CEST53614348.8.8.8192.168.2.4
                                  May 3, 2024 20:08:59.618660927 CEST53622981.1.1.1192.168.2.4
                                  May 3, 2024 20:09:01.474365950 CEST5163953192.168.2.41.1.1.1
                                  May 3, 2024 20:09:01.578093052 CEST53516391.1.1.1192.168.2.4
                                  May 3, 2024 20:09:03.306466103 CEST6297553192.168.2.41.1.1.1
                                  May 3, 2024 20:09:03.306586981 CEST6008553192.168.2.41.1.1.1
                                  May 3, 2024 20:09:03.399970055 CEST53600851.1.1.1192.168.2.4
                                  May 3, 2024 20:09:03.400573969 CEST53629751.1.1.1192.168.2.4
                                  May 3, 2024 20:09:17.848649979 CEST53630211.1.1.1192.168.2.4
                                  May 3, 2024 20:09:18.922211885 CEST138138192.168.2.4192.168.2.255
                                  May 3, 2024 20:09:38.541044950 CEST53557501.1.1.1192.168.2.4
                                  May 3, 2024 20:09:58.584681988 CEST53599871.1.1.1192.168.2.4
                                  May 3, 2024 20:10:00.927587986 CEST53579191.1.1.1192.168.2.4
                                  May 3, 2024 20:10:27.129776955 CEST53509941.1.1.1192.168.2.4
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  May 3, 2024 20:08:59.143109083 CEST192.168.2.48.8.8.80x7819Standard query (0)google.comA (IP address)IN (0x0001)false
                                  May 3, 2024 20:08:59.143488884 CEST192.168.2.41.1.1.10x4010Standard query (0)google.comA (IP address)IN (0x0001)false
                                  May 3, 2024 20:09:01.474365950 CEST192.168.2.41.1.1.10xe055Standard query (0)patria.duckdns.orgA (IP address)IN (0x0001)false
                                  May 3, 2024 20:09:03.306466103 CEST192.168.2.41.1.1.10x1114Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                  May 3, 2024 20:09:03.306586981 CEST192.168.2.41.1.1.10xd0c0Standard query (0)www.google.com65IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  May 3, 2024 20:08:59.231730938 CEST1.1.1.1192.168.2.40x4010No error (0)google.com142.251.40.206A (IP address)IN (0x0001)false
                                  May 3, 2024 20:08:59.233828068 CEST8.8.8.8192.168.2.40x7819No error (0)google.com172.217.4.46A (IP address)IN (0x0001)false
                                  May 3, 2024 20:09:01.578093052 CEST1.1.1.1192.168.2.40xe055No error (0)patria.duckdns.org46.246.80.19A (IP address)IN (0x0001)false
                                  May 3, 2024 20:09:03.399970055 CEST1.1.1.1192.168.2.40xd0c0No error (0)www.google.com65IN (0x0001)false
                                  May 3, 2024 20:09:03.400573969 CEST1.1.1.1192.168.2.40x1114No error (0)www.google.com142.250.80.36A (IP address)IN (0x0001)false
                                  • fs.microsoft.com
                                  • slscr.update.microsoft.com
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.44973923.51.58.94443
                                  TimestampBytes transferredDirectionData
                                  2024-05-03 18:09:06 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                                  Connection: Keep-Alive
                                  Accept: */*
                                  Accept-Encoding: identity
                                  User-Agent: Microsoft BITS/7.8
                                  Host: fs.microsoft.com
                                  2024-05-03 18:09:06 UTC467INHTTP/1.1 200 OK
                                  Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                  Content-Type: application/octet-stream
                                  ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                  Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                  Server: ECAcc (chd/073D)
                                  X-CID: 11
                                  X-Ms-ApiVersion: Distribute 1.2
                                  X-Ms-Region: prod-weu-z1
                                  Cache-Control: public, max-age=219292
                                  Date: Fri, 03 May 2024 18:09:06 GMT
                                  Connection: close
                                  X-CID: 2


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.44974023.51.58.94443
                                  TimestampBytes transferredDirectionData
                                  2024-05-03 18:09:06 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                                  Connection: Keep-Alive
                                  Accept: */*
                                  Accept-Encoding: identity
                                  If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                                  Range: bytes=0-2147483646
                                  User-Agent: Microsoft BITS/7.8
                                  Host: fs.microsoft.com
                                  2024-05-03 18:09:06 UTC456INHTTP/1.1 200 OK
                                  ApiVersion: Distribute 1.1
                                  Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                  Content-Type: application/octet-stream
                                  ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                  Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                  Server: ECAcc (chd/0778)
                                  X-CID: 11
                                  Cache-Control: public, max-age=219261
                                  Date: Fri, 03 May 2024 18:09:06 GMT
                                  Content-Length: 55
                                  Connection: close
                                  X-CID: 2
                                  2024-05-03 18:09:06 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                                  Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.44974120.12.23.50443
                                  TimestampBytes transferredDirectionData
                                  2024-05-03 18:09:13 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=O8KftrnDOnwUOdb&MD=ueCf+rxm HTTP/1.1
                                  Connection: Keep-Alive
                                  Accept: */*
                                  User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                  Host: slscr.update.microsoft.com
                                  2024-05-03 18:09:13 UTC560INHTTP/1.1 200 OK
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Content-Type: application/octet-stream
                                  Expires: -1
                                  Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                  ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                                  MS-CorrelationId: b3710b72-6457-4ddd-ad9b-e96c2b59e4bf
                                  MS-RequestId: a321ce81-6c54-42d4-81be-b5400d27a4ad
                                  MS-CV: HWwpTFtJcEK24BMd.0
                                  X-Microsoft-SLSClientCache: 2880
                                  Content-Disposition: attachment; filename=environment.cab
                                  X-Content-Type-Options: nosniff
                                  Date: Fri, 03 May 2024 18:09:13 GMT
                                  Connection: close
                                  Content-Length: 24490
                                  2024-05-03 18:09:13 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                                  Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                                  2024-05-03 18:09:13 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                                  Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  3192.168.2.44974720.12.23.50443
                                  TimestampBytes transferredDirectionData
                                  2024-05-03 18:09:51 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=O8KftrnDOnwUOdb&MD=ueCf+rxm HTTP/1.1
                                  Connection: Keep-Alive
                                  Accept: */*
                                  User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                  Host: slscr.update.microsoft.com
                                  2024-05-03 18:09:51 UTC560INHTTP/1.1 200 OK
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Content-Type: application/octet-stream
                                  Expires: -1
                                  Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                  ETag: "Mx1RoJH/qEwpWfKllx7sbsl28AuERz5IYdcsvtTJcgM=_2160"
                                  MS-CorrelationId: ec8beaba-9b0c-4079-808d-a3d5b028b48a
                                  MS-RequestId: de25eefa-e23f-4388-b5f6-2b191efacb90
                                  MS-CV: 9fDD47sIgEugZi/x.0
                                  X-Microsoft-SLSClientCache: 2160
                                  Content-Disposition: attachment; filename=environment.cab
                                  X-Content-Type-Options: nosniff
                                  Date: Fri, 03 May 2024 18:09:50 GMT
                                  Connection: close
                                  Content-Length: 25457
                                  2024-05-03 18:09:51 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 51 22 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 db 8e 00 00 14 00 00 00 00 00 10 00 51 22 00 00 20 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 f3 43 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 0d 92 6f db e5 21 f3 43 43 4b ed 5a 09 38 55 5b df 3f 93 99 90 29 99 e7 29 ec 73 cc 4a 66 32 cf 84 32 64 c8 31 c7 11 52 38 87 90 42 66 09 99 87 32 0f 19 0a 09 51 a6 a8 08 29 53 86 4a 52 84 50 df 46 83 ba dd 7b df fb 7e ef 7d ee 7d bf ef 9e e7 d9 67 ef 35 ee b5 fe eb 3f ff b6 96 81 a2 0a 04 fc 31 40 21 5b 3f a5 ed 1b 04 0e 85 42 a0 10 04 64 12 6c a5 de aa a1 d8 ea f3 58 01 f2 f5 67 0b 5e 9b bd e8 a0 90 1d bf 40 88 9d eb 49 b4 87 9b ab 8b 9d 2b 46 c8 c7 c5 19 92
                                  Data Ascii: MSCFQ"DQ" AdCenvironment.cabo!CCKZ8U[?))sJf22d1R8Bf2Q)SJRPF{~}}g5?1@![?BdlXg^@I+F
                                  2024-05-03 18:09:51 UTC9633INData Raw: 21 6f b3 eb a6 cc f5 31 be cf 05 e2 a9 fe fa 57 6d 19 30 b3 c2 c5 66 c9 6a df f5 e7 f0 78 bd c7 a8 9e 25 e3 f9 bc ed 6b 54 57 08 2b 51 82 44 12 fb b9 53 8c cc f4 60 12 8a 76 cc 40 40 41 9b dc 5c 17 ff 5c f9 5e 17 35 98 24 56 4b 74 ef 42 10 c8 af bf 7f c6 7f f2 37 7d 5a 3f 1c f2 99 79 4a 91 52 00 af 38 0f 17 f5 2f 79 81 65 d9 a9 b5 6b e4 c7 ce f6 ca 7a 00 6f 4b 30 44 24 22 3c cf ed 03 a5 96 8f 59 29 bc b6 fd 04 e1 70 9f 32 4a 27 fd 55 af 2f fe b6 e5 8e 33 bb 62 5f 9a db 57 40 e9 f1 ce 99 66 90 8c ff 6a 62 7f dd c5 4a 0b 91 26 e2 39 ec 19 4a 71 63 9d 7b 21 6d c3 9c a3 a2 3c fa 7f 7d 96 6a 90 78 a6 6d d2 e1 9c f9 1d fc 38 d8 94 f4 c6 a5 0a 96 86 a4 bd 9e 1a ae 04 42 83 b8 b5 80 9b 22 38 20 b5 25 e5 64 ec f7 f4 bf 7e 63 59 25 0f 7a 2e 39 57 76 a2 71 aa 06 8a
                                  Data Ascii: !o1Wm0fjx%kTW+QDS`v@@A\\^5$VKtB7}Z?yJR8/yekzoK0D$"<Y)p2J'U/3b_W@fjbJ&9Jqc{!m<}jxm8B"8 %d~cY%z.9Wvq


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:20:08:51
                                  Start date:03/05/2024
                                  Path:C:\Users\user\Desktop\bUPt.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\bUPt.exe"
                                  Imagebase:0xa20000
                                  File size:32'768 bytes
                                  MD5 hash:B0F3CA4450A2F669B927AE1517DAC1E7
