Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
QUuUm3J8x3.exe

Overview

General Information

Sample name:QUuUm3J8x3.exe
renamed because original name is a hash value
Original sample name:b9f6511e03f2f4fa61d4fdb1964cae4f.exe
Analysis ID:1365445
MD5:b9f6511e03f2f4fa61d4fdb1964cae4f
SHA1:ba42aa852a48f5449abd9c66f8a1d909a5c01618
SHA256:c93ab6bb562f09706d141a4804e655fe92612a07bc3ab92bf1f6f7a7a9ef9dcc
Tags:exenjratRAT
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Njrat
.NET source code contains potential unpacker
Connects to many ports of the same IP (likely port scanning)
Contains functionality to disable the Task Manager (.Net Source)
Contains functionality to spread to USB devices (.Net source)
Disables zone checking for all users
Drops PE files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Uses netsh to modify the Windows network and firewall settings
Abnormal high CPU Usage
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • QUuUm3J8x3.exe (PID: 6412 cmdline: C:\Users\user\Desktop\QUuUm3J8x3.exe MD5: B9F6511E03F2F4FA61D4FDB1964CAE4F)
    • server.exe (PID: 2452 cmdline: "C:\Users\user\AppData\Local\Temp\server.exe" MD5: B9F6511E03F2F4FA61D4FDB1964CAE4F)
      • netsh.exe (PID: 380 cmdline: netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • conhost.exe (PID: 3176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Campaign ID": "HacKed", "Version": "0.7d", "Install Name": "444e796bc07d74246f430e63450f384a", "Install Dir": "Adobe Update", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Network Seprator": "|'|'|"}
SourceRuleDescriptionAuthorStrings
QUuUm3J8x3.exeJoeSecurity_NjratYara detected NjratJoe Security
    QUuUm3J8x3.exeWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0x115d2:$a1: get_Registry
    • 0x159fd:$a2: SEE_MASK_NOZONECHECKS
    • 0x1569f:$a3: Download ERROR
    • 0x15c4f:$a4: cmd.exe /c ping 0 -n 2 & del "
    • 0x13bdc:$a5: netsh firewall delete allowedprogram "
    QUuUm3J8x3.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
    • 0x15c4f:$x1: cmd.exe /c ping 0 -n 2 & del "
    • 0x13768:$s1: winmgmts:\\.\root\SecurityCenter2
    • 0x156bd:$s3: Executed As
    • 0x124f0:$s5: Stub.exe
    • 0x1569f:$s6: Download ERROR
    • 0x1372a:$s8: Select * From AntiVirusProduct
    QUuUm3J8x3.exeNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
    • 0x159fd:$reg: SEE_MASK_NOZONECHECKS
    • 0x15683:$msg: Execute ERROR
    • 0x156d7:$msg: Execute ERROR
    • 0x15c4f:$ping: cmd.exe /c ping 0 -n 2 & del
    QUuUm3J8x3.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
    • 0x13bdc:$s1: netsh firewall delete allowedprogram
    • 0x13c2e:$s2: netsh firewall add allowedprogram
    • 0x15c4f:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 63 00 20 00 70 00 69 00 6E 00 67
    • 0x15683:$s4: Execute ERROR
    • 0x156d7:$s4: Execute ERROR
    • 0x1569f:$s5: Download ERROR
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exeJoeSecurity_NjratYara detected NjratJoe Security
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exeWindows_Trojan_Njrat_30f3c220unknownunknown
      • 0x115d2:$a1: get_Registry
      • 0x159fd:$a2: SEE_MASK_NOZONECHECKS
      • 0x1569f:$a3: Download ERROR
      • 0x15c4f:$a4: cmd.exe /c ping 0 -n 2 & del "
      • 0x13bdc:$a5: netsh firewall delete allowedprogram "
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
      • 0x15c4f:$x1: cmd.exe /c ping 0 -n 2 & del "
      • 0x13768:$s1: winmgmts:\\.\root\SecurityCenter2
      • 0x156bd:$s3: Executed As
      • 0x124f0:$s5: Stub.exe
      • 0x1569f:$s6: Download ERROR
      • 0x1372a:$s8: Select * From AntiVirusProduct
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exeNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
      • 0x159fd:$reg: SEE_MASK_NOZONECHECKS
      • 0x15683:$msg: Execute ERROR
      • 0x156d7:$msg: Execute ERROR
      • 0x15c4f:$ping: cmd.exe /c ping 0 -n 2 & del
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
      • 0x13bdc:$s1: netsh firewall delete allowedprogram
      • 0x13c2e:$s2: netsh firewall add allowedprogram
      • 0x15c4f:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 63 00 20 00 70 00 69 00 6E 00 67
      • 0x15683:$s4: Execute ERROR
      • 0x156d7:$s4: Execute ERROR
      • 0x1569f:$s5: Download ERROR
      Click to see the 10 entries
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1968331201.00000000008C2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
        00000000.00000000.1968331201.00000000008C2000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
        • 0x113d2:$a1: get_Registry
        • 0x157fd:$a2: SEE_MASK_NOZONECHECKS
        • 0x1549f:$a3: Download ERROR
        • 0x15a4f:$a4: cmd.exe /c ping 0 -n 2 & del "
        • 0x139dc:$a5: netsh firewall delete allowedprogram "
        00000000.00000000.1968331201.00000000008C2000.00000002.00000001.01000000.00000003.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
        • 0x157fd:$reg: SEE_MASK_NOZONECHECKS
        • 0x15483:$msg: Execute ERROR
        • 0x154d7:$msg: Execute ERROR
        • 0x15a4f:$ping: cmd.exe /c ping 0 -n 2 & del
        00000000.00000002.1988085134.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
          00000000.00000002.1988085134.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
          • 0x115f2:$a1: get_Registry
          • 0x15a1d:$a2: SEE_MASK_NOZONECHECKS
          • 0x156bf:$a3: Download ERROR
          • 0x15c6f:$a4: cmd.exe /c ping 0 -n 2 & del "
          • 0x13bfc:$a5: netsh firewall delete allowedprogram "
          Click to see the 4 entries
          SourceRuleDescriptionAuthorStrings
          0.0.QUuUm3J8x3.exe.8c0000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
            0.0.QUuUm3J8x3.exe.8c0000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
            • 0x115d2:$a1: get_Registry
            • 0x159fd:$a2: SEE_MASK_NOZONECHECKS
            • 0x1569f:$a3: Download ERROR
            • 0x15c4f:$a4: cmd.exe /c ping 0 -n 2 & del "
            • 0x13bdc:$a5: netsh firewall delete allowedprogram "
            0.0.QUuUm3J8x3.exe.8c0000.0.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
            • 0x15c4f:$x1: cmd.exe /c ping 0 -n 2 & del "
            • 0x13768:$s1: winmgmts:\\.\root\SecurityCenter2
            • 0x156bd:$s3: Executed As
            • 0x124f0:$s5: Stub.exe
            • 0x1569f:$s6: Download ERROR
            • 0x1372a:$s8: Select * From AntiVirusProduct
            0.0.QUuUm3J8x3.exe.8c0000.0.unpackNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
            • 0x159fd:$reg: SEE_MASK_NOZONECHECKS
            • 0x15683:$msg: Execute ERROR
            • 0x156d7:$msg: Execute ERROR
            • 0x15c4f:$ping: cmd.exe /c ping 0 -n 2 & del
            0.0.QUuUm3J8x3.exe.8c0000.0.unpackMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
            • 0x13bdc:$s1: netsh firewall delete allowedprogram
            • 0x13c2e:$s2: netsh firewall add allowedprogram
            • 0x15c4f:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 63 00 20 00 70 00 69 00 6E 00 67
            • 0x15683:$s4: Execute ERROR
            • 0x156d7:$s4: Execute ERROR
            • 0x1569f:$s5: Download ERROR
            No Sigma rule has matched
            Timestamp:192.168.2.518.197.239.549722124602814860 12/21/23-08:23:50.144704
            SID:2814860
            Source Port:49722
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749723124602033132 12/21/23-08:24:22.443531
            SID:2033132
            Source Port:49723
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749724124602033132 12/21/23-08:24:28.186519
            SID:2033132
            Source Port:49724
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.518.192.93.8649727124602814856 12/21/23-08:25:32.396830
            SID:2814856
            Source Port:49727
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.518.192.93.8649728124602814856 12/21/23-08:25:42.081730
            SID:2814856
            Source Port:49728
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749725124602033132 12/21/23-08:24:57.473768
            SID:2033132
            Source Port:49725
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749705124602825564 12/21/23-08:22:14.988164
            SID:2825564
            Source Port:49705
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.518.197.239.549722124602825564 12/21/23-08:23:50.144704
            SID:2825564
            Source Port:49722
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749725124602825564 12/21/23-08:25:04.347657
            SID:2825564
            Source Port:49725
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749726124602825564 12/21/23-08:25:12.545144
            SID:2825564
            Source Port:49726
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749714124602814856 12/21/23-08:22:35.251444
            SID:2814856
            Source Port:49714
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.518.197.239.549720124602814856 12/21/23-08:23:26.504306
            SID:2814856
            Source Port:49720
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.518.197.239.549721124602814856 12/21/23-08:23:38.022410
            SID:2814856
            Source Port:49721
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749723124602825564 12/21/23-08:24:25.802640
            SID:2825564
            Source Port:49723
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.518.197.239.549722124602814856 12/21/23-08:23:47.925511
            SID:2814856
            Source Port:49722
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749715124602814856 12/21/23-08:22:42.115347
            SID:2814856
            Source Port:49715
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749724124602825564 12/21/23-08:24:29.378929
            SID:2825564
            Source Port:49724
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.518.192.93.8649728124602825564 12/21/23-08:25:44.765776
            SID:2825564
            Source Port:49728
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.518.192.93.8649727124602825564 12/21/23-08:25:35.257122
            SID:2825564
            Source Port:49727
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.518.197.239.549719124602033132 12/21/23-08:23:16.402874
            SID:2033132
            Source Port:49719
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749723124602814856 12/21/23-08:24:22.684180
            SID:2814856
            Source Port:49723
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749714124602033132 12/21/23-08:22:35.011872
            SID:2033132
            Source Port:49714
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.518.197.239.549717124602033132 12/21/23-08:23:09.738672
            SID:2033132
            Source Port:49717
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749715124602825564 12/21/23-08:22:45.323315
            SID:2825564
            Source Port:49715
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749724124602814856 12/21/23-08:24:28.428947
            SID:2814856
            Source Port:49724
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749704124602814856 12/21/23-08:22:00.806810
            SID:2814856
            Source Port:49704
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749725124602814856 12/21/23-08:24:57.714176
            SID:2814856
            Source Port:49725
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749714124602825564 12/21/23-08:22:39.068500
            SID:2825564
            Source Port:49714
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749705124602814856 12/21/23-08:22:07.582838
            SID:2814856
            Source Port:49705
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749726124602814856 12/21/23-08:25:07.565443
            SID:2814856
            Source Port:49726
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749725124602814860 12/21/23-08:25:04.347657
            SID:2814860
            Source Port:49725
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.518.192.93.8649727124602814860 12/21/23-08:25:35.257122
            SID:2814860
            Source Port:49727
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749705124602814860 12/21/23-08:22:14.988164
            SID:2814860
            Source Port:49705
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749714124602814860 12/21/23-08:22:39.068500
            SID:2814860
            Source Port:49714
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.518.192.93.8649728124602814860 12/21/23-08:25:44.765776
            SID:2814860
            Source Port:49728
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749726124602814860 12/21/23-08:25:12.545144
            SID:2814860
            Source Port:49726
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749715124602814860 12/21/23-08:22:45.323315
            SID:2814860
            Source Port:49715
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.518.197.239.549717124602814856 12/21/23-08:23:09.978056
            SID:2814856
            Source Port:49717
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.518.197.239.549721124602033132 12/21/23-08:23:37.781323
            SID:2033132
            Source Port:49721
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749723124602814860 12/21/23-08:24:25.802640
            SID:2814860
            Source Port:49723
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.518.197.239.549720124602033132 12/21/23-08:23:26.263437
            SID:2033132
            Source Port:49720
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749724124602814860 12/21/23-08:24:29.378929
            SID:2814860
            Source Port:49724
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749704124602033132 12/21/23-08:22:00.564694
            SID:2033132
            Source Port:49704
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749715124602033132 12/21/23-08:22:41.875520
            SID:2033132
            Source Port:49715
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749726124602033132 12/21/23-08:25:07.325936
            SID:2033132
            Source Port:49726
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.53.127.138.5749705124602033132 12/21/23-08:22:07.341922
            SID:2033132
            Source Port:49705
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.518.197.239.549722124602033132 12/21/23-08:23:47.684823
            SID:2033132
            Source Port:49722
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.518.192.93.8649728124602033132 12/21/23-08:25:41.841463
            SID:2033132
            Source Port:49728
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.518.192.93.8649727124602033132 12/21/23-08:25:32.154857
            SID:2033132
            Source Port:49727
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.518.197.239.549719124602814856 12/21/23-08:23:16.645108
            SID:2814856
            Source Port:49719
            Destination Port:12460
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: QUuUm3J8x3.exeAvira: detected
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Users\user\AppData\Local\Temp\server.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: 0.0.QUuUm3J8x3.exe.8c0000.0.unpackMalware Configuration Extractor: Njrat {"Campaign ID": "HacKed", "Version": "0.7d", "Install Name": "444e796bc07d74246f430e63450f384a", "Install Dir": "Adobe Update", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Network Seprator": "|'|'|"}
            Source: 2.tcp.eu.ngrok.ioVirustotal: Detection: 12%Perma Link
            Source: C:\Users\user\AppData\Local\Temp\server.exeReversingLabs: Detection: 83%