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.1624089626.0000000000A22000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:20:08:56
                                  Start date:03/05/2024
                                  Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://%3cfnc1%3e(79)/
                                  Imagebase:0x7ff76e190000
                                  File size:3'242'272 bytes
                                  MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:false

                                  Target ID:3
                                  Start time:20:08:57
                                  Start date:03/05/2024
                                  Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1988,i,13026046254637796549,1595632273730165584,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                                  Imagebase:0x7ff76e190000
                                  File size:3'242'272 bytes
                                  MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:false

                                  Target ID:7
                                  Start time:20:09:33
                                  Start date:03/05/2024
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\bUPt.exe"
                                  Imagebase:0x240000
                                  File size:236'544 bytes
                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:8
                                  Start time:20:09:33
                                  Start date:03/05/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:14.4%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:2.1%
                                    Total number of Nodes:145
                                    Total number of Limit Nodes:8
                                    execution_graph 6691 5262426 6693 526245b GetExitCodeProcess 6691->6693 6694 5262484 6693->6694 6821 5260366 6822 526039e MapViewOfFile 6821->6822 6824 52603ed 6822->6824 6825 52625e6 6826 526261b SetProcessWorkingSetSize 6825->6826 6828 5262647 6826->6828 6695 fea7fa 6696 fea832 RegOpenKeyExW 6695->6696 6698 fea888 6696->6698 6699 feb9f6 6702 feba2b ReadFile 6699->6702 6701 feba5d 6702->6701 6829 feb736 6830 feb76b GetFileType 6829->6830 6832 feb798 6830->6832 6703 526212a 6706 5262153 LookupPrivilegeValueW 6703->6706 6705 526217a 6706->6705 6707 5261daa 6708 5261de2 RegCreateKeyExW 6707->6708 6710 5261e54 6708->6710 6711 52622aa 6712 52622d9 AdjustTokenPrivileges 6711->6712 6714 52622fb 6712->6714 6715 52601b6 6716 52601ee ConvertStringSecurityDescriptorToSecurityDescriptorW 6715->6716 6718 526022f 6716->6718 6719 5260032 6720 5260082 GetComputerNameW 6719->6720 6721 5260090 6720->6721 6833 feac2a 6834 feac68 DuplicateHandle 6833->6834 6835 feaca0 6833->6835 6836 feac76 6834->6836 6835->6834 6837 5260ff2 6839 526102d LoadLibraryA 6837->6839 6840 526106a 6839->6840 6722 52637be 6724 52637f3 RegDeleteKeyW 6722->6724 6725 526382b 6724->6725 6726 52609be 6727 52609f9 getaddrinfo 6726->6727 6729 5260a6b 6727->6729 6730 5262e3a 6732 5262e66 LoadLibraryShim 6730->6732 6733 5262e94 6732->6733 6734 febd62 6735 febd9a setsockopt 6734->6735 6736 febdd2 6734->6736 6737 febda8 6735->6737 6736->6735 6841 5261f7a 6844 5261faf ioctlsocket 6841->6844 6843 5261fdb 6844->6843 6738 febc5e 6740 febc96 WSASocketW 6738->6740 6741 febcd2 6740->6741 6849 feb61e 6850 feb656 CreateFileW 6849->6850 6852 feb6a5 6850->6852 6742 5262502 6744 5262537 GetProcessWorkingSetSize 6742->6744 6745 5262563 6744->6745 6746 fea2da 6747 fea32f 6746->6747 6748 fea306 SetErrorMode 6746->6748 6747->6748 6749 fea31b 6748->6749 6750 15d03f8 KiUserExceptionDispatcher 6751 15d042c 6750->6751 6853 fea392 6854 fea3c7 RegQueryValueExW 6853->6854 6856 fea41b 6854->6856 6861 52639ca 6862 5263a2f 6861->6862 6863 52639f9 WaitForInputIdle 6861->6863 6862->6863 6864 5263a07 6863->6864 6752 15d0972 6753 15d0622 6752->6753 6758 15d0998 6753->6758 6763 15d0a13 6753->6763 6768 15d0a01 6753->6768 6773 15d0a1a 6753->6773 6759 15d09d3 6758->6759 6760 15d0ad7 6759->6760 6778 15d0cf8 6759->6778 6782 15d0ce6 6759->6782 6764 15d0a18 6763->6764 6765 15d0ad7 6764->6765 6766 15d0cf8 2 API calls 6764->6766 6767 15d0ce6 2 API calls 6764->6767 6766->6765 6767->6765 6769 15d0a06 6768->6769 6770 15d0ad7 6769->6770 6771 15d0cf8 2 API calls 6769->6771 6772 15d0ce6 2 API calls 6769->6772 6771->6770 6772->6770 6774 15d0a1f 6773->6774 6775 15d0ad7 6774->6775 6776 15d0cf8 2 API calls 6774->6776 6777 15d0ce6 2 API calls 6774->6777 6776->6775 6777->6775 6779 15d0d23 6778->6779 6780 15d0d6a 6779->6780 6786 15d11c2 6779->6786 6780->6760 6783 15d0cf8 6782->6783 6784 15d0d6a 6783->6784 6785 15d11c2 2 API calls 6783->6785 6784->6760 6785->6784 6787 15d11f5 6786->6787 6788 15d1233 6787->6788 6791 5260d66 6787->6791 6794 5260d10 6787->6794 6788->6780 6792 5260db6 GetVolumeInformationA 6791->6792 6793 5260dbe 6792->6793 6793->6788 6795 5260d66 GetVolumeInformationA 6794->6795 6797 5260dbe 6795->6797 6797->6788 6798 5263b16 6799 5263b4b PostMessageW 6798->6799 6801 5263b76 6798->6801 6800 5263b60 6799->6800 6801->6799 6802 feadce 6803 feadfa closesocket 6802->6803 6805 feae30 6802->6805 6804 feae08 6803->6804 6805->6803 6806 fea74e 6807 fea77a FindCloseChangeNotification 6806->6807 6808 fea7b9 6806->6808 6809 fea788 6807->6809 6808->6807 6865 5262056 6866 526207f select 6865->6866 6868 52620b4 6866->6868 6869 52608d2 6871 5260907 GetProcessTimes 6869->6871 6872 5260939 6871->6872 6810 fea646 6811 fea67e CreateMutexW 6810->6811 6813 fea6c1 6811->6813 6814 5260b9e 6815 5260bd3 WSAConnect 6814->6815 6817 5260bf2 6815->6817 6873 fea486 6875 fea4bb RegSetValueExW 6873->6875 6876 fea507 6875->6876 6877 fea186 6878 fea1bb send 6877->6878 6879 fea1f3 6877->6879 6880 fea1c9 6878->6880 6879->6878

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 15d19f0-15d1a4c 4 15d2f39-15d2f5a 0->4 5 15d1a52-15d1a66 0->5 8 15d2f5c-15d2f66 4->8 9 15d2fc6-15d3002 4->9 10 15d1a68-15d1a6f 5->10 11 15d1a74-15d1a85 5->11 12 15d2f6c-15d2fbc 8->12 13 15d3069 8->13 28 15d304d-15d3052 9->28 29 15d3004-15d304b call 15d13b0 9->29 14 15d306e-15d3075 10->14 18 15d1acc-15d1add 11->18 19 15d1a87-15d1ac7 call 15d13b0 11->19 12->9 26 15d2fbe-15d2fc0 12->26 13->14 24 15d1ae3-15d1aed 18->24 25 15d1c12-15d1c23 18->25 19->14 24->4 30 15d1af3-15d1b07 24->30 35 15d1c29-15d1c33 25->35 36 15d1e61-15d1e72 25->36 26->9 42 15d305d-15d3067 28->42 29->42 39 15d1b09-15d1b13 30->39 40 15d1b3b-15d1b4c 30->40 35->4 41 15d1c39-15d1c40 35->41 48 15d2288-15d2299 36->48 49 15d1e78-15d1e82 36->49 39->4 45 15d1b19-15d1b26 39->45 55 15d1bdd-15d1bee 40->55 56 15d1b52-15d1b5c 40->56 41->4 46 15d1c46-15d1c4b 41->46 42->14 45->4 50 15d1b2c-15d1b36 call 15d1598 45->50 51 15d1d0d-15d1d36 46->51 52 15d1c51-15d1c7a 46->52 72 15d229f-15d22a9 48->72 73 15d2583-15d2594 48->73 49->4 60 15d1e88-15d1eb8 call 15d0550 49->60 50->14 99 15d1d71-15d1d8d call 15d13b0 51->99 80 15d1c7c-15d1ca0 52->80 81 15d1ccf-15d1d08 call 15d13b0 * 2 52->81 55->14 75 15d1bf4-15d1bfe 55->75 56->4 62 15d1b62-15d1b6f 56->62 60->4 100 15d1ebe-15d1edf 60->100 62->4 68 15d1b75-15d1bd8 call 15d1598 call 15d0550 call 15d13b0 62->68 68->14 72->4 79 15d22af-15d22df call 15d0550 72->79 87 15d259a-15d2761 73->87 88 15d2932-15d2943 73->88 75->4 82 15d1c04-15d1c0d 75->82 79->4 125 15d22e5-15d2306 79->125 104 15d1cca 80->104 105 15d1ca2-15d1cc5 80->105 81->14 82->14 87->4 314 15d2767-15d277f 87->314 112 15d29fe-15d2a0f 88->112 113 15d2949-15d2953 88->113 99->4 129 15d1d93-15d1dfd call 15d13b0 99->129 109 15d1f68-15d1f6f 100->109 110 15d1ee5-15d1f63 call 15d13b0 100->110 104->81 105->99 117 15d2069-15d217e call 15d13b0 109->117 118 15d1f75-15d1ff1 109->118 110->14 135 15d2a15-15d2a1f 112->135 136 15d2c51-15d2c62 112->136 113->4 121 15d2959-15d296d 113->121 117->4 347 15d2184-15d21c8 117->347 118->4 246 15d1ff7-15d202f 118->246 141 15d296f 121->141 142 15d297a-15d298b 121->142 133 15d230c-15d238a call 15d13b0 125->133 134 15d238f-15d2396 125->134 129->14 133->14 145 15d239c-15d23e5 134->145 146 15d241f-15d257e call 15d13b0 * 2 134->146 135->4 140 15d2a25-15d2a2c 135->140 157 15d2c68-15d2c6f 136->157 158 15d2de1-15d2df2 136->158 140->4 151 15d2a32-15d2a37 140->151 413 15d296f call 15d316c 141->413 414 15d296f call 15d3081 141->414 415 15d296f call 15d31a0 141->415 416 15d296f call 15d31b2 141->416 172 15d298d-15d29ac 142->172 173 15d29b1-15d29c2 142->173 202 15d23eb-15d241a call 15d1598 145->202 203 15d2f34 145->203 146->14 159 15d2a3d-15d2a80 151->159 160 15d2aeb-15d2b1a 151->160 168 15d2cfe-15d2d65 157->168 169 15d2c75-15d2c9e call 15d13b0 157->169 158->14 183 15d2df8-15d2e3b 158->183 226 15d2aad-15d2ae6 call 15d13b0 * 2 159->226 227 15d2a82-15d2aa8 159->227 220 15d2b55-15d2c4c call 15d13b0 * 2 160->220 162 15d2975 162->14 168->4 233 15d2d6b-15d2d94 168->233 196 15d2cdc-15d2cf8 169->196 197 15d2ca0-15d2ca3 169->197 172->14 173->14 201 15d29c8-15d29f9 173->201 183->203 247 15d2e41-15d2f2f 183->247 196->14 196->168 197->203 206 15d2ca9-15d2cda 197->206 201->14 202->146 203->4 206->196 206->197 220->14 226->14 227->220 233->14 260 15d2d9a-15d2d9e 233->260 246->203 298 15d2035-15d2064 call 15d1598 246->298 247->14 260->4 269 15d2da4-15d2ddc 260->269 269->14 298->117 314->4 322 15d2785-15d289d call 15d3081 314->322 393 15d289f-15d28cb 322->393 394 15d28f3-15d28f7 322->394 364 15d21d4-15d223c 347->364 385 15d223e-15d2283 364->385 386 15d21ca 364->386 385->14 386->364 403 15d28cd-15d28cf 393->403 404 15d28d7-15d28da 393->404 397 15d28ff-15d2928 call 15d13e8 394->397 411 15d292d 397->411 403->203 405 15d28d5 403->405 404->203 406 15d28e0-15d28f1 404->406 405->406 406->397 411->14 413->162 414->162 415->162 416->162
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051423885.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_15d0000_bUPt.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $
                                    • API String ID: 0-227171996
                                    • Opcode ID: 4e99b2559347c5eb0311e3079e306b3fc50307fdc76573cee6f1c5c5d43bb066
                                    • Instruction ID: 38f2bb9adcd8274cc7400fe49ca19f630bce1e9f1efbe6a6cca17b2c4b675d23
                                    • Opcode Fuzzy Hash: 4e99b2559347c5eb0311e3079e306b3fc50307fdc76573cee6f1c5c5d43bb066
                                    • Instruction Fuzzy Hash: 34C27C30B002148FCB24DF69C954BAD77E3BB88304F1584A9E509AF7A1DF799D85CB92
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 052622F3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: AdjustPrivilegesToken
                                    • String ID:
                                    • API String ID: 2874748243-0
                                    • Opcode ID: e113087e2f478a564107c4b8683a061cd6363457cfa8c5a625256cc394296241
                                    • Instruction ID: e99462fa2429b5673810026cfd796056cecfd7c28e17c2ffc71951178e422a71
                                    • Opcode Fuzzy Hash: e113087e2f478a564107c4b8683a061cd6363457cfa8c5a625256cc394296241
                                    • Instruction Fuzzy Hash: 1F21BF755093809FDB228F25DC40B52BFB4FF06310F08859AE9858B563D370A908DB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 052622F3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: AdjustPrivilegesToken
                                    • String ID:
                                    • API String ID: 2874748243-0
                                    • Opcode ID: c7ef90712518d58a1f96e3dcf422f7bad780e505ef57bf315eddcebb16ea1c26
                                    • Instruction ID: 2a1f9c6d7debd2755a71cce5b690c2b66265c2acfe985452227db2b2baf95815
                                    • Opcode Fuzzy Hash: c7ef90712518d58a1f96e3dcf422f7bad780e505ef57bf315eddcebb16ea1c26
                                    • Instruction Fuzzy Hash: FF11A035600240DFDB21CF15D984B66FBE4FF08220F08C86ADD498BA56D775E458DB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 417 15d03f8-15d0436 KiUserExceptionDispatcher 420 15d0439-15d043f 417->420 421 15d052d-15d053e 420->421 422 15d0445-15d0448 420->422 423 15d044a 422->423 451 15d044c call 1610606 423->451 452 15d044c call 16105df 423->452 425 15d0451-15d0472 428 15d04b9-15d04bc 425->428 429 15d0474-15d0476 425->429 428->421 430 15d04be-15d04c4 428->430 448 15d0478 call 1610606 429->448 449 15d0478 call 15d164a 429->449 450 15d0478 call 16105df 429->450 430->423 431 15d04c6-15d04cd 430->431 435 15d04cf-15d04e5 431->435 436 15d051e 431->436 432 15d047e-15d0485 433 15d0487-15d04ae 432->433 434 15d04b6 432->434 433->434 434->428 435->421 440 15d04e7-15d04ef 435->440 439 15d0528 436->439 439->420 441 15d04f1-15d04fc 440->441 442 15d0510-15d0516 440->442 441->421 444 15d04fe-15d0508 441->444 442->436 444->442 448->432 449->432 450->432 451->425 452->425
                                    APIs
                                    • KiUserExceptionDispatcher.NTDLL ref: 015D041F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051423885.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_15d0000_bUPt.jbxd
                                    Similarity
                                    • API ID: DispatcherExceptionUser
                                    • String ID:
                                    • API String ID: 6842923-0
                                    • Opcode ID: ddc8ffad27c664e153fb9671f4bc2a04dfa95e2364a8836b33004729325a37dd
                                    • Instruction ID: a34d58730bd108c7db512344c9d4c9417c5e5fb67ef7279846434ca31d640048
                                    • Opcode Fuzzy Hash: ddc8ffad27c664e153fb9671f4bc2a04dfa95e2364a8836b33004729325a37dd
                                    • Instruction Fuzzy Hash: 37315D31A012048FCB24DF7CD9849ADB7E6EF88214F548469E908DB39ADB39DD45CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 453 feb5de-feb676 457 feb67b-feb687 453->457 458 feb678 453->458 459 feb68c-feb695 457->459 460 feb689 457->460 458->457 461 feb6e6-feb6eb 459->461 462 feb697-feb6bb CreateFileW 459->462 460->459 461->462 465 feb6ed-feb6f2 462->465 466 feb6bd-feb6e3 462->466 465->466
                                    APIs
                                    • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00FEB69D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: a4f5a5ba9917103c92209e3dce81518a1171a1288cd4a2be716849607b5b1f5c
                                    • Instruction ID: 6a0497f47371b99812839564ba5254170620068ad52f628415e426360d0eb0bd
                                    • Opcode Fuzzy Hash: a4f5a5ba9917103c92209e3dce81518a1171a1288cd4a2be716849607b5b1f5c
                                    • Instruction Fuzzy Hash: 3831A371505380AFE722CF65DD44BA2BFF8EF06314F08889AE9848B652D375A909DB71
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 469 15d03e8-15d03f6 470 15d03f8-15d0425 KiUserExceptionDispatcher 469->470 471 15d042c-15d0436 470->471 473 15d0439-15d043f 471->473 474 15d052d-15d053e 473->474 475 15d0445-15d0448 473->475 476 15d044a 475->476 501 15d044c call 1610606 476->501 502 15d044c call 16105df 476->502 478 15d0451-15d0472 481 15d04b9-15d04bc 478->481 482 15d0474-15d0476 478->482 481->474 483 15d04be-15d04c4 481->483 503 15d0478 call 1610606 482->503 504 15d0478 call 15d164a 482->504 505 15d0478 call 16105df 482->505 483->476 484 15d04c6-15d04cd 483->484 488 15d04cf-15d04e5 484->488 489 15d051e 484->489 485 15d047e-15d0485 486 15d0487-15d04ae 485->486 487 15d04b6 485->487 486->487 487->481 488->474 493 15d04e7-15d04ef 488->493 492 15d0528 489->492 492->473 494 15d04f1-15d04fc 493->494 495 15d0510-15d0516 493->495 494->474 497 15d04fe-15d0508 494->497 495->489 497->495 501->478 502->478 503->485 504->485 505->485
                                    APIs
                                    • KiUserExceptionDispatcher.NTDLL ref: 015D041F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051423885.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_15d0000_bUPt.jbxd
                                    Similarity
                                    • API ID: DispatcherExceptionUser
                                    • String ID:
                                    • API String ID: 6842923-0
                                    • Opcode ID: ccf08a42c22bdd0232853dd6ae88de7cefdd1c0b6e61db79768124eae8951c3d
                                    • Instruction ID: 7077c4763c7b4f79af67b15f37c40e67b4684b186bdf8273cb53de6eb3a74024
                                    • Opcode Fuzzy Hash: ccf08a42c22bdd0232853dd6ae88de7cefdd1c0b6e61db79768124eae8951c3d
                                    • Instruction Fuzzy Hash: 25415271A012048FCB14DF78C984A9DBBE6EF88204F548469E809DF39ADB35DD41CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 506 5261d7e-5261e02 510 5261e07-5261e13 506->510 511 5261e04 506->511 512 5261e15 510->512 513 5261e18-5261e21 510->513 511->510 512->513 514 5261e26-5261e3d 513->514 515 5261e23 513->515 517 5261e7f-5261e84 514->517 518 5261e3f-5261e52 RegCreateKeyExW 514->518 515->514 517->518 519 5261e86-5261e8b 518->519 520 5261e54-5261e7c 518->520 519->520
                                    APIs
                                    • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 05261E45
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 1589bce7bce4f28d9901dfbe4c563b3dca554c1b3bbaf424d0912c7f32c1e625
                                    • Instruction ID: 20ccdabcebad2b9462bcf78ae8200708c942ba5ed64b95564f52a750e6274887
                                    • Opcode Fuzzy Hash: 1589bce7bce4f28d9901dfbe4c563b3dca554c1b3bbaf424d0912c7f32c1e625
                                    • Instruction Fuzzy Hash: 91319272504344AFE722CB65CC44F67BFFCEF09210F04859AE985CB662D324E958CB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 525 febb4b-febb6b 526 febb8d-febbbf 525->526 527 febb6d-febb8c 525->527 531 febbc2-febc1a RegQueryValueExW 526->531 527->526 533 febc20-febc36 531->533
                                    APIs
                                    • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 00FEBC12
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: QueryValue
                                    • String ID:
                                    • API String ID: 3660427363-0
                                    • Opcode ID: 4ed3f183b9668b8dc3dceada553bcf376ad18c66eaeeb48a0574a1edc498d3c4
                                    • Instruction ID: 6c21b8d9294be88867ed64870c8f2d4c1a1e4b92047bf3b951f6a0306990cf0d
                                    • Opcode Fuzzy Hash: 4ed3f183b9668b8dc3dceada553bcf376ad18c66eaeeb48a0574a1edc498d3c4
                                    • Instruction Fuzzy Hash: A0319E6510E3C06FD3138B258C61A62BFB4EF47610F0E45DBD8C48F6A3D229A909D7B2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 534 fea7c7-fea855 538 fea85a-fea871 534->538 539 fea857 534->539 541 fea8b3-fea8b8 538->541 542 fea873-fea886 RegOpenKeyExW 538->542 539->538 541->542 543 fea8ba-fea8bf 542->543 544 fea888-fea8b0 542->544 543->544
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 00FEA879
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID:
                                    • API String ID: 71445658-0
                                    • Opcode ID: ae134705f132ac77ea3ba54be82cf5c70b93457cbb47ffa22431fd3f129720a5
                                    • Instruction ID: 6d68ed6d4b0431cf6b9ec461e5d95bbc49360a795876b6c9c917835971663a14
                                    • Opcode Fuzzy Hash: ae134705f132ac77ea3ba54be82cf5c70b93457cbb47ffa22431fd3f129720a5
                                    • Instruction Fuzzy Hash: E531C7764083806FE7228B55CC44FA7BFBCEF16314F04849AE980CB653D224E90AC771
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 549 526099c-5260a5b 555 5260aad-5260ab2 549->555 556 5260a5d-5260a65 getaddrinfo 549->556 555->556 557 5260a6b-5260a7d 556->557 559 5260ab4-5260ab9 557->559 560 5260a7f-5260aaa 557->560 559->560
                                    APIs
                                    • getaddrinfo.WS2_32(?,00000E24), ref: 05260A63
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: getaddrinfo
                                    • String ID:
                                    • API String ID: 300660673-0
                                    • Opcode ID: 4c462eae75268d5d26e6130e09eafbcb5bfb73b2cef0bbbaee1b5b9f5799e55c
                                    • Instruction ID: ecb28b8ca0c3d110b76269959a1dc437a50d2a77aee74fc253ac43017504cec8
                                    • Opcode Fuzzy Hash: 4c462eae75268d5d26e6130e09eafbcb5bfb73b2cef0bbbaee1b5b9f5799e55c
                                    • Instruction Fuzzy Hash: 5E31B1B1500340AFEB21CB51CC44FA6FBACEF05714F04889AFA889B681D375E949CB71
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 580 5260190-5260211 584 5260216-526021f 580->584 585 5260213 580->585 586 5260277-526027c 584->586 587 5260221-5260229 ConvertStringSecurityDescriptorToSecurityDescriptorW 584->587 585->584 586->587 588 526022f-5260241 587->588 590 5260243-5260274 588->590 591 526027e-5260283 588->591 591->590
                                    APIs
                                    • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 05260227
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: DescriptorSecurity$ConvertString
                                    • String ID:
                                    • API String ID: 3907675253-0
                                    • Opcode ID: 0baed2a9eb2ff4b44331107c6763520053aa2573ec0cb9239e1c5b326dd6020e
                                    • Instruction ID: 80804d02a30b97580992b6f829b8defd54df2e1cedaf5c9349e31ce19703fcba
                                    • Opcode Fuzzy Hash: 0baed2a9eb2ff4b44331107c6763520053aa2573ec0cb9239e1c5b326dd6020e
                                    • Instruction Fuzzy Hash: 1931C371504385AFEB22CB65DC45FA7BFF8EF05210F0884AAE944CB652D324E948CB71
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 564 fea612-fea695 568 fea69a-fea6a3 564->568 569 fea697 564->569 570 fea6a8-fea6b1 568->570 571 fea6a5 568->571 569->568 572 fea702-fea707 570->572 573 fea6b3-fea6d7 CreateMutexW 570->573 571->570 572->573 576 fea709-fea70e 573->576 577 fea6d9-fea6ff 573->577 576->577
                                    APIs
                                    • CreateMutexW.KERNELBASE(?,?), ref: 00FEA6B9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: CreateMutex
                                    • String ID:
                                    • API String ID: 1964310414-0
                                    • Opcode ID: 958aad2c9dbc61db94457c3cad4fd6a1b6655e4131115e8cf471d5e1213f8c84
                                    • Instruction ID: 72aebea8dcd991a86f6bb44740bec819185f932dde0f57fffc80c96e6b709146
                                    • Opcode Fuzzy Hash: 958aad2c9dbc61db94457c3cad4fd6a1b6655e4131115e8cf471d5e1213f8c84
                                    • Instruction Fuzzy Hash: EB3193755093805FE722CB25DC85B96BFF8EF06314F08849AE984CF692D375E909C762
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 595 5260894-5260929 600 5260976-526097b 595->600 601 526092b-5260933 GetProcessTimes 595->601 600->601 603 5260939-526094b 601->603 604 526097d-5260982 603->604 605 526094d-5260973 603->605 604->605
                                    APIs
                                    • GetProcessTimes.KERNELBASE(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 05260931