            Source: C:\Users\user\AppData\Local\Temp\server.exeVirustotal: Detection: 81%Perma Link
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exeReversingLabs: Detection: 83%
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exeVirustotal: Detection: 81%Perma Link
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exeReversingLabs: Detection: 83%
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exeVirustotal: Detection: 81%Perma Link
            Source: QUuUm3J8x3.exeReversingLabs: Detection: 83%
            Source: QUuUm3J8x3.exeVirustotal: Detection: 75%Perma Link
            Source: Yara matchFile source: QUuUm3J8x3.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.QUuUm3J8x3.exe.8c0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1968331201.00000000008C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1988085134.0000000003EE8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4425655282.0000000003551000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: QUuUm3J8x3.exe PID: 6412, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: server.exe PID: 2452, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe, type: DROPPED
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\server.exeJoe Sandbox ML: detected
            Source: QUuUm3J8x3.exeJoe Sandbox ML: detected
            Source: QUuUm3J8x3.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
            Source: QUuUm3J8x3.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Spreading

            barindex
            Source: QUuUm3J8x3.exe, Usb1.cs.Net Code: infect
            Source: server.exe.0.dr, Usb1.cs.Net Code: infect
            Source: scvhost.exe.2.dr, Usb1.cs.Net Code: infect
            Source: 444e796bc07d74246f430e63450f384ascvhost.exe.2.dr, Usb1.cs.Net Code: infect
            Source: QUuUm3J8x3.exe, 00000000.00000000.1968331201.00000000008C2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: \autorun.inf
            Source: QUuUm3J8x3.exe, 00000000.00000000.1968331201.00000000008C2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: [autorun]
            Source: QUuUm3J8x3.exe, 00000000.00000000.1968331201.00000000008C2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: autorun.inf
            Source: QUuUm3J8x3.exe, 00000000.00000002.1988085134.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \autorun.inf
            Source: QUuUm3J8x3.exe, 00000000.00000002.1988085134.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [autorun]
            Source: QUuUm3J8x3.exe, 00000000.00000002.1988085134.0000000003EE8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: autorun.inf
            Source: QUuUm3J8x3.exeBinary or memory string: \autorun.inf
            Source: QUuUm3J8x3.exeBinary or memory string: [autorun]
            Source: QUuUm3J8x3.exeBinary or memory string: autorun.inf
            Source: 444e796bc07d74246f430e63450f384ascvhost.exe.2.drBinary or memory string: \autorun.inf
            Source: 444e796bc07d74246f430e63450f384ascvhost.exe.2.drBinary or memory string: [autorun]
            Source: 444e796bc07d74246f430e63450f384ascvhost.exe.2.drBinary or memory string: autorun.inf
            Source: scvhost.exe.2.drBinary or memory string: \autorun.inf
            Source: scvhost.exe.2.drBinary or memory string: [autorun]
            Source: scvhost.exe.2.drBinary or memory string: autorun.inf
            Source: server.exe.0.drBinary or memory string: \autorun.inf
            Source: server.exe.0.drBinary or memory string: [autorun]
            Source: server.exe.0.drBinary or memory string: autorun.inf

            Networking

            barindex
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.5:49704 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.5:49704 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.5:49705 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.5:49705 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.5:49705 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.5:49705 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.5:49714 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.5:49714 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.5:49714 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.5:49714 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.5:49715 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.5:49715 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.5:49715 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.5:49715 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.5:49717 -> 18.197.239.5:12460
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.5:49717 -> 18.197.239.5:12460
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.5:49719 -> 18.197.239.5:12460
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.5:49719 -> 18.197.239.5:12460
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.5:49720 -> 18.197.239.5:12460
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.5:49720 -> 18.197.239.5:12460
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.5:49721 -> 18.197.239.5:12460
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.5:49721 -> 18.197.239.5:12460
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.5:49722 -> 18.197.239.5:12460
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.5:49722 -> 18.197.239.5:12460
            Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.5:49722 -> 18.197.239.5:12460
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.5:49722 -> 18.197.239.5:12460
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.5:49723 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.5:49723 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.5:49723 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.5:49723 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.5:49724 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.5:49724 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.5:49724 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.5:49724 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.5:49725 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.5:49725 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.5:49725 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.5:49725 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.5:49726 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.5:49726 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.5:49726 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.5:49726 -> 3.127.138.57:12460
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.5:49727 -> 18.192.93.86:12460
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.5:49727 -> 18.192.93.86:12460
            Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.5:49727 -> 18.192.93.86:12460
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.5:49727 -> 18.192.93.86:12460
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.5:49728 -> 18.192.93.86:12460
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.5:49728 -> 18.192.93.86:12460
            Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.5:49728 -> 18.192.93.86:12460
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.5:49728 -> 18.192.93.86:12460
            Source: global trafficTCP traffic: 3.127.138.57 ports 12460,0,1,2,4,6
            Source: global trafficTCP traffic: 18.192.93.86 ports 12460,0,1,2,4,6
            Source: global trafficTCP traffic: 18.197.239.5 ports 12460,0,1,2,4,6
            Source: global trafficTCP traffic: 192.168.2.5:49704 -> 3.127.138.57:12460
            Source: global trafficTCP traffic: 192.168.2.5:49717 -> 18.197.239.5:12460
            Source: global trafficTCP traffic: 192.168.2.5:49727 -> 18.192.93.86:12460
            Source: Joe Sandbox ViewIP Address: 3.127.138.57 3.127.138.57
            Source: Joe Sandbox ViewIP Address: 18.192.93.86 18.192.93.86
            Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
            Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownDNS traffic detected: queries for: 2.tcp.eu.ngrok.io
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: QUuUm3J8x3.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.QUuUm3J8x3.exe.8c0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1968331201.00000000008C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1988085134.0000000003EE8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4425655282.0000000003551000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: QUuUm3J8x3.exe PID: 6412, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: server.exe PID: 2452, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe, type: DROPPED

            System Summary

            barindex
            Source: QUuUm3J8x3.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: QUuUm3J8x3.exe, type: SAMPLEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: QUuUm3J8x3.exe, type: SAMPLEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: QUuUm3J8x3.exe, type: SAMPLEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 0.0.QUuUm3J8x3.exe.8c0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 0.0.QUuUm3J8x3.exe.8c0000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 0.0.QUuUm3J8x3.exe.8c0000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 0.0.QUuUm3J8x3.exe.8c0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 00000000.00000000.1968331201.00000000008C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 00000000.00000000.1968331201.00000000008C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.1988085134.0000000003EE8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: 00000000.00000002.1988085134.0000000003EE8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeCode function: 0_2_050942980_2_05094298
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeCode function: 0_2_0509470F0_2_0509470F
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeCode function: 0_2_0509499D0_2_0509499D
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeCode function: 0_2_050946300_2_05094630
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeCode function: 0_2_050949360_2_05094936
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeCode function: 0_2_050945440_2_05094544
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeCode function: 0_2_05094B5B0_2_05094B5B
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeCode function: 0_2_050947D40_2_050947D4
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeCode function: 0_2_050942690_2_05094269
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeCode function: 0_2_050949F90_2_050949F9
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeCode function: 0_2_050944F10_2_050944F1
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeCode function: 0_2_05094C8F0_2_05094C8F
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeCode function: 0_2_050950000_2_05095000
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeCode function: 0_2_05094F9D0_2_05094F9D
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeCode function: 0_2_05094F2F0_2_05094F2F
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeCode function: 0_2_050954590_2_05095459
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeCode function: 0_2_0509505D0_2_0509505D
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeCode function: 0_2_0509536F0_2_0509536F
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeCode function: 0_2_050950E30_2_050950E3
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 2_2_0175C0B02_2_0175C0B0
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 2_2_057142982_2_05714298
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 2_2_05714B5B2_2_05714B5B
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 2_2_057145442_2_05714544
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 2_2_057146302_2_05714630
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 2_2_057149362_2_05714936
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 2_2_0571470F2_2_0571470F
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 2_2_057144F12_2_057144F1
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 2_2_057149F92_2_057149F9
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 2_2_057147D42_2_057147D4
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 2_2_0571499D2_2_0571499D
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 2_2_057142872_2_05714287
            Source: QUuUm3J8x3.exe, 00000000.00000002.1987247655.0000000000F6E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs QUuUm3J8x3.exe
            Source: QUuUm3J8x3.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: QUuUm3J8x3.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: QUuUm3J8x3.exe, type: SAMPLEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: QUuUm3J8x3.exe, type: SAMPLEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: QUuUm3J8x3.exe, type: SAMPLEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 0.0.QUuUm3J8x3.exe.8c0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 0.0.QUuUm3J8x3.exe.8c0000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.0.QUuUm3J8x3.exe.8c0000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 0.0.QUuUm3J8x3.exe.8c0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 00000000.00000000.1968331201.00000000008C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 00000000.00000000.1968331201.00000000008C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000000.00000002.1988085134.0000000003EE8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: 00000000.00000002.1988085134.0000000003EE8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe, type: DROPPEDMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: classification engineClassification label: mal100.spre.phis.troj.adwa.evad.winEXE@6/6@4/3
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 2_2_05ED26AE AdjustTokenPrivileges,2_2_05ED26AE
            Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 2_2_05ED2677 AdjustTokenPrivileges,2_2_05ED2677
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeFile created: C:\Users\user\AppData\Roaming\appJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeMutant created: \Sessions\1\BaseNamedObjects\444e796bc07d74246f430e63450f384a
            Source: C:\Users\user\AppData\Local\Temp\server.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3176:120:WilError_03
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeFile created: C:\Users\user\AppData\Local\Temp\FransescoPast.txtJump to behavior
            Source: QUuUm3J8x3.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: QUuUm3J8x3.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\276d7f4a20a3c21c3bf6fc9bfc1915a2\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: QUuUm3J8x3.exeReversingLabs: Detection: 83%
            Source: QUuUm3J8x3.exeVirustotal: Detection: 75%
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeFile read: C:\Users\user\Desktop\QUuUm3J8x3.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\QUuUm3J8x3.exe C:\Users\user\Desktop\QUuUm3J8x3.exe
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess created: C:\Users\user\AppData\Local\Temp\server.exe "C:\Users\user\AppData\Local\Temp\server.exe"
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE
            Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess created: C:\Users\user\AppData\Local\Temp\server.exe "C:\Users\user\AppData\Local\Temp\server.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLEJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
            Source: QUuUm3J8x3.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