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: ProcessTimes
                                    • String ID:
                                    • API String ID: 1995159646-0
                                    • Opcode ID: a11686ef1db38be351fcc1663c5a99967c85fb25e6c8e9fa08e183f699a041da
                                    • Instruction ID: d4dac1b051920ad190409513064a4b3c0faf8604dfc94d637b323ca7d139a4da
                                    • Opcode Fuzzy Hash: a11686ef1db38be351fcc1663c5a99967c85fb25e6c8e9fa08e183f699a041da
                                    • Instruction Fuzzy Hash: E531D9725053805FE7228F54DD45F96BFB8EF06314F04889AE9848F553D325A949C771
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 608 5261daa-5261e02 611 5261e07-5261e13 608->611 612 5261e04 608->612 613 5261e15 611->613 614 5261e18-5261e21 611->614 612->611 613->614 615 5261e26-5261e3d 614->615 616 5261e23 614->616 618 5261e7f-5261e84 615->618 619 5261e3f-5261e52 RegCreateKeyExW 615->619 616->615 618->619 620 5261e86-5261e8b 619->620 621 5261e54-5261e7c 619->621 620->621
                                    APIs
                                    • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 05261E45
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 51c5f16c2bfa9442d3c2c6c5e1d77c2c59822543e0062f76f2b4feb1ca1ae32e
                                    • Instruction ID: 5ea94c01df1c62125a31bc2d752987e0c65176452a5bc9fe9a9266b42710a845
                                    • Opcode Fuzzy Hash: 51c5f16c2bfa9442d3c2c6c5e1d77c2c59822543e0062f76f2b4feb1ca1ae32e
                                    • Instruction Fuzzy Hash: F1218D72500304AFEB31DE55CD44FA7BBECEF08614F04896AE949C6A51D734E558CAB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 626 52609be-5260a5b 631 5260aad-5260ab2 626->631 632 5260a5d-5260a65 getaddrinfo 626->632 631->632 633 5260a6b-5260a7d 632->633 635 5260ab4-5260ab9 633->635 636 5260a7f-5260aaa 633->636 635->636
                                    APIs
                                    • getaddrinfo.WS2_32(?,00000E24), ref: 05260A63
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: getaddrinfo
                                    • String ID:
                                    • API String ID: 300660673-0
                                    • Opcode ID: 1ab998940a5681345c54bb3f1e7d6319e0b3e71a1ecf23be825bd6ef2faf592c
                                    • Instruction ID: 1ea68d971622ae8d8aa332536ea0741e69bdf82db226859b9efe18926b9d696d
                                    • Opcode Fuzzy Hash: 1ab998940a5681345c54bb3f1e7d6319e0b3e71a1ecf23be825bd6ef2faf592c
                                    • Instruction Fuzzy Hash: 4821D371101300AEFB31DB55CC44FA6F7ACEF14714F04886AFA489A681D775E949CB71
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 640 5260d10-5260db8 GetVolumeInformationA 643 5260dbe-5260de7 640->643
                                    APIs
                                    • GetVolumeInformationA.KERNELBASE(?,00000E24,?,?), ref: 05260DB6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: InformationVolume
                                    • String ID:
                                    • API String ID: 2039140958-0
                                    • Opcode ID: 7cacecb2354f39415b6daf0fb6ea5ba4f83622f98d2d2abe134e555b781bbcf1
                                    • Instruction ID: 19e43342784baee0e85db1b75b489a6696f3bd85ef2066b81ce592499237e0b3
                                    • Opcode Fuzzy Hash: 7cacecb2354f39415b6daf0fb6ea5ba4f83622f98d2d2abe134e555b781bbcf1
                                    • Instruction Fuzzy Hash: C731C17150E3C16FD3138B258C51B62BFB8EF47210F0981DBE884CF693D225A949C7A2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: select
                                    • String ID:
                                    • API String ID: 1274211008-0
                                    • Opcode ID: 0095a8d9569b905b01747aeb66ca227f96febebc0e87ba74bacd3e5e72f75116
                                    • Instruction ID: eb1405f6ba61771c1bb4c1523d34d8648abb653541493f793c742c004ee4e65b
                                    • Opcode Fuzzy Hash: 0095a8d9569b905b01747aeb66ca227f96febebc0e87ba74bacd3e5e72f75116
                                    • Instruction Fuzzy Hash: 67218F755093849FDB22CF25CC44A52BFF8FF16210F0888DAE889CB162D225E949CB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 645 fea370-fea3cf 648 fea3d4-fea3dd 645->648 649 fea3d1 645->649 650 fea3df 648->650 651 fea3e2-fea3e8 648->651 649->648 650->651 652 fea3ed-fea404 651->652 653 fea3ea 651->653 655 fea43b-fea440 652->655 656 fea406-fea419 RegQueryValueExW 652->656 653->652 655->656 657 fea41b-fea438 656->657 658 fea442-fea447 656->658 658->657
                                    APIs
                                    • RegQueryValueExW.KERNELBASE(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 00FEA40C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: QueryValue
                                    • String ID:
                                    • API String ID: 3660427363-0
                                    • Opcode ID: cc8525f0e2f5fdf55ed0052c7885adb80265a610a5c886a9775fecd6b2daf3a7
                                    • Instruction ID: 2c9cf41505eeb97441f1c26e2eac9cc033a6957e4aa0c3183dc1be6643c0c9a2
                                    • Opcode Fuzzy Hash: cc8525f0e2f5fdf55ed0052c7885adb80265a610a5c886a9775fecd6b2daf3a7
                                    • Instruction Fuzzy Hash: C5218D71504780AFD721CF15CC84FA6BBF8EF05720F08849AE985CB692D364E909CB62
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetExitCodeProcess.KERNELBASE(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 0526247C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: CodeExitProcess
                                    • String ID:
                                    • API String ID: 3861947596-0
                                    • Opcode ID: 5d21a9f0b24bd8d1f009b69104b772051d906507ba50bd5323dcc31c947473ce
                                    • Instruction ID: 746455987bc9744700869b80618666dfed8e43e6286c856c01116e2fe1a5e95c
                                    • Opcode Fuzzy Hash: 5d21a9f0b24bd8d1f009b69104b772051d906507ba50bd5323dcc31c947473ce
                                    • Instruction Fuzzy Hash: A721A4755093806FE712CB14DC45FA6BFB8EF46314F0884EAE944DF692D268A909C771
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: FileView
                                    • String ID:
                                    • API String ID: 3314676101-0
                                    • Opcode ID: 3ee754172b70d2798d494afdc24831786c050e597c5e5ebe908438b04d15f078
                                    • Instruction ID: 6306576a3de4e57fcd1ff4ab6af460b6393352406686a24d1dfc0e9393d94e4e
                                    • Opcode Fuzzy Hash: 3ee754172b70d2798d494afdc24831786c050e597c5e5ebe908438b04d15f078
                                    • Instruction Fuzzy Hash: F521EF71504380AFE722CB15DC44FA6FFF8EF09224F0488AEE9848B652D375A909CB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegSetValueExW.KERNELBASE(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 00FEA4F8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: Value
                                    • String ID:
                                    • API String ID: 3702945584-0
                                    • Opcode ID: aae304e2565ed11d087ab5690e008571d6522f95aded34edbebaa8ff63dcc604
                                    • Instruction ID: e1e637bc59c416b09aaf84d8f0b313be96e741d11fdc390646488c65d1730391
                                    • Opcode Fuzzy Hash: aae304e2565ed11d087ab5690e008571d6522f95aded34edbebaa8ff63dcc604
                                    • Instruction Fuzzy Hash: 6A2181725043806FD7228B15DC44F67BFB8EF46724F08849AE985CB692D264E909D772
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • WSASocketW.WS2_32(?,?,?,?,?), ref: 00FEBCCA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: Socket
                                    • String ID:
                                    • API String ID: 38366605-0
                                    • Opcode ID: 4593ed1e3b4c69609196c7f66558032e5712bf86b2380372ef197d1ff06969b2
                                    • Instruction ID: c4960f1aa9c1e3db05b21df1c983ec4fa774e24848a43e97375a57e167232ccc
                                    • Opcode Fuzzy Hash: 4593ed1e3b4c69609196c7f66558032e5712bf86b2380372ef197d1ff06969b2
                                    • Instruction Fuzzy Hash: 1F21A071505380AFE722CF55DD45F96FFB8EF09320F0888AEE9858B652C375A909CB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 05260227
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: DescriptorSecurity$ConvertString
                                    • String ID:
                                    • API String ID: 3907675253-0
                                    • Opcode ID: 6f33c9a40ae2da397d8200e32824ce10417a6b17697b5dc86b4a2cb534879715
                                    • Instruction ID: 01975843c4eeed32c3087c501608788d49e60c3364c240d120548055ef258e48
                                    • Opcode Fuzzy Hash: 6f33c9a40ae2da397d8200e32824ce10417a6b17697b5dc86b4a2cb534879715
                                    • Instruction Fuzzy Hash: 6B21D172600204AFEB20DF69DD45FABBBECEF04614F04886AED48DBA51D774E5488A71
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 05262172
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: LookupPrivilegeValue
                                    • String ID:
                                    • API String ID: 3899507212-0
                                    • Opcode ID: 393d91240ffca466c9525866df2d1955bcef25cf44574613ea32a01c1a56f9fb
                                    • Instruction ID: 0cfa6afa6e0d30e4173b32bab518b5efd092ca0e1ed840bab28083fafe0a146b
                                    • Opcode Fuzzy Hash: 393d91240ffca466c9525866df2d1955bcef25cf44574613ea32a01c1a56f9fb
                                    • Instruction Fuzzy Hash: C321C4B66093C09FDB13CB25CC50B52BFB8AF46214F0884DAE988CF253D225D848C771
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00FEB69D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 40c5efef6f64321361385a2895133aab16eb0cd84a9e54a297437300400ce64e
                                    • Instruction ID: 732780ffb48291c1632259fe53b500843de5d984efef9fbac4be010db6806785
                                    • Opcode Fuzzy Hash: 40c5efef6f64321361385a2895133aab16eb0cd84a9e54a297437300400ce64e
                                    • Instruction Fuzzy Hash: 00219272600240AFEB21CF66DD85F67FBE8EF08324F0488A9E9458B651D775E508DB71
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegQueryValueExW.KERNELBASE(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 0526013C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: QueryValue
                                    • String ID:
                                    • API String ID: 3660427363-0
                                    • Opcode ID: 880249bc118812cca505caa4cefa7fcbd2b9fc9f7eb53aa8b0afe944321d59cb
                                    • Instruction ID: 727d0c281f86f1d935fe2cf3ec63693d67add85603a1c606366935b7c7ef8235
                                    • Opcode Fuzzy Hash: 880249bc118812cca505caa4cefa7fcbd2b9fc9f7eb53aa8b0afe944321d59cb
                                    • Instruction Fuzzy Hash: EF21CF72504340AFD722CF15CC84FA7BBF8EF05610F08889AE945CB652C324E949CB71
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetFileType.KERNELBASE(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 00FEB789
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: FileType
                                    • String ID:
                                    • API String ID: 3081899298-0
                                    • Opcode ID: 855c5e8b2656b80f86032d516ef34183a6956ce22a57376681355e07a924d1c5
                                    • Instruction ID: b3f7eb8955d5e2e7ec4dfff78377843e555dbacf7fff2e1ee35e224b20929e74
                                    • Opcode Fuzzy Hash: 855c5e8b2656b80f86032d516ef34183a6956ce22a57376681355e07a924d1c5
                                    • Instruction Fuzzy Hash: EA212CB55087806FE7128B15DC84BA3BFBCEF46724F0884DAED858B653D324A909C771
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 00FEA879
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID:
                                    • API String ID: 71445658-0
                                    • Opcode ID: daca0be9d9ab2fd2a0693b72de4b409881f8097db08b50d513231494d99fa2e1
                                    • Instruction ID: 60bab82b2951046e22f46f7ae8997a8e2f37780a02f871f1abfee4288394f6f1
                                    • Opcode Fuzzy Hash: daca0be9d9ab2fd2a0693b72de4b409881f8097db08b50d513231494d99fa2e1
                                    • Instruction Fuzzy Hash: F221D472500304AFE7319F55CD44FABFBECEF14724F04886AE9458BA51D734E9098AB2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetProcessWorkingSetSize.KERNEL32(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 0526263F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: ProcessSizeWorking
                                    • String ID:
                                    • API String ID: 3584180929-0
                                    • Opcode ID: bda7575af7fcd7ef0c6f35178d6d9cc6fd1f7a1344399889f53fd2b1f644477d
                                    • Instruction ID: e58488cb1dc4d1a78034886cb55f884b4382424ecf0b3687288882663c9daf18
                                    • Opcode Fuzzy Hash: bda7575af7fcd7ef0c6f35178d6d9cc6fd1f7a1344399889f53fd2b1f644477d
                                    • Instruction Fuzzy Hash: 3721D4715053806FEB22CB15CC44FA7BFB8EF45214F08C8AAE944CB652D374A908CB71
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetProcessWorkingSetSize.KERNEL32(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 0526255B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: ProcessSizeWorking
                                    • String ID:
                                    • API String ID: 3584180929-0
                                    • Opcode ID: bda7575af7fcd7ef0c6f35178d6d9cc6fd1f7a1344399889f53fd2b1f644477d
                                    • Instruction ID: dae9345c07e6113338441dc3278e506d97fe69b7baa3bd03c7ca6b724864ac58
                                    • Opcode Fuzzy Hash: bda7575af7fcd7ef0c6f35178d6d9cc6fd1f7a1344399889f53fd2b1f644477d
                                    • Instruction Fuzzy Hash: AB2192715053806FEB22CB55DC45FABBFA8EF45214F08C8AAE944DB652D374A908CB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateMutexW.KERNELBASE(?,?), ref: 00FEA6B9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: CreateMutex
                                    • String ID:
                                    • API String ID: 1964310414-0
                                    • Opcode ID: ae80225de03e23e3f2aff7b1775f6b3d125f198804790b8bc1348f807b0a430f
                                    • Instruction ID: 0067485c2721f53a1324dff6247b2027713b7275802b83f210a101d741ac4024
                                    • Opcode Fuzzy Hash: ae80225de03e23e3f2aff7b1775f6b3d125f198804790b8bc1348f807b0a430f
                                    • Instruction Fuzzy Hash: EA21B0716002409FE720DF2ADD85BA6FBE8EF05324F088869E944CB641D775F909CA72
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegDeleteKeyW.ADVAPI32(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 0526381C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: Delete
                                    • String ID:
                                    • API String ID: 1035893169-0
                                    • Opcode ID: 26e8fcfeb2d1c3387406d1494415611c51d6cbf3e1e9ba0e4005a9a35398a52e
                                    • Instruction ID: 47d985e1eae3dfe9d8e546c2811597bf16e6ab5fd72176ff6c57399d968a6266
                                    • Opcode Fuzzy Hash: 26e8fcfeb2d1c3387406d1494415611c51d6cbf3e1e9ba0e4005a9a35398a52e
                                    • Instruction Fuzzy Hash: 1521F3715093806FD722CB55CC45FA6FFB8EF06620F0884DBE944CB692C264E848C772
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ReadFile.KERNELBASE(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 00FEBA55
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: FileRead
                                    • String ID:
                                    • API String ID: 2738559852-0
                                    • Opcode ID: 797c0a4225a6176d778182f6985410bf1740ec57d9a114b4606587e11cfbf2cc
                                    • Instruction ID: 71e6fb48a0d6587e999104dcaf72b69db266c02d5ecd814f508c291660e455c5
                                    • Opcode Fuzzy Hash: 797c0a4225a6176d778182f6985410bf1740ec57d9a114b4606587e11cfbf2cc
                                    • Instruction Fuzzy Hash: 3721A471505380AFDB22CF55DC44F97BFB8EF45724F0888AAE9849B552C334A909CB71
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ioctlsocket.WS2_32(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 05261FD3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: ioctlsocket
                                    • String ID:
                                    • API String ID: 3577187118-0
                                    • Opcode ID: e17c6e0cbc5230b0ca6cfc8767176f65ee2f708bd2847276c30008e78cb6a9b4
                                    • Instruction ID: bb98edabbc178977767d18bb87cb52dafa3710931d7bbdc7be0db10792c75a42
                                    • Opcode Fuzzy Hash: e17c6e0cbc5230b0ca6cfc8767176f65ee2f708bd2847276c30008e78cb6a9b4
                                    • Instruction Fuzzy Hash: F221C6715053806FD722CF54CC44FA6BFB8EF45314F0888AAE9449B552C374A908C771
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: send
                                    • String ID:
                                    • API String ID: 2809346765-0
                                    • Opcode ID: 2e11bd34bc1d7c6a5c1410d9dcbe97846567f08beb9922d75cd9693e98b8cc04
                                    • Instruction ID: 3808785c4222cee38c05d263f6046ff1ec41675b3db5fde54633d56ad3ba5733
                                    • Opcode Fuzzy Hash: 2e11bd34bc1d7c6a5c1410d9dcbe97846567f08beb9922d75cd9693e98b8cc04
                                    • Instruction Fuzzy Hash: 4D21AC7140D3C09FD7238B21CC94A52BFB4EF07220F0A84DBD9848F5A3C279A809DB62
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegQueryValueExW.KERNELBASE(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 00FEA40C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: QueryValue
                                    • String ID:
                                    • API String ID: 3660427363-0
                                    • Opcode ID: 033380252f4febddcd057623e0f0758e5eeefbbcaa36b6a6169aa2897ab3ddcc
                                    • Instruction ID: a6b9421dc69b59a1620ef5a267ffc7b70cbddcc1763c919ba964146471ee00ce
                                    • Opcode Fuzzy Hash: 033380252f4febddcd057623e0f0758e5eeefbbcaa36b6a6169aa2897ab3ddcc
                                    • Instruction Fuzzy Hash: 00219D726003409FEB31CE16CC84FA6B7E8EF04720F04C46AE9458B691D764F809DA72
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: FileView
                                    • String ID:
                                    • API String ID: 3314676101-0
                                    • Opcode ID: fd3c64f057ca7603ea86ecdc3307b1aa559dc23c0950576278e8ad0df5076f80
                                    • Instruction ID: beddc478dc033589fc49b86f5787c264a9258b33ec32add2adc0788f5a6d260c
                                    • Opcode Fuzzy Hash: fd3c64f057ca7603ea86ecdc3307b1aa559dc23c0950576278e8ad0df5076f80
                                    • Instruction Fuzzy Hash: 6321C371500204AFEB31CF19DD45FA6FBE8EF08224F048869E9458BA51D775E549CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 05260BEA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: Connect
                                    • String ID:
                                    • API String ID: 3144859779-0
                                    • Opcode ID: 2e0042b623380733e06df02199331950999f7dd427d3664cb99c783ed21d0a8e
                                    • Instruction ID: db9d09bab282cd74aca6b1c04cef2c994c866dcb5b50deff01b06268cc6e89b0
                                    • Opcode Fuzzy Hash: 2e0042b623380733e06df02199331950999f7dd427d3664cb99c783ed21d0a8e
                                    • Instruction Fuzzy Hash: 1B218071508380AFDB228F55DC44B62BFF4FF0A210F0889DAE9858B562D335A858DB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • WSASocketW.WS2_32(?,?,?,?,?), ref: 00FEBCCA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: Socket
                                    • String ID:
                                    • API String ID: 38366605-0
                                    • Opcode ID: 734976282dab86ac169d9910861ae718b75ebfb4ff833d3fe306116eeba9091b
                                    • Instruction ID: 87487bacff8603f7010f4782080dd83d5be7c640c8014359c3c36d96c46a0c47
                                    • Opcode Fuzzy Hash: 734976282dab86ac169d9910861ae718b75ebfb4ff833d3fe306116eeba9091b
                                    • Instruction Fuzzy Hash: 2D212371500240AFEB31CF59DD44BA6FBE4EF08324F14886EE9858BA52C375E409DBB2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • setsockopt.WS2_32(?,?,?,?,?), ref: 00FEBDA0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: setsockopt
                                    • String ID:
                                    • API String ID: 3981526788-0
                                    • Opcode ID: 934f3b1bbf87fd9f71ed2b347a6f215a3c9568891954c2b1d80b656c9fa03d5d
                                    • Instruction ID: 48b67075f189ff3b3c4596e591d109974b2d9da612b8ecf09c6508d58427e4e1
                                    • Opcode Fuzzy Hash: 934f3b1bbf87fd9f71ed2b347a6f215a3c9568891954c2b1d80b656c9fa03d5d
                                    • Instruction Fuzzy Hash: BE216D715093C09FDB228F65DC84A92BFB4EF07320F0989DAD9C48F563C225A959DB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LoadLibraryA.KERNELBASE(?,00000E24), ref: 0526105B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: d5ee1af1ca630d87ab6e2a587d7efc57da27bc49604ab292925678656015782b
                                    • Instruction ID: 4ae9fa0a853b413dddcc50fb5efab3b7632f0521d41da5762de3fbec46eab191
                                    • Opcode Fuzzy Hash: d5ee1af1ca630d87ab6e2a587d7efc57da27bc49604ab292925678656015782b
                                    • Instruction Fuzzy Hash: 3D11E4715053806FEB21CB15CC85FA6FFB8EF06720F04849AFD449B692C274A948CB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 00FEA780
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID:
                                    • API String ID: 2591292051-0
                                    • Opcode ID: e534c8d15239c647cf5214b04c283857afc082987a429f6a321b8c84f94d1267
                                    • Instruction ID: b59fb047112d2269688bbe63f6be41a93b14abbf236da4344216c53fc7c946a1
                                    • Opcode Fuzzy Hash: e534c8d15239c647cf5214b04c283857afc082987a429f6a321b8c84f94d1267
                                    • Instruction Fuzzy Hash: 8121D2B59043809FDB12CF15DD85752BFB8EF06324F0984AAEC848B653D335A905DB62