            Source: QUuUm3J8x3.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: QUuUm3J8x3.exe, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: server.exe.0.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: scvhost.exe.2.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: 444e796bc07d74246f430e63450f384ascvhost.exe.2.dr, Fransesco.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
            Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exeJump to dropped file
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeFile created: C:\Users\user\AppData\Local\Temp\server.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exeJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: threadDelayed 661Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: threadDelayed 2217Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: threadDelayed 6502Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: foregroundWindowGot 748Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: foregroundWindowGot 727Jump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exe TID: 6984Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 6164Thread sleep count: 661 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 6164Thread sleep time: -66100s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 2884Thread sleep count: 2217 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 2884Thread sleep time: -2217000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 2884Thread sleep count: 6502 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 2884Thread sleep time: -6502000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: QUuUm3J8x3.exe, 00000000.00000002.1987247655.0000000001011000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: }\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: server.exe, 00000002.00000002.4425137302.0000000001428000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllW
            Source: server.exe, 00000002.00000002.4425137302.0000000001428000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW="wsHttpContex
            Source: netsh.exe, 00000003.00000003.2004965435.0000000000531000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\QUuUm3J8x3.exeProcess created: C:\Users\user\AppData\Local\Temp\server.exe "C:\Users\user\AppData\Local\Temp\server.exe" Jump to behavior
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:14:24 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:19:36 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/31 | 03:05:08 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/06 | 15:40:58 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:09:24 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 07:22:14 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:22:28 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:58:13 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/26 | 19:01:47 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:53:29 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:17:28 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:48:54 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:50:25 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:34:22 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 07:07:37 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:42:26 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:40:09 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:08:56 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:09:06 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:24:54 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/31 | 03:10:26 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:22:46 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/24 | 14:20:45 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:32:05 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:26:19 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 10:58:27 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:24:01 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:14:10 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:10:56 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 07:12:55 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/04 | 11:00:00 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:12:11 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/24 | 14:15:27 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:06:16 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:02:52 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 07:06:07 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:04:51 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:06:25 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:53:06 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 09:36:15 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:37:08 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 10:47:38 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:58:36 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:41:39 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:19:27 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/04 | 10:44:03 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:19:45 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:03:30 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:34:04 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:18:58 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:46:23 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:59:43 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:28:17 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:01:22 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:40:52 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 07:11:25 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 10:52:56 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:33:17 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:03:21 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:50:11 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:51:50 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:51:41 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/24 | 13:38:06 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:53:15 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:27:30 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:43:56 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:25:31 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:45:02 - Program Manager
            Source: server.exe, 00000002.00000002.4425655282.0000000003619000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4425655282.0000000003A01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 07:02:56 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:35:43 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:33:35 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:23:53 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:02:00 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:39:25 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 20:05:47 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:33:12 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 09:16:21 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:00:45 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/06 | 15:46:29 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:28:40 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:46:32 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:23:24 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 10:54:40 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 10:46:08 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/26 | 18:56:39 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:36:44 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:55:50 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:30:36 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:44:48 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:46:03 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 07:03:50 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:16:41 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:46:37 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/24 | 14:40:39 - Program Manager
            Source: server.exe, 00000002.00000002.4425655282.0000000003619000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4425655282.0000000003A01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 08:27:57 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:26:23 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:26:00 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:22:32 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:06:39 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:39:06 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:02:48 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:08:38 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 20:00:30 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:29:47 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:43:27 - Program Manager
            Source: server.exe, 00000002.00000002.4425655282.0000000003619000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4425655282.0000000003A01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 08:22:40 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:51:12 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:29:18 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:24:59 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:19:31 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:58:22 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:34:18 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:20:15 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:55:28 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:01:09 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:03:35 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:32:34 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:07:17 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:09:01 - Program Manager
            Source: server.exe, 00000002.00000002.4425655282.0000000003619000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4425655282.0000000003A01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 07:19:16 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:36:07 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:55:46 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:26:48 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:59:37 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:08:23 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:28:03 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:56:33 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/31 | 03:28:53 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/24 | 14:26:16 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:25:09 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:22:03 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:39:39 - Program Manager
            Source: server.exe, 00000002.00000002.4425655282.0000000003619000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4425655282.0000000003A01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/21 | 08:22:53 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/02 | 07:14:15 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:20:48 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:19:59 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:45:25 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:02:23 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:47:24 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 10:02:41 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:31:57 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:12:44 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:10:27 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:41:16 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:12:26 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:55:08 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:04:22 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:25:50 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:36:58 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 07:01:29 - Program Manager
            Source: server.exe, 00000002.00000002.4425655282.0000000003619000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4425655282.0000000003A01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 07:40:41 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:09:35 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:13:37 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:40:47 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:46:17 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 10:52:19 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:01:55 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:11:05 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:28:54 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:11:14 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:38:13 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:03:01 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/04 | 11:33:43 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:50:06 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/02 | 07:08:04 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:49:27 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:37:45 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/26 | 19:18:07 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:43:23 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:39:00 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:29:24 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/26 | 19:08:48 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:33:54 - Program Manager