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LoadLibraryShim.MSCOREE(?,?,?,?), ref: 05262E85
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: LibraryLoadShim
                                    • String ID:
                                    • API String ID: 1475914169-0
                                    • Opcode ID: b46dd6ba02e15f7eeb6c566da287565c570bb14b66471e9c43f9c8b12f566859
                                    • Instruction ID: d316182cdbec317b884d2fce3b0d44d0af9f05184adbbb0837c732ab6dfef1df
                                    • Opcode Fuzzy Hash: b46dd6ba02e15f7eeb6c566da287565c570bb14b66471e9c43f9c8b12f566859
                                    • Instruction Fuzzy Hash: 752190B55093809FDB228B15DC84B62BFF8FF46614F09809AED85CB653D265E809CB62
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegQueryValueExW.KERNELBASE(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 0526013C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: QueryValue
                                    • String ID:
                                    • API String ID: 3660427363-0
                                    • Opcode ID: 456f5b71eaff2b9cc8672d3b41806465f123cd0d5c63b7e8918e84c011ed7b9e
                                    • Instruction ID: c766073bec3de1b2ba39541a08d142a724b7032e1545fb992869fe5102e0f0e9
                                    • Opcode Fuzzy Hash: 456f5b71eaff2b9cc8672d3b41806465f123cd0d5c63b7e8918e84c011ed7b9e
                                    • Instruction Fuzzy Hash: DC11DF72500204AFEB31CF15CC88FA7B7E8EF04610F04C4AAE9458A652D774E849DA71
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegSetValueExW.KERNELBASE(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 00FEA4F8
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: Value
                                    • String ID:
                                    • API String ID: 3702945584-0
                                    • Opcode ID: 49ce941b8222d1ff82a0d81f7a98f4b68ce7de73beed2eb17c17f12e52d0e55e
                                    • Instruction ID: 9ba55352b592a8ed15f9487248e96f245f58cdf0dd67b0933dd692b0b39bc014
                                    • Opcode Fuzzy Hash: 49ce941b8222d1ff82a0d81f7a98f4b68ce7de73beed2eb17c17f12e52d0e55e
                                    • Instruction Fuzzy Hash: 5511B4765003409FEB31CE15CD45F67BBECEF04724F08846AED458AA91D774E8089A72
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetProcessTimes.KERNELBASE(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 05260931
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: ProcessTimes
                                    • String ID:
                                    • API String ID: 1995159646-0
                                    • Opcode ID: 24badc24fbe9ba46e91e46c81d19f97fd66e153a4d828233b7581cbcb0b5be94
                                    • Instruction ID: 804922452d3c2d3ff2294c4189466af094903b7a87c05f47bbb563ac0e060825
                                    • Opcode Fuzzy Hash: 24badc24fbe9ba46e91e46c81d19f97fd66e153a4d828233b7581cbcb0b5be94
                                    • Instruction Fuzzy Hash: B011D372501200AFEB21CF55DD84FAABBE9EF04724F04C86AE9458AA51D774A548CBB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetProcessWorkingSetSize.KERNEL32(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 0526255B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: ProcessSizeWorking
                                    • String ID:
                                    • API String ID: 3584180929-0
                                    • Opcode ID: 1359445d631814d593e9ba60c8f564daa43eacadc3cbbd2490e151865d5d7094
                                    • Instruction ID: 32091f2e9db1fe7fd57eafbf56ceed5d75c97a34a7c6a8d010fe4629c3ffbd1b
                                    • Opcode Fuzzy Hash: 1359445d631814d593e9ba60c8f564daa43eacadc3cbbd2490e151865d5d7094
                                    • Instruction Fuzzy Hash: C51104755002009FEB31CF18DD85BAAB7A8EF44224F04C87AED04CB641D774E5488AB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetProcessWorkingSetSize.KERNEL32(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 0526263F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: ProcessSizeWorking
                                    • String ID:
                                    • API String ID: 3584180929-0
                                    • Opcode ID: 1359445d631814d593e9ba60c8f564daa43eacadc3cbbd2490e151865d5d7094
                                    • Instruction ID: 094428141a604bd02a48290e2c6fb0a8ae7667b7275b6d5cb25fd2b5a73a4c67
                                    • Opcode Fuzzy Hash: 1359445d631814d593e9ba60c8f564daa43eacadc3cbbd2490e151865d5d7094
                                    • Instruction Fuzzy Hash: 9511C4755002009FEB21CF59DD85BAAB7A8EF04724F04C87AED45CB641D778A5498BB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • PostMessageW.USER32(?,?,?,?), ref: 05263B51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID:
                                    • API String ID: 410705778-0
                                    • Opcode ID: 70a1c1b231f1a61613b61e297b92ca280ac2af1148114323237d9f8cb3c00681
                                    • Instruction ID: e7eb4c22961c37d76ccc6e85077701ec3026b7777e89ec038a6ab7a89e5fac1a
                                    • Opcode Fuzzy Hash: 70a1c1b231f1a61613b61e297b92ca280ac2af1148114323237d9f8cb3c00681
                                    • Instruction Fuzzy Hash: E3219A714093C09FDB238F25DC44A62BFB4EF17320F0984DBE9848F663D225A858DB62
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetExitCodeProcess.KERNELBASE(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 0526247C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: CodeExitProcess
                                    • String ID:
                                    • API String ID: 3861947596-0
                                    • Opcode ID: d0e1327d80c88a226876ec8e24094accbb3c12628a7e7b82b0aeb341d2cadd18
                                    • Instruction ID: b1ef8d0b5e92943332cfdddb35d618e2caaedfcb5e07c62c2e6710f6094e6ef5
                                    • Opcode Fuzzy Hash: d0e1327d80c88a226876ec8e24094accbb3c12628a7e7b82b0aeb341d2cadd18
                                    • Instruction Fuzzy Hash: 09110A756002009FEB21CF19DD85BAAB7E8EF44724F04C47AED44CB641D778E5448AB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetComputerNameW.KERNEL32(?,00000E24,?,?), ref: 05260082
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: ComputerName
                                    • String ID:
                                    • API String ID: 3545744682-0
                                    • Opcode ID: d7a30b35a19084c4d73475aaf9271c457a059e0e86add48b824a37fa32a35787
                                    • Instruction ID: a8b306278611eb485438f9fbd27f3336199f1ab0f660772ff972f5bb52a51135
                                    • Opcode Fuzzy Hash: d7a30b35a19084c4d73475aaf9271c457a059e0e86add48b824a37fa32a35787
                                    • Instruction Fuzzy Hash: 1211C4715053406FD3118B15DC41F72BFF8EB8A620F05819AEC489BA42D265B955CBB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00FEAC6E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: da0e1389539804d963be078de9e6fa2b0af61d5afc06a52d84ac65410b740c9c
                                    • Instruction ID: 5e3b3fa878db91c94dcfdec6946cd7b1797eb257b2fc7bd8b5ffa22abee4d5f3
                                    • Opcode Fuzzy Hash: da0e1389539804d963be078de9e6fa2b0af61d5afc06a52d84ac65410b740c9c
                                    • Instruction Fuzzy Hash: F511B471409380AFDB228F55DC44A62FFF4EF4A320F0888DAED858B562D235A818DB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ReadFile.KERNELBASE(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 00FEBA55
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: FileRead
                                    • String ID:
                                    • API String ID: 2738559852-0
                                    • Opcode ID: 8512e9a58f4638cb5a4ae17646c627f62a71c6842c5ef0ab5782da2185b2c301
                                    • Instruction ID: fa68e7b73182ee37c1ae0cb6823f0205e5c4740192a9d32c48892f7bd4b41e2d
                                    • Opcode Fuzzy Hash: 8512e9a58f4638cb5a4ae17646c627f62a71c6842c5ef0ab5782da2185b2c301
                                    • Instruction Fuzzy Hash: 3711B272500340AFEB21CF55DD44BA7FBE8EF08724F04887AED458AA51C779A9099BB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ioctlsocket.WS2_32(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 05261FD3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: ioctlsocket
                                    • String ID:
                                    • API String ID: 3577187118-0
                                    • Opcode ID: 4b092b562070ee19e286bae9ced4f1a888c5e03de2fa4211c1a00937a1a5e61c
                                    • Instruction ID: cf9534810e9a7fc4972fbe74618d85fdea6bd5839bcb613351213d5690cc4194
                                    • Opcode Fuzzy Hash: 4b092b562070ee19e286bae9ced4f1a888c5e03de2fa4211c1a00937a1a5e61c
                                    • Instruction Fuzzy Hash: 2211C171500300AFEB21DF54DD84FAABBA8EF04724F04C86AED498B641D778A548CAB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegDeleteKeyW.ADVAPI32(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 0526381C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: Delete
                                    • String ID:
                                    • API String ID: 1035893169-0
                                    • Opcode ID: 592f9983650428779a0f2c60695eaccda82f6cdc9bf4d4e0dfe1367c34bd359f
                                    • Instruction ID: f314134e577bf6295363c0f968b367c57e4ea1521efc8e58b1f21ac06d9a2f25
                                    • Opcode Fuzzy Hash: 592f9983650428779a0f2c60695eaccda82f6cdc9bf4d4e0dfe1367c34bd359f
                                    • Instruction Fuzzy Hash: A711E9715002009FE721CB05DD85FA6F7DCEF04624F04C86AED059B741D778E448CAB5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • PostMessageW.USER32(?,?,?,?), ref: 05263CB5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID:
                                    • API String ID: 410705778-0
                                    • Opcode ID: 2c44c90a7f344569a86cb32010330f9a344d97bbf131f01aa98ab04c8b588433
                                    • Instruction ID: 0c38325ffcc418525f65cf1d969fa54c818915d7a7c9a352d0d96811ef1f41ca
                                    • Opcode Fuzzy Hash: 2c44c90a7f344569a86cb32010330f9a344d97bbf131f01aa98ab04c8b588433
                                    • Instruction Fuzzy Hash: AB1127765097809FDB228F15DC44A52FFB4FF16220F08849EED858B663C371A818DB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LoadLibraryA.KERNELBASE(?,00000E24), ref: 0526105B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 0f131683212333c891a0fe009bd6078f1b62ec5660fd8442dca80e271430df9b
                                    • Instruction ID: 0c7d97dd26872d5692adab3a020c4056cda535a8798d13b87e20c0050efda34c
                                    • Opcode Fuzzy Hash: 0f131683212333c891a0fe009bd6078f1b62ec5660fd8442dca80e271430df9b
                                    • Instruction Fuzzy Hash: 8F112531510240AFEB30DB15CD41FB6FBA8EF04724F14C46AED044A781C3B8B948CAA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetErrorMode.KERNELBASE(?), ref: 00FEA30C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: ErrorMode
                                    • String ID:
                                    • API String ID: 2340568224-0
                                    • Opcode ID: 7f51bc600b59defbdcd2d05161ff837d3defa05cb805f0b51b6979dc8917f84a
                                    • Instruction ID: ecc11d28d50fbb2487b8c747789e4f4c18f5cf0b1c5f63a9026c2d4963c8f259
                                    • Opcode Fuzzy Hash: 7f51bc600b59defbdcd2d05161ff837d3defa05cb805f0b51b6979dc8917f84a
                                    • Instruction Fuzzy Hash: A711A3714093C06FDB238B15DC54662BFB4DF47624F0980DBED848F663D265A808D772
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: select
                                    • String ID:
                                    • API String ID: 1274211008-0
                                    • Opcode ID: 967b5b36fb0792a27d54a0be3209335d5b3544e74dd6eb587d28e4ac6ab7fe3a
                                    • Instruction ID: 79275d5e5a0b5c788a3a5f358f9aacdd1520b9a15c4b01e1fd816adb98f9d58e
                                    • Opcode Fuzzy Hash: 967b5b36fb0792a27d54a0be3209335d5b3544e74dd6eb587d28e4ac6ab7fe3a
                                    • Instruction Fuzzy Hash: D4116075610205CFDB20CF19C984F62FBE8FF14610F08886ADD4ACB656D375E588CB62
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: closesocket
                                    • String ID:
                                    • API String ID: 2781271927-0
                                    • Opcode ID: 1e10397df269b516d6c7aa24915e09c85aca237f3b21103e54cc1838f22dad1f
                                    • Instruction ID: e6ca6943d68ceff5a518145d6bdc907493b0b24df05e3be9be26e449d086d153
                                    • Opcode Fuzzy Hash: 1e10397df269b516d6c7aa24915e09c85aca237f3b21103e54cc1838f22dad1f
                                    • Instruction Fuzzy Hash: 9011BF719093C09FDB12CB15DC84B52BFB4EF06224F0884DBED848F693D279A808DB62
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 05262172
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: LookupPrivilegeValue
                                    • String ID:
                                    • API String ID: 3899507212-0
                                    • Opcode ID: e0039b848aede75b99e2f7a308c41c4882dc4505c95a1fe33357ebad386ae8eb
                                    • Instruction ID: 52b58c98d65193d8b32c81a9adb51b165a895655b28985ee54757a4fa6b86458
                                    • Opcode Fuzzy Hash: e0039b848aede75b99e2f7a308c41c4882dc4505c95a1fe33357ebad386ae8eb
                                    • Instruction Fuzzy Hash: 47118E76A14241CFEB20CF29D884B6AFBE8FF04220F08C4AADD49CB742D674E444CA61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetFileType.KERNELBASE(?,00000E24,72A358A1,00000000,00000000,00000000,00000000), ref: 00FEB789
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: FileType
                                    • String ID:
                                    • API String ID: 3081899298-0
                                    • Opcode ID: 7f253bd66a4651447d9573d6c7ff20db386ca05bc31300478c2363f9d1931671
                                    • Instruction ID: 40f5200d49ae5640f9334c1bf5c65df33185cc40d4a4644e14b40d5ee37d8df0
                                    • Opcode Fuzzy Hash: 7f253bd66a4651447d9573d6c7ff20db386ca05bc31300478c2363f9d1931671
                                    • Instruction Fuzzy Hash: AA01C072500240AFE721CB1ADD85BA7FBA8DF44724F14C4A6EE049BB41D778E9098AA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • WaitForInputIdle.USER32(?,?), ref: 052639FF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: IdleInputWait
                                    • String ID:
                                    • API String ID: 2200289081-0
                                    • Opcode ID: 86e03f16673e765740a5baa2e4bbcafb4a842bf0d5679a79d88612c638c5e181
                                    • Instruction ID: 730a15541df2ef58d5e223137401e83ecd1497e6492c49fa21a9b0108d7d37c2
                                    • Opcode Fuzzy Hash: 86e03f16673e765740a5baa2e4bbcafb4a842bf0d5679a79d88612c638c5e181
                                    • Instruction Fuzzy Hash: 6511A3715083809FDB11CF15DC84B52FFF4EF46220F0984DADD848F262D279A844DB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 05260BEA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: Connect
                                    • String ID:
                                    • API String ID: 3144859779-0
                                    • Opcode ID: ead1770f671ebd80e0fd4eba1568670dc030298e319fcfe8a4d166928c71ca58
                                    • Instruction ID: 075c9d29cab7f03c4b1959d7dcac41749ba652de75e2a4431fd288e4fc36a34f
                                    • Opcode Fuzzy Hash: ead1770f671ebd80e0fd4eba1568670dc030298e319fcfe8a4d166928c71ca58
                                    • Instruction Fuzzy Hash: 3611CE325006409FDB20CF55C888B62FBE5FF08310F08C8AAED898BA62D375E448DF61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetVolumeInformationA.KERNELBASE(?,00000E24,?,?), ref: 05260DB6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: InformationVolume
                                    • String ID:
                                    • API String ID: 2039140958-0
                                    • Opcode ID: 14a3d2794e7e21e013f35c22b1f522078bd4eac90abb3e4d5e3453d28b4819f0
                                    • Instruction ID: 54ebb170f36d7b4d07e6254b151e9a8b2a4ec3ab768eef349448276d86077725
                                    • Opcode Fuzzy Hash: 14a3d2794e7e21e013f35c22b1f522078bd4eac90abb3e4d5e3453d28b4819f0
                                    • Instruction Fuzzy Hash: 0401B171600200AFD310DF1ACD46B66FBE8FB88A20F14852AEC089BB41D731F915CBE1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LoadLibraryShim.MSCOREE(?,?,?,?), ref: 05262E85
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: LibraryLoadShim
                                    • String ID:
                                    • API String ID: 1475914169-0
                                    • Opcode ID: 1103036717fa47d78fef76b361729d73231e2e1105e2bad4736dd2d3bf107fca
                                    • Instruction ID: 4c706e83c15546155ee56d2ff537e8c22de3a2d566dd9d3ede6dba7b6e437daf
                                    • Opcode Fuzzy Hash: 1103036717fa47d78fef76b361729d73231e2e1105e2bad4736dd2d3bf107fca
                                    • Instruction Fuzzy Hash: 61019E75A10240DFDB20CF19D984B22FBE8FF04620F08C4AADD498BB52D375F448CA62
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00FEAC6E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 3f1d4faec01331f797e68813370607b81105a62be8f007cf60c4708a629eed1d
                                    • Instruction ID: 0109db0073ba36c0dd9f93673fcdce92c0d94d5d4da6753d5f684112a0aac946
                                    • Opcode Fuzzy Hash: 3f1d4faec01331f797e68813370607b81105a62be8f007cf60c4708a629eed1d
                                    • Instruction Fuzzy Hash: 430161329006409FDB218F59D984B62FBE0FF48720F18C9AADD454AA55D375E414EF62
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetComputerNameW.KERNEL32(?,00000E24,?,?), ref: 05260082
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: ComputerName
                                    • String ID:
                                    • API String ID: 3545744682-0
                                    • Opcode ID: b018b08f7482f9dac44a1e235d6f15625afadea36356f95aea1f3653ee3eedee
                                    • Instruction ID: 12b4b483a0d3fd0a395a5a249b84e56db41173a348a0e45b5e5e2e7c6a5ff83d
                                    • Opcode Fuzzy Hash: b018b08f7482f9dac44a1e235d6f15625afadea36356f95aea1f3653ee3eedee
                                    • Instruction Fuzzy Hash: 2301D671600201AFD310DF1ACD46B66FBE8FB88A20F148259EC089BB41D731F956CBE5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • setsockopt.WS2_32(?,?,?,?,?), ref: 00FEBDA0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: setsockopt
                                    • String ID:
                                    • API String ID: 3981526788-0
                                    • Opcode ID: 3f7017d7d9f8788ebbada11373f152e467e39394ca1afb0f39d00314ec03ae32
                                    • Instruction ID: e3f0ff3d1488c5a1770179d42276502d5bf8a98cdbfb1785128de1b7a21e4029
                                    • Opcode Fuzzy Hash: 3f7017d7d9f8788ebbada11373f152e467e39394ca1afb0f39d00314ec03ae32
                                    • Instruction Fuzzy Hash: ED0180329002409FDB318F55D984B56FBE0EF08320F0889AADD854AA16C375A418DB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 00FEA780
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID:
                                    • API String ID: 2591292051-0
                                    • Opcode ID: b7ac03cab32b8d67db1d75d222ce27610779f162e90eeb5284ece460dca42d11
                                    • Instruction ID: 98d7a0c005c314fa0afda81ae3d9708d0bf844621b6f29785fcb71d154ef0341
                                    • Opcode Fuzzy Hash: b7ac03cab32b8d67db1d75d222ce27610779f162e90eeb5284ece460dca42d11
                                    • Instruction Fuzzy Hash: F5017175A012408FEB10CF1AD985766FBA4EF04724F08C4AADD458BA56D679E804DAA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 00FEBC12
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: QueryValue
                                    • String ID:
                                    • API String ID: 3660427363-0
                                    • Opcode ID: ce7150086447d93671f449b3c3a27fa299ee26bc0265e951660ce4932c28fbf3
                                    • Instruction ID: b7f402236ecfa2be4920471737ef958d6cd2d1c6358c30ff04551a1f2608281d
                                    • Opcode Fuzzy Hash: ce7150086447d93671f449b3c3a27fa299ee26bc0265e951660ce4932c28fbf3
                                    • Instruction Fuzzy Hash: 5601A271600201ABD210DF1ACD46B66FBE8FB88A20F14821AEC089BB41D771F956CBE5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • PostMessageW.USER32(?,?,?,?), ref: 05263CB5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID:
                                    • API String ID: 410705778-0
                                    • Opcode ID: d3aff055163f59e85b62d3963a63f4a201dfab41eec502719c54c506f1d9f956
                                    • Instruction ID: 5ee256f61e8ef0651d845b2f67341dcc2f8988a3a8fa2e49dc8d7e39ca7b31e0
                                    • Opcode Fuzzy Hash: d3aff055163f59e85b62d3963a63f4a201dfab41eec502719c54c506f1d9f956
                                    • Instruction Fuzzy Hash: 1801B1365006408FDB21CF19D884B66FBE0FF14220F08C4AAED494BA62C375E458CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: send
                                    • String ID:
                                    • API String ID: 2809346765-0
                                    • Opcode ID: 5342c881748625bf1c622b7ce6ffed368b77ecd0cd7c1913373190aa726c98b7
                                    • Instruction ID: e647dc3bad3a9fbbff284cd7a1f08fc0deb28d6cb69aacfcfbe7c7e04fb2d59b
                                    • Opcode Fuzzy Hash: 5342c881748625bf1c622b7ce6ffed368b77ecd0cd7c1913373190aa726c98b7
                                    • Instruction Fuzzy Hash: 120192329042809FDB20CF59D984B52FBE0FF04320F08C4AADD454BA15C379A408DF62
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • WaitForInputIdle.USER32(?,?), ref: 052639FF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: IdleInputWait
                                    • String ID:
                                    • API String ID: 2200289081-0
                                    • Opcode ID: 07e79601a5e55f6a75bd983b54b5e6d46a12166be74a5ea07b3582aa0a151ec7
                                    • Instruction ID: b5c3f82b5c73164d52ce39ee060e4bdb82b22da6f82e414d3383ccabfdacb61e