            Source: server.exe, 00000002.00000002.4425655282.0000000003619000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4425655282.0000000003A01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 08:12:44 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:00:08 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:45:49 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:31:41 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:41:53 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:47:04 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:37:28 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/02 | 07:18:39 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:17:34 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:23:47 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:54:45 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:07:22 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:33:06 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:09:30 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:24:16 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:46:41 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:00:25 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:56:00 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:22:09 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:34:47 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:11:10 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 07:17:33 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:36:02 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:40:15 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:01:51 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:09:39 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:30:56 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:03:16 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:32:11 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:16:13 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:04:46 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:14:58 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:57:59 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:14:05 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:26:43 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:24:17 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:20:52 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:16:12 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 09:37:45 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:14:57 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 09:47:04 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:08:18 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:41:20 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:04:28 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:06:53 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:07:55 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:35:06 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:41:33 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:17:14 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:25:47 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:15:59 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:27:02 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:36:59 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:25:18 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:17:43 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:29:37 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:52:42 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:44:24 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:34:50 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 19:34:04 - Program Manager
            Source: server.exe, 00000002.00000002.4425655282.0000000003619000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4425655282.0000000003A01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 07:42:05 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:34:36 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:28:23 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:05:58 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:09:10 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:13:27 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:36:31 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:53:44 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:05:23 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:50:58 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/24 | 14:29:30 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:56:09 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:23:15 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:52:28 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:20:01 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:51:18 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:45:30 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:02:34 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:18:06 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 10:57:34 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:51:21 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:08:47 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:00:21 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 07:29:15 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:02:47 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 09:03:48 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:08:05 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:35:28 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:31:10 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 19:58:42 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:05:00 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:12:06 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:21:51 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:31:12 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/24 | 14:31:34 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:13:04 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:32:24 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:11:49 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:05:38 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:54:16 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:19:20 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:30:27 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:44:57 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:13:56 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/26 | 19:50:21 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 09:13:07 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:05:52 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:36:27 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:05:09 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:47:33 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:10:09 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:26:39 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:20:30 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:55:37 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:18:35 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:45:07 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:56:51 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:24:20 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:35:48 - Program Manager
            Source: server.exe, 00000002.00000002.4425655282.0000000003619000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4425655282.0000000003A01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/21 | 20:41:45 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:12:35 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:27:53 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:10:00 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:37:12 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/04 | 10:50:14 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:53:14 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:10:05 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:33:11 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:26:06 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:27:57 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:02:42 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:05:46 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:03:22 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:46:31 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 10:03:34 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:32:40 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:17:13 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:22:40 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:16:33 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 07:05:14 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:26:01 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/24 | 14:12:33 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:07:59 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:30:44 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:11:26 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:54:35 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:08:39 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:57:43 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:18:07 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:20:23 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 07:04:43 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:10:46 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:22:36 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:49:17 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:20:00 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:14:28 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:19:28 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:45:01 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:29:03 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:04:57 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:17:36 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:06:24 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:37:07 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 08:52:30 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:30:41 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:42:09 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/24 | 13:30:12 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 20:01:23 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:11:51 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:34:14 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:34:05 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:48:05 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:57:07 - Program Manager
            Source: scvhost.exe.2.dr, server.exe.0.drBinary or memory string: Shell_traywnd+MostrarBarraDeTarefas
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:49:47 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:59:15 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:42:18 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:38:28 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:13:07 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 10:54:03 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:05:03 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:33:43 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:53:05 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:27:22 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:18:48 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:45:10 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:02:01 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:00:37 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:27:31 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 07:16:03 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/24 | 14:22:09 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/26 | 18:31:08 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:54:12 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:55:36 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:07:38 - Program Manager
            Source: server.exe, 00000002.00000002.4425655282.0000000003619000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4425655282.0000000003A01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 03:51:49 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:48:26 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:34:55 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:42:16 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/26 | 18:17:44 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/31 | 03:25:00 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:32:42 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4425655282.000000000358A000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:42:59 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:21:01 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:40:46 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:13:31 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:55:21 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:40:24 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/26 | 19:37:45 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:02:44 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:30:58 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:34:12 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:00:07 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/26 | 19:25:48 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:37:59 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:06:17 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:02:21 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/26 | 18:49:35 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:06:47 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:22:22 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/31 | 03:29:09 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:29:55 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:33:41 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:35:15 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 07:02:59 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:25:00 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:46:54 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:43:19 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:39:29 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 09:24:33 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:05:39 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 07:26:38 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/31 | 03:30:57 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:48:21 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:36:36 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 10:50:33 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:09:43 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:40:58 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 07:26:21 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:54:49 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:28:32 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:17:47 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:59:29 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:01:38 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:38:50 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:32:54 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:15:29 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 10:46:45 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/24 | 13:45:47 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:44:00 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:16:35 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 09:22:49 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 08:51:39 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:35:58 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:07:25 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:24:39 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:26:56 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:37:02 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:20:21 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:37:57 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:20:56 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:18:52 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:53:37 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:41:08 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:21:46 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:29:53 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:08:31 - Program Manager
            Source: server.exe, 00000002.00000002.4425655282.0000000003619000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4425655282.0000000003A01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 08:14:45 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:12:30 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:14:08 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:15:34 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:30:06 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:00:17 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/04 | 11:28:25 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:51:35 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:27:01 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:14:49 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:24:12 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:03:52 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:57:30 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:44:10 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:58:01 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/04 | 11:34:14 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:31:27 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 09:49:05 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:42:46 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/02 | 07:06:57 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:49:19 - Program Manager
            Source: server.exe, 00000002.00000002.4425655282.0000000003619000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4425655282.0000000003A01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 06:58:02 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:52:14 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:54:28 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 12:29:29 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:19:12 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:35:05 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:43:31 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:00:22 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:27:16 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:29:33 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 06:43:09 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:29:16 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 07:16:40 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 19:35:34 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:45:44 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:33:59 - Program Manager
            Source: server.exe, 00000002.00000002.4425655282.0000000003619000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4425655282.0000000003A01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 08:04:32 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 09:47:41 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:34:57 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/11 | 11:57:26 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:54:20 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:48:33 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:38:05 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:53:07 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:53:35 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:17:51 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 05:38:58 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:32:20 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 01:19:15 - Program Manager
            Source: server.exe, 00000002.00000002.4425655282.0000000003619000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4425655282.0000000003A01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/22 | 07:26:57 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 22:39:43 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 23/12/28 | 23:38:06 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 02:08:01 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:59:22 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 21:20:53 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 00:32:38 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/08 | 23:47:47 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 04:02:09 - Program Manager
            Source: server.exe, 00000002.00000002.4427036735.0000000004665000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000002.00000002.4427036735.0000000005065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/01/09 | 03:16:05 - Program Manager
            Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: QUuUm3J8x3.exe, Fransesco.cs.Net Code: INS
            Source: server.exe.0.dr, Fransesco.cs.Net Code: INS
            Source: scvhost.exe.2.dr, Fransesco.cs.Net Code: INS
            Source: 444e796bc07d74246f430e63450f384ascvhost.exe.2.dr, Fransesco.cs.Net Code: INS
            Source: C:\Users\user\AppData\Local\Temp\server.exeRegistry value created: HKEY_CURRENT_USER\Environment SEE_MASK_NOZONECHECKSJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE
            Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: QUuUm3J8x3.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.QUuUm3J8x3.exe.8c0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1968331201.00000000008C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1988085134.0000000003EE8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4425655282.0000000003551000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: QUuUm3J8x3.exe PID: 6412, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: server.exe PID: 2452, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe, type: DROPPED

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: QUuUm3J8x3.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.QUuUm3J8x3.exe.8c0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1968331201.00000000008C2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1988085134.0000000003EE8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4425655282.0000000003551000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: QUuUm3J8x3.exe PID: 6412, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: server.exe PID: 2452, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\server.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe, type: DROPPED
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
            11
            Replication Through Removable Media
            Windows Management Instrumentation12
            Registry Run Keys / Startup Folder
            1
            Access Token Manipulation
            1
            Masquerading
            OS Credential Dumping11
            Security Software Discovery
            11
            Replication Through Removable Media
            1
            Archive Collected Data
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
            Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts12
            Process Injection
            41
            Disable or Modify Tools
            LSASS Memory1
            Process Discovery
            Remote Desktop Protocol1
            Clipboard Data
            Exfiltration Over Bluetooth1
            Non-Standard Port
            SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
            Domain AccountsAtLogon Script (Windows)12
            Registry Run Keys / Startup Folder
            21
            Virtualization/Sandbox Evasion
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
            Non-Application Layer Protocol
            Data Encrypted for ImpactDNS ServerEmail Addresses
            Local AccountsCronLogin HookLogin Hook1
            Access Token Manipulation
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput CaptureTraffic Duplication1
            Application Layer Protocol
            Data DestructionVirtual Private ServerEmployee Names
            Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
            Process Injection
            LSA Secrets1
            Peripheral Device Discovery
            SSHKeyloggingScheduled TransferFallback ChannelsData Encrypted for ImpactServerGather Victim Network Information
            Replication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Software Packing
            Cached Domain Credentials1
            File and Directory Discovery
            VNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
            External Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync12
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            QUuUm3J8x3.exe84%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
            QUuUm3J8x3.exe75%VirustotalBrowse
            QUuUm3J8x3.exe100%AviraTR/Dropper.Gen
            QUuUm3J8x3.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Local\Temp\server.exe100%AviraTR/Dropper.Gen
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\server.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\server.exe84%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
            C:\Users\user\AppData\Local\Temp\server.exe81%VirustotalBrowse
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe84%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe81%VirustotalBrowse
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe84%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe81%VirustotalBrowse
            No Antivirus matches
            SourceDetectionScannerLabelLink
            2.tcp.eu.ngrok.io12%VirustotalBrowse
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            2.tcp.eu.ngrok.io
            3.127.138.57
            truetrueunknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            3.127.138.57
            2.tcp.eu.ngrok.ioUnited States
            16509AMAZON-02UStrue
            18.192.93.86
            unknownUnited States
            16509AMAZON-02UStrue
            18.197.239.5
            unknownUnited States
            16509AMAZON-02UStrue
            Joe Sandbox version:38.0.0 Ammolite
            Analysis ID:1365445
            Start date and time:2023-12-21 08:21:08 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 7m 20s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:7
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:QUuUm3J8x3.exe
            renamed because original name is a hash value
            Original Sample Name:b9f6511e03f2f4fa61d4fdb1964cae4f.exe
            Detection:MAL
            Classification:mal100.spre.phis.troj.adwa.evad.winEXE@6/6@4/3
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 97%
            • Number of executed functions: 119
            • Number of non-executed functions: 9
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240000 for current running targets taking high CPU consumption
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            08:21:59AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe
            08:22:08AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe
            08:22:30API Interceptor599605x Sleep call for process: server.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            3.127.138.57RWqHoCWEPI.exeGet hashmaliciousNjratBrowse
              OUXkIxeP6k.exeGet hashmaliciousNjratBrowse
                eI43OwXSvq.exeGet hashmaliciousNjratBrowse
                  i9z1c1OtFb.exeGet hashmaliciousNjratBrowse
                    JYGc3o49WE.exeGet hashmaliciousNjratBrowse
                      J6VIiRgq3w.exeGet hashmaliciousNjratBrowse
                        7JdbeSrZ6s.exeGet hashmaliciousNjratBrowse
                          KcWQQO3nZP.exeGet hashmaliciousNjratBrowse
                            zep8vTa4sg.exeGet hashmaliciousNjratBrowse
                              umyExrpkSF.exeGet hashmaliciousNjratBrowse
                                QBEgLAO40T.exeGet hashmaliciousNjratBrowse
                                  4KWKhZNy9w.exeGet hashmaliciousNjratBrowse
                                    yPGBUzqVE3.exeGet hashmaliciousNjratBrowse
                                      D02E3399D85D6B14B30F440181EF5B8FE6B55C403B8C7.exeGet hashmaliciousnjRatBrowse
                                        2dZGR4PTLu.exeGet hashmaliciousNjratBrowse
                                          LMva1J8Xkv.exeGet hashmaliciousNjratBrowse
                                            XlNjZS4E8x.exeGet hashmaliciousNjratBrowse
                                              1F3YBPagot.exeGet hashmaliciousNanocoreBrowse
                                                H7mLbVb7Tm.exeGet hashmaliciousNjratBrowse
                                                  ojgIfElGah.exeGet hashmaliciousnjRatBrowse
                                                    18.192.93.86P90GT_Invoice_Related_Property_Tax_P800.exeGet hashmaliciousRedLineBrowse
                                                    • 2.tcp.eu.ngrok.io:17685/
                                                    http://www.sdrclm.cn/vendor/phpdocumentor/P800/P90GT_Invoice_Related_Property_Tax_P800.exeGet hashmaliciousRedLineBrowse
                                                    • 2.tcp.eu.ngrok.io:17685/
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    2.tcp.eu.ngrok.io81Rz15POL6.exeGet hashmaliciousNjratBrowse
                                                    • 18.157.68.73
                                                    649DB66A36E095B16832637A31D3CCC75040C5A6C23F6.exeGet hashmaliciousNjratBrowse
                                                    • 18.156.13.209
                                                    pQBmVoyRnw.exeGet hashmaliciousNjratBrowse
                                                    • 18.156.13.209
                                                    RWqHoCWEPI.exeGet hashmaliciousNjratBrowse
                                                    • 18.192.93.86
                                                    EB4B6878310B1E2843C964E02EC1782AACB518E32777A.exeGet hashmaliciousNjratBrowse
                                                    • 18.192.93.86
                                                    NezbdhNgwG.exeGet hashmaliciousNjratBrowse
                                                    • 18.192.93.86
                                                    xdPdkPMD8u.exeGet hashmaliciousNjratBrowse
                                                    • 18.192.93.86
                                                    VBUXm77rfL.exeGet hashmaliciousNjratBrowse
                                                    • 18.192.93.86
                                                    1UGdjTlX5v.exeGet hashmaliciousNjratBrowse
                                                    • 18.157.68.73
                                                    kXghM8bJcm.exeGet hashmaliciousNjratBrowse
                                                    • 18.192.93.86
                                                    OUXkIxeP6k.exeGet hashmaliciousNjratBrowse
                                                    • 3.126.37.18
                                                    QzzmZiGinp.exeGet hashmaliciousNjratBrowse
                                                    • 18.156.13.209
                                                    eI43OwXSvq.exeGet hashmaliciousNjratBrowse
                                                    • 18.197.239.5
                                                    p0zYXkMETE.exeGet hashmaliciousNjratBrowse
                                                    • 18.157.68.73
                                                    i9z1c1OtFb.exeGet hashmaliciousNjratBrowse
                                                    • 18.157.68.73
                                                    aF73k2XwGj.exeGet hashmaliciousNjratBrowse
                                                    • 18.192.93.86
                                                    7XyFhq6BDj.exeGet hashmaliciousNjratBrowse
                                                    • 3.126.37.18
                                                    JYGc3o49WE.exeGet hashmaliciousNjratBrowse