                                    • Opcode Fuzzy Hash: 07e79601a5e55f6a75bd983b54b5e6d46a12166be74a5ea07b3582aa0a151ec7
                                    • Instruction Fuzzy Hash: 7B018F759142409FEB20CF19D984B65FBE5EF04224F08C8AADD488F756D379A844DA61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: closesocket
                                    • String ID:
                                    • API String ID: 2781271927-0
                                    • Opcode ID: d91b22c108df99a44be88bcc898b122d3a5c5a05fa2028f293f05e63bf352bd3
                                    • Instruction ID: 24dc035d6dbd502079f947c077d8fc64426bf896398850fd679893d798d4d96f
                                    • Opcode Fuzzy Hash: d91b22c108df99a44be88bcc898b122d3a5c5a05fa2028f293f05e63bf352bd3
                                    • Instruction Fuzzy Hash: 2D01D6719002808FDB20CF1AD984762FBE4EF44324F08C4BADD498FB56D379E448DAA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • PostMessageW.USER32(?,?,?,?), ref: 05263B51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051769037.0000000005260000.00000040.00000800.00020000.00000000.sdmp, Offset: 05260000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_5260000_bUPt.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID:
                                    • API String ID: 410705778-0
                                    • Opcode ID: ebea82d3fcbc397b5adac7444f007834065728c416219b6236a22bb25d2a3200
                                    • Instruction ID: cd6e9fbb2112c061e84612eed5467738a6ba9c5a9a51d5cf7bfb2974d8a9c636
                                    • Opcode Fuzzy Hash: ebea82d3fcbc397b5adac7444f007834065728c416219b6236a22bb25d2a3200
                                    • Instruction Fuzzy Hash: 4F018F315142449FDB21CF09D984B65FBE1FF18724F08C8AADD490BA62D375E458CBA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetErrorMode.KERNELBASE(?), ref: 00FEA30C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050957471.0000000000FEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FEA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fea000_bUPt.jbxd
                                    Similarity
                                    • API ID: ErrorMode
                                    • String ID:
                                    • API String ID: 2340568224-0
                                    • Opcode ID: 91ef5736e97992f17b2b097bea43afd01d1da6a9234d18b92c02ec532d398c0f
                                    • Instruction ID: 6dd21bcc9c54d44d6a6a2f3bfb891c866626138ecaedf80e7b79320de1e1a9a6
                                    • Opcode Fuzzy Hash: 91ef5736e97992f17b2b097bea43afd01d1da6a9234d18b92c02ec532d398c0f
                                    • Instruction Fuzzy Hash: F8F0A4359042808FDB208F0AD984761FBE0EF04724F18C0AADD494F756D379E408DA62
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051472447.0000000001610000.00000040.00000020.00020000.00000000.sdmp, Offset: 01610000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1610000_bUPt.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c510cd88daa8c7a841fa6516633e41511df799032a5294d33627ee998e21312b
                                    • Instruction ID: ae62e6f98df1c45baba819141b35e4927d1a83695980a01e3d851909e82a6ee2
                                    • Opcode Fuzzy Hash: c510cd88daa8c7a841fa6516633e41511df799032a5294d33627ee998e21312b
                                    • Instruction Fuzzy Hash: 7421FD3510D3C08FC7078B249C60654BFB1EF57214F1E86EBD5858B6A7C32A985ADB62
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051977356.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_57d0000_bUPt.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3060b823ae2f78fea820901bb346b8dd9a4d15799bb407304b7043f88971e818
                                    • Instruction ID: c0903fb4038a4f6a93a9f99f0aa98d7fb2e2b813747ef9f1a9a0299bc3dd2286
                                    • Opcode Fuzzy Hash: 3060b823ae2f78fea820901bb346b8dd9a4d15799bb407304b7043f88971e818
                                    • Instruction Fuzzy Hash: BF11BAB5909341AFD750CF19D880A5BFBE4FB88664F04896EF998D7311D335E9048FA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051472447.0000000001610000.00000040.00000020.00020000.00000000.sdmp, Offset: 01610000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1610000_bUPt.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a6e1ec85e63082ff29dfc89e531eb0c60e08e8b94ff6fb3afda26a2f0169e6e7
                                    • Instruction ID: 8e21a0ecd1ad092d6e31f78714692bba864dc31bb012a355a7392e0764b67c1a
                                    • Opcode Fuzzy Hash: a6e1ec85e63082ff29dfc89e531eb0c60e08e8b94ff6fb3afda26a2f0169e6e7
                                    • Instruction Fuzzy Hash: 2211E730208280DFDB15CB14D940B25BBA5AB88718F28C9ACF94957B57C77BD883CA91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051472447.0000000001610000.00000040.00000020.00020000.00000000.sdmp, Offset: 01610000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1610000_bUPt.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 07264f64169c46aa253743715e9e5d9f11dc347b0e997ea7f9dc69f91c742415
                                    • Instruction ID: de22aba97e2d67b701df50c0087de744040f7fd77c454a5c3ae2e6c02ead3928
                                    • Opcode Fuzzy Hash: 07264f64169c46aa253743715e9e5d9f11dc347b0e997ea7f9dc69f91c742415
                                    • Instruction Fuzzy Hash: 8511903550D3C08FCB03CB50D850B50BFB2AF47218F1986DED8894B6A3C33A8846CB52
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050997565.0000000000FFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_ffa000_bUPt.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f98dab93a5cf8c04e7f5f121044315d202e9b61480334384b12b32c9f5263dbf
                                    • Instruction ID: 2fbca47be22c9cd72941633a6d93845af65d45fa1a873f98691f9ccfed04abe1
                                    • Opcode Fuzzy Hash: f98dab93a5cf8c04e7f5f121044315d202e9b61480334384b12b32c9f5263dbf
                                    • Instruction Fuzzy Hash: 4411ACB5508341AFD750CF09D881A57FBE8FB88660F04892EF95997711D275E9088BA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051472447.0000000001610000.00000040.00000020.00020000.00000000.sdmp, Offset: 01610000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1610000_bUPt.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e0a0652a47d5af5b57a1a3e19685e4b7b56050296e71b82a3c8112927825fd2d
                                    • Instruction ID: eee3e1f12c6222ffdaf7effab6814f62ace3754bdce280cdff674289df8eef52
                                    • Opcode Fuzzy Hash: e0a0652a47d5af5b57a1a3e19685e4b7b56050296e71b82a3c8112927825fd2d
                                    • Instruction Fuzzy Hash: B801A2755497805FC7518B19EC41893BFF8EF4623070984BBEC498B612D229A90ADBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051472447.0000000001610000.00000040.00000020.00020000.00000000.sdmp, Offset: 01610000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1610000_bUPt.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 74b9f174851936b42c91253ba0377f3a0e724fe011995a5d7daf0febe73ee2ff
                                    • Instruction ID: 6b2a23c71a947fa0186ae984e6309e6fafec3d0acdf80a24709e838cddaa1092
                                    • Opcode Fuzzy Hash: 74b9f174851936b42c91253ba0377f3a0e724fe011995a5d7daf0febe73ee2ff
                                    • Instruction Fuzzy Hash: C8F0FB35108684DFC706CB04D940B15FBA2EB89718F28CAADE94917B66C737D853DA81
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051472447.0000000001610000.00000040.00000020.00020000.00000000.sdmp, Offset: 01610000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1610000_bUPt.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6d55887b84cc28b70451c558bb81d2972a500d6b75819e43fa07a47f438dbe18
                                    • Instruction ID: f309dad8b80124c082bcc1ee5206c8b2e5594535fb54eb41731ae35d38e86052
                                    • Opcode Fuzzy Hash: 6d55887b84cc28b70451c558bb81d2972a500d6b75819e43fa07a47f438dbe18
                                    • Instruction Fuzzy Hash: 22E092B66006404B9650CF0EEC81452F7D8EB88630708C47FDC0D8B711D235B508CAA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050997565.0000000000FFA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FFA000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_ffa000_bUPt.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 817b3cd4ddc96a0ab87a79022f637f62e959e989ec9832d62d2029816adb1894
                                    • Instruction ID: 8ad320be65a8bc0351b4b1a01ec6bd91cf8666208a249a0a3781bb059a2ac4f3
                                    • Opcode Fuzzy Hash: 817b3cd4ddc96a0ab87a79022f637f62e959e989ec9832d62d2029816adb1894
                                    • Instruction Fuzzy Hash: B9E0D8B25402046BD6508E0A9C85F52FB98EB44931F08C567ED085B742D271B5048AF1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051977356.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_57d0000_bUPt.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 634d87c183c293f5df9114cb32f6ffd3d0d370d7a00d0ebb1380ecf6a8d78d00
                                    • Instruction ID: b96a8fd871b1e1dab57448e452e1b4cfa384f257ca2bed0077962189130b8571
                                    • Opcode Fuzzy Hash: 634d87c183c293f5df9114cb32f6ffd3d0d370d7a00d0ebb1380ecf6a8d78d00
                                    • Instruction Fuzzy Hash: B5E0D8B25012006BD6109E0A9C85F53FBD8EB84930F08C567ED081B702D172B514C9E1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2051977356.00000000057D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_57d0000_bUPt.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: aff6faad7aa1dbc74ce656eda0670d5820cd6e087d057f0f5f493db03f07758a
                                    • Instruction ID: 582589975d4ecec5be7cab7cb5644c6f157549d2d5c939c804eea69190c9f983
                                    • Opcode Fuzzy Hash: aff6faad7aa1dbc74ce656eda0670d5820cd6e087d057f0f5f493db03f07758a
                                    • Instruction Fuzzy Hash: BEE0D8B25412006BD6108F0A9C85F52FBD8EB94931F08C567ED081B742D171B51489E1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050944907.0000000000FE2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE2000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fe2000_bUPt.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0c1c62486b188533670420067133c620f1034ffd86fab354f7db92f5df3fb203
                                    • Instruction ID: 338849faabf20a9cf75d702822514957b2bd11b1f68c427ee48210121ccdcf5a
                                    • Opcode Fuzzy Hash: 0c1c62486b188533670420067133c620f1034ffd86fab354f7db92f5df3fb203
                                    • Instruction Fuzzy Hash: AFD05E79605AD14FD326DB1CC6A4B9537D8AB51724F4A44FAA800CB7A3C768D981E600
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2050944907.0000000000FE2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE2000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_fe2000_bUPt.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 90a54838a0c9518ab5600ff4744492d7a3c57a16b08f6710b9d47ece8175a7d1
                                    • Instruction ID: bf9ccfd19dcb41e04e42cb31b5f89ef3ef9f80998eae7943b06e789bcd86cb01
                                    • Opcode Fuzzy Hash: 90a54838a0c9518ab5600ff4744492d7a3c57a16b08f6710b9d47ece8175a7d1
                                    • Instruction Fuzzy Hash: 4DD05E346002C14FC725DA0DC6D4F5977D8AB40724F1A44E8AC108B762C7B8D8C0EE00
                                    Uniqueness

                                    Uniqueness Score: -1.00%