                                                    • 18.157.68.73
                                                    J6VIiRgq3w.exeGet hashmaliciousNjratBrowse
                                                    • 3.126.37.18
                                                    cTUu5Po5Hy.exeGet hashmaliciousNjratBrowse
                                                    • 3.126.37.18
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    AMAZON-02USXAxaAbjIBy.exeGet hashmaliciousRisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.53
                                                    b823dec3eeae35906a95d69d3c39ce07fe3155f2c8d4c.exeGet hashmaliciousRisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.96
                                                    PO54623.exeGet hashmaliciousAveMaria, PrivateLoader, UACMeBrowse
                                                    • 3.65.73.103
                                                    417OeBepSx.exeGet hashmaliciousPayPal Phisher, RisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.53
                                                    j3sCauen5m.exeGet hashmaliciousRisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.96
                                                    KincDAGGsy.exeGet hashmaliciousPayPal Phisher, RisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.96
                                                    l3OBSCwBil.exeGet hashmaliciousPayPal Phisher, RisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 52.67.144.119
                                                    FksQej1gmC.exeGet hashmaliciousRisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.53
                                                    ygM026LPMk.exeGet hashmaliciousRisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.53
                                                    TmFDAPheaH.exeGet hashmaliciousPayPal Phisher, RisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.53
                                                    dYdjynHexU.exeGet hashmaliciousRisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.119
                                                    jCjY2PPRjw.exeGet hashmaliciousPayPal Phisher, RisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.53
                                                    BkyrjYb3HZ.exeGet hashmaliciousRisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.53
                                                    B9COiyrHVE.exeGet hashmaliciousPayPal Phisher, RisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 54.94.254.242
                                                    https://nebrina.tokyo/loginGet hashmaliciousUnknownBrowse
                                                    • 54.65.124.121
                                                    https://awthore.tokyo/loginGet hashmaliciousUnknownBrowse
                                                    • 52.197.89.129
                                                    https://browndoguniversity.com/americanexpress-com.connect-online.page/amexs.htmlGet hashmaliciousHTMLPhisherBrowse
                                                    • 52.46.151.131
                                                    https://khradifmadina.blob.core.windows.net/khradifmadina/url.html#cl/1981_md/1110/3113/675/29/234450Get hashmaliciousHTMLPhisherBrowse
                                                    • 13.226.52.55
                                                    c6hm6d746Y.exeGet hashmaliciousRisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.96
                                                    https://khradifmadina.blob.core.windows.net/khradifmadina/unsub.htmlGet hashmaliciousUnknownBrowse
                                                    • 34.212.165.30
                                                    AMAZON-02USXAxaAbjIBy.exeGet hashmaliciousRisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.53
                                                    b823dec3eeae35906a95d69d3c39ce07fe3155f2c8d4c.exeGet hashmaliciousRisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.96
                                                    PO54623.exeGet hashmaliciousAveMaria, PrivateLoader, UACMeBrowse
                                                    • 3.65.73.103
                                                    417OeBepSx.exeGet hashmaliciousPayPal Phisher, RisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.53
                                                    j3sCauen5m.exeGet hashmaliciousRisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.96
                                                    KincDAGGsy.exeGet hashmaliciousPayPal Phisher, RisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.96
                                                    l3OBSCwBil.exeGet hashmaliciousPayPal Phisher, RisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 52.67.144.119
                                                    FksQej1gmC.exeGet hashmaliciousRisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.53
                                                    ygM026LPMk.exeGet hashmaliciousRisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.53
                                                    TmFDAPheaH.exeGet hashmaliciousPayPal Phisher, RisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.53
                                                    dYdjynHexU.exeGet hashmaliciousRisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.119
                                                    jCjY2PPRjw.exeGet hashmaliciousPayPal Phisher, RisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.53
                                                    BkyrjYb3HZ.exeGet hashmaliciousRisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.53
                                                    B9COiyrHVE.exeGet hashmaliciousPayPal Phisher, RisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 54.94.254.242
                                                    https://nebrina.tokyo/loginGet hashmaliciousUnknownBrowse
                                                    • 54.65.124.121
                                                    https://awthore.tokyo/loginGet hashmaliciousUnknownBrowse
                                                    • 52.197.89.129
                                                    https://browndoguniversity.com/americanexpress-com.connect-online.page/amexs.htmlGet hashmaliciousHTMLPhisherBrowse
                                                    • 52.46.151.131
                                                    https://khradifmadina.blob.core.windows.net/khradifmadina/url.html#cl/1981_md/1110/3113/675/29/234450Get hashmaliciousHTMLPhisherBrowse
                                                    • 13.226.52.55
                                                    c6hm6d746Y.exeGet hashmaliciousRisePro Stealer, SmokeLoader, Vidar, zgRATBrowse
                                                    • 108.156.83.96
                                                    https://khradifmadina.blob.core.windows.net/khradifmadina/unsub.htmlGet hashmaliciousUnknownBrowse
                                                    • 34.212.165.30
                                                    No context
                                                    No context
                                                    Process:C:\Users\user\Desktop\QUuUm3J8x3.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):525
                                                    Entropy (8bit):5.259753436570609
                                                    Encrypted:false
                                                    SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
                                                    MD5:260E01CC001F9C4643CA7A62F395D747
                                                    SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
                                                    SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
                                                    SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
                                                    Malicious:false
                                                    Reputation:moderate, very likely benign file
                                                    Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
                                                    Process:C:\Users\user\Desktop\QUuUm3J8x3.exe
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):95232
                                                    Entropy (8bit):5.567171410386498
                                                    Encrypted:false
                                                    SSDEEP:1536:yUb0MVHnHyLgq8srvwSljEwzGi1dDLDlgS:yUdHnHyLgqzrwSSi1d7y
                                                    MD5:B9F6511E03F2F4FA61D4FDB1964CAE4F
                                                    SHA1:BA42AA852A48F5449ABD9C66F8A1D909A5C01618
                                                    SHA-256:C93AB6BB562F09706D141A4804E655FE92612A07BC3AB92BF1F6F7A7A9EF9DCC
                                                    SHA-512:5EED718BA4A2325E7A2EB96EDD8A1F0F0249048FF4C92DA2FD21319E42B5A4377ABFFA01556D534971BAE811AE30CB10A57C6D0B3C8D3B64C94B86FE4D978A88
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: Joe Security
                                                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: unknown
                                                    • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: Florian Roth
                                                    • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: JPCERT/CC Incident Response Group
                                                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: ditekSHen
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 84%
                                                    • Antivirus: Virustotal, Detection: 81%, Browse
                                                    Reputation:low
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....G.e.................p.............. ........@.. ....................................@.................................|...O.................................................................................... ............... ..H............text....n... ...p.................. ..`.reloc...............r..............@..B................................................................H...........d...........................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                                    Process:C:\Users\user\AppData\Local\Temp\server.exe
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):95232
                                                    Entropy (8bit):5.567171410386498
                                                    Encrypted:false
                                                    SSDEEP:1536:yUb0MVHnHyLgq8srvwSljEwzGi1dDLDlgS:yUdHnHyLgqzrwSSi1d7y
                                                    MD5:B9F6511E03F2F4FA61D4FDB1964CAE4F
                                                    SHA1:BA42AA852A48F5449ABD9C66F8A1D909A5C01618
                                                    SHA-256:C93AB6BB562F09706D141A4804E655FE92612A07BC3AB92BF1F6F7A7A9EF9DCC
                                                    SHA-512:5EED718BA4A2325E7A2EB96EDD8A1F0F0249048FF4C92DA2FD21319E42B5A4377ABFFA01556D534971BAE811AE30CB10A57C6D0B3C8D3B64C94B86FE4D978A88
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe, Author: Joe Security
                                                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe, Author: unknown
                                                    • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe, Author: Florian Roth
                                                    • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe, Author: JPCERT/CC Incident Response Group
                                                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\444e796bc07d74246f430e63450f384ascvhost.exe, Author: ditekSHen
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 84%
                                                    • Antivirus: Virustotal, Detection: 81%, Browse
                                                    Reputation:low
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....G.e.................p.............. ........@.. ....................................@.................................|...O.................................................................................... ............... ..H............text....n... ...p.................. ..`.reloc...............r..............@..B................................................................H...........d...........................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                                    Process:C:\Users\user\AppData\Local\Temp\server.exe
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):95232
                                                    Entropy (8bit):5.567171410386498
                                                    Encrypted:false
                                                    SSDEEP:1536:yUb0MVHnHyLgq8srvwSljEwzGi1dDLDlgS:yUdHnHyLgqzrwSSi1d7y
                                                    MD5:B9F6511E03F2F4FA61D4FDB1964CAE4F
                                                    SHA1:BA42AA852A48F5449ABD9C66F8A1D909A5C01618
                                                    SHA-256:C93AB6BB562F09706D141A4804E655FE92612A07BC3AB92BF1F6F7A7A9EF9DCC
                                                    SHA-512:5EED718BA4A2325E7A2EB96EDD8A1F0F0249048FF4C92DA2FD21319E42B5A4377ABFFA01556D534971BAE811AE30CB10A57C6D0B3C8D3B64C94B86FE4D978A88
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe, Author: Joe Security
                                                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe, Author: unknown
                                                    • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe, Author: Florian Roth
                                                    • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe, Author: JPCERT/CC Incident Response Group
                                                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\scvhost.exe, Author: ditekSHen
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 84%
                                                    • Antivirus: Virustotal, Detection: 81%, Browse
                                                    Reputation:low
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....G.e.................p.............. ........@.. ....................................@.................................|...O.................................................................................... ............... ..H............text....n... ...p.................. ..`.reloc...............r..............@..B................................................................H...........d...........................................................&.(......**..(......*.s.........s ........s!........s".........*.0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0.............(....(.....+..*...0............(.....+..*.0................(.....+..*.0............(.....+..*.0.. ...................,.(...+.+.+....+...*.0...........................**..(......*....0..&........~..............,.(...+.
                                                    Process:C:\Users\user\Desktop\QUuUm3J8x3.exe
                                                    File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):5
                                                    Entropy (8bit):2.321928094887362
                                                    Encrypted:false
                                                    SSDEEP:3:n:n
                                                    MD5:F478C76BBB3174DBC7FABAE62224F818
                                                    SHA1:BED239508BAD9FCD15A9BDEA1E132F62468D07D1
                                                    SHA-256:D7A0AF52F260C87EF40BDFC1F1196FAF7797593D62C6120AE99957D78762ED1A
                                                    SHA-512:B653AA05746C721C9129456DE3798D9E94385A0E5630C5D497FA0D6076274560885EDD5875232B40D07AAFA3F0E929E9B3BF2FF388AD2C21B3589CB01B79F94B
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:.21
                                                    Process:C:\Windows\SysWOW64\netsh.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):313
                                                    Entropy (8bit):4.971939296804078
                                                    Encrypted:false
                                                    SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
                                                    MD5:689E2126A85BF55121488295EE068FA1
                                                    SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
                                                    SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
                                                    SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
                                                    Malicious:false
                                                    Reputation:high, very likely benign file
                                                    Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Entropy (8bit):5.567171410386498
                                                    TrID:
                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                    • Windows Screen Saver (13104/52) 0.07%
                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                    File name:QUuUm3J8x3.exe
                                                    File size:95'232 bytes
                                                    MD5:b9f6511e03f2f4fa61d4fdb1964cae4f
                                                    SHA1:ba42aa852a48f5449abd9c66f8a1d909a5c01618
                                                    SHA256:c93ab6bb562f09706d141a4804e655fe92612a07bc3ab92bf1f6f7a7a9ef9dcc
                                                    SHA512:5eed718ba4a2325e7a2eb96edd8a1f0f0249048ff4c92da2fd21319e42b5a4377abffa01556d534971bae811ae30cb10a57c6d0b3c8d3b64c94b86fe4d978a88
                                                    SSDEEP:1536:yUb0MVHnHyLgq8srvwSljEwzGi1dDLDlgS:yUdHnHyLgqzrwSSi1d7y
                                                    TLSH:C693C84977E52524E1BF56F79871F2014F34B44B1602E39E48F219AA1A33AC44F86FEB
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....G.e.................p............... ........@.. ....................................@................................
                                                    Icon Hash:00928e8e8686b000
                                                    Entrypoint:0x418ece
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x657F47AC [Sun Dec 17 19:10:36 2023 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                    Instruction
                                                    jmp dword ptr [00402000h]
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x18e7c0x4f.text
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1a0000xc.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x20000x16ed40x17000False0.36820652173913043data5.598826548599816IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .reloc0x1a0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    DLLImport
                                                    mscoree.dll_CorExeMain
                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                    192.168.2.518.197.239.549722124602814860 12/21/23-08:23:50.144704TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4972212460192.168.2.518.197.239.5
                                                    192.168.2.53.127.138.5749723124602033132 12/21/23-08:24:22.443531TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4972312460192.168.2.53.127.138.57
                                                    192.168.2.53.127.138.5749724124602033132 12/21/23-08:24:28.186519TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4972412460192.168.2.53.127.138.57
                                                    192.168.2.518.192.93.8649727124602814856 12/21/23-08:25:32.396830TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4972712460192.168.2.518.192.93.86
                                                    192.168.2.518.192.93.8649728124602814856 12/21/23-08:25:42.081730TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4972812460192.168.2.518.192.93.86
                                                    192.168.2.53.127.138.5749725124602033132 12/21/23-08:24:57.473768TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4972512460192.168.2.53.127.138.57
                                                    192.168.2.53.127.138.5749705124602825564 12/21/23-08:22:14.988164TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4970512460192.168.2.53.127.138.57
                                                    192.168.2.518.197.239.549722124602825564 12/21/23-08:23:50.144704TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4972212460192.168.2.518.197.239.5
                                                    192.168.2.53.127.138.5749725124602825564 12/21/23-08:25:04.347657TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4972512460192.168.2.53.127.138.57
                                                    192.168.2.53.127.138.5749726124602825564 12/21/23-08:25:12.545144TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4972612460192.168.2.53.127.138.57
                                                    192.168.2.53.127.138.5749714124602814856 12/21/23-08:22:35.251444TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4971412460192.168.2.53.127.138.57
                                                    192.168.2.518.197.239.549720124602814856 12/21/23-08:23:26.504306TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4972012460192.168.2.518.197.239.5
                                                    192.168.2.518.197.239.549721124602814856 12/21/23-08:23:38.022410TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4972112460192.168.2.518.197.239.5
                                                    192.168.2.53.127.138.5749723124602825564 12/21/23-08:24:25.802640TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4972312460192.168.2.53.127.138.57
                                                    192.168.2.518.197.239.549722124602814856 12/21/23-08:23:47.925511TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4972212460192.168.2.518.197.239.5
                                                    192.168.2.53.127.138.5749715124602814856 12/21/23-08:22:42.115347TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4971512460192.168.2.53.127.138.57
                                                    192.168.2.53.127.138.5749724124602825564 12/21/23-08:24:29.378929TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4972412460192.168.2.53.127.138.57
                                                    192.168.2.518.192.93.8649728124602825564 12/21/23-08:25:44.765776TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4972812460192.168.2.518.192.93.86
                                                    192.168.2.518.192.93.8649727124602825564 12/21/23-08:25:35.257122TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4972712460192.168.2.518.192.93.86
                                                    192.168.2.518.197.239.549719124602033132 12/21/23-08:23:16.402874TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4971912460192.168.2.518.197.239.5
                                                    192.168.2.53.127.138.5749723124602814856 12/21/23-08:24:22.684180TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4972312460192.168.2.53.127.138.57
                                                    192.168.2.53.127.138.5749714124602033132 12/21/23-08:22:35.011872TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4971412460192.168.2.53.127.138.57
                                                    192.168.2.518.197.239.549717124602033132 12/21/23-08:23:09.738672TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4971712460192.168.2.518.197.239.5
                                                    192.168.2.53.127.138.5749715124602825564 12/21/23-08:22:45.323315TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4971512460192.168.2.53.127.138.57
                                                    192.168.2.53.127.138.5749724124602814856 12/21/23-08:24:28.428947TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4972412460192.168.2.53.127.138.57
                                                    192.168.2.53.127.138.5749704124602814856 12/21/23-08:22:00.806810TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4970412460192.168.2.53.127.138.57
                                                    192.168.2.53.127.138.5749725124602814856 12/21/23-08:24:57.714176TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4972512460192.168.2.53.127.138.57
                                                    192.168.2.53.127.138.5749714124602825564 12/21/23-08:22:39.068500TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)4971412460192.168.2.53.127.138.57
                                                    192.168.2.53.127.138.5749705124602814856 12/21/23-08:22:07.582838TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4970512460192.168.2.53.127.138.57
                                                    192.168.2.53.127.138.5749726124602814856 12/21/23-08:25:07.565443TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4972612460192.168.2.53.127.138.57
                                                    192.168.2.53.127.138.5749725124602814860 12/21/23-08:25:04.347657TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4972512460192.168.2.53.127.138.57
                                                    192.168.2.518.192.93.8649727124602814860 12/21/23-08:25:35.257122TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4972712460192.168.2.518.192.93.86
                                                    192.168.2.53.127.138.5749705124602814860 12/21/23-08:22:14.988164TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4970512460192.168.2.53.127.138.57
                                                    192.168.2.53.127.138.5749714124602814860 12/21/23-08:22:39.068500TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4971412460192.168.2.53.127.138.57
                                                    192.168.2.518.192.93.8649728124602814860 12/21/23-08:25:44.765776TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4972812460192.168.2.518.192.93.86
                                                    192.168.2.53.127.138.5749726124602814860 12/21/23-08:25:12.545144TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4972612460192.168.2.53.127.138.57
                                                    192.168.2.53.127.138.5749715124602814860 12/21/23-08:22:45.323315TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4971512460192.168.2.53.127.138.57
                                                    192.168.2.518.197.239.549717124602814856 12/21/23-08:23:09.978056TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4971712460192.168.2.518.197.239.5
                                                    192.168.2.518.197.239.549721124602033132 12/21/23-08:23:37.781323TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4972112460192.168.2.518.197.239.5
                                                    192.168.2.53.127.138.5749723124602814860 12/21/23-08:24:25.802640TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4972312460192.168.2.53.127.138.57
                                                    192.168.2.518.197.239.549720124602033132 12/21/23-08:23:26.263437TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4972012460192.168.2.518.197.239.5
                                                    192.168.2.53.127.138.5749724124602814860 12/21/23-08:24:29.378929TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)4972412460192.168.2.53.127.138.57
                                                    192.168.2.53.127.138.5749704124602033132 12/21/23-08:22:00.564694TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4970412460192.168.2.53.127.138.57
                                                    192.168.2.53.127.138.5749715124602033132 12/21/23-08:22:41.875520TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4971512460192.168.2.53.127.138.57
                                                    192.168.2.53.127.138.5749726124602033132 12/21/23-08:25:07.325936TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4972612460192.168.2.53.127.138.57
                                                    192.168.2.53.127.138.5749705124602033132 12/21/23-08:22:07.341922TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4970512460192.168.2.53.127.138.57
                                                    192.168.2.518.197.239.549722124602033132 12/21/23-08:23:47.684823TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4972212460192.168.2.518.197.239.5
                                                    192.168.2.518.192.93.8649728124602033132 12/21/23-08:25:41.841463TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4972812460192.168.2.518.192.93.86
                                                    192.168.2.518.192.93.8649727124602033132 12/21/23-08:25:32.154857TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)4972712460192.168.2.518.192.93.86
                                                    192.168.2.518.197.239.549719124602814856 12/21/23-08:23:16.645108TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)4971912460192.168.2.518.197.239.5
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 21, 2023 08:22:00.245955944 CET4970412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:00.486634970 CET12460497043.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:22:00.486823082 CET4970412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:00.564693928 CET4970412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:00.806716919 CET12460497043.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:22:00.806809902 CET4970412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:01.047499895 CET12460497043.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:22:05.085464954 CET12460497043.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:22:05.128344059 CET4970412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:07.098007917 CET4970412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:07.099618912 CET4970512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:07.340960979 CET12460497053.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:22:07.341156006 CET4970512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:07.341922045 CET4970512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:07.582740068 CET12460497053.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:22:07.582838058 CET4970512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:07.824357033 CET12460497053.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:22:14.988163948 CET4970512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:15.228750944 CET12460497053.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:22:30.393302917 CET12460497053.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:22:30.393352032 CET4970512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:32.761054993 CET12460497053.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:22:32.761132002 CET4970512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:34.769280910 CET4970512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:34.771081924 CET4971412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:35.010601044 CET12460497053.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:22:35.010751963 CET12460497143.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:22:35.010840893 CET4971412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:35.011872053 CET4971412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:35.251379967 CET12460497143.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:22:35.251444101 CET4971412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:35.491035938 CET12460497143.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:22:39.068500042 CET4971412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:39.308120966 CET12460497143.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:22:39.613670111 CET12460497143.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:22:39.613768101 CET4971412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:41.628633976 CET4971412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:41.630508900 CET4971512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:41.868204117 CET12460497143.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:22:41.870371103 CET12460497153.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:22:41.870482922 CET4971512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:41.875519991 CET4971512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:42.115288973 CET12460497153.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:22:42.115346909 CET4971512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:42.359000921 CET12460497153.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:22:45.323314905 CET4971512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:22:45.563133001 CET12460497153.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:23:00.601593018 CET12460497153.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:23:00.601659060 CET4971512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:23:07.288424015 CET12460497153.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:23:07.288494110 CET4971512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:23:09.300606966 CET4971512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:23:09.497400999 CET4971712460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:09.540400028 CET12460497153.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:23:09.736746073 CET124604971718.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:09.736854076 CET4971712460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:09.738672018 CET4971712460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:09.977971077 CET124604971718.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:09.978055954 CET4971712460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:10.217565060 CET124604971718.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:14.146172047 CET124604971718.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:14.146370888 CET4971712460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:16.159847975 CET4971712460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:16.161350012 CET4971912460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:16.399204016 CET124604971718.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:16.401511908 CET124604971918.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:16.401595116 CET4971912460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:16.402873993 CET4971912460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:16.645008087 CET124604971918.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:16.645107985 CET4971912460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:16.885365963 CET124604971918.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:24.012372971 CET124604971918.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:24.012558937 CET4971912460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:26.019226074 CET4971912460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:26.021666050 CET4972012460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:26.259324074 CET124604971918.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:26.262259007 CET124604972018.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:26.262456894 CET4972012460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:26.263437033 CET4972012460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:26.504117966 CET124604972018.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:26.504306078 CET4972012460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:26.744879961 CET124604972018.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:35.098226070 CET124604972018.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:35.237926960 CET4972012460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:37.536823034 CET4972012460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:37.538399935 CET4972112460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:37.779804945 CET124604972118.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:37.779913902 CET4972112460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:37.781322956 CET4972112460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:38.022300005 CET124604972118.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:38.022409916 CET4972112460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:38.263457060 CET124604972118.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:45.429939985 CET124604972118.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:45.430012941 CET4972112460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:47.441390038 CET4972112460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:47.442744970 CET4972212460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:47.682557106 CET124604972118.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:47.683811903 CET124604972218.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:47.683887005 CET4972212460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:47.684823036 CET4972212460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:47.925419092 CET124604972218.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:47.925510883 CET4972212460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:48.166184902 CET124604972218.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:23:50.144704103 CET4972212460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:23:50.385606050 CET124604972218.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:24:05.454592943 CET124604972218.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:24:05.454668999 CET4972212460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:24:19.956438065 CET124604972218.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:24:19.956568956 CET4972212460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:24:21.966917992 CET4972212460192.168.2.518.197.239.5
                                                    Dec 21, 2023 08:24:22.201752901 CET4972312460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:24:22.207576990 CET124604972218.197.239.5192.168.2.5
                                                    Dec 21, 2023 08:24:22.442358971 CET12460497233.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:24:22.442517042 CET4972312460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:24:22.443531036 CET4972312460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:24:22.684086084 CET12460497233.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:24:22.684180021 CET4972312460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:24:22.924695015 CET12460497233.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:24:25.802639961 CET4972312460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:24:25.927581072 CET12460497233.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:24:25.927670002 CET4972312460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:24:26.043123960 CET12460497233.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:24:26.168059111 CET12460497233.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:24:27.942872047 CET4972412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:24:28.185393095 CET12460497243.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:24:28.185486078 CET4972412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:24:28.186518908 CET4972412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:24:28.428850889 CET12460497243.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:24:28.428946972 CET4972412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:24:28.671372890 CET12460497243.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:24:29.378928900 CET4972412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:24:29.621196985 CET12460497243.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:24:44.638381004 CET12460497243.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:24:44.638483047 CET4972412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:24:54.714807034 CET12460497243.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:24:54.714905024 CET4972412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:24:57.223289013 CET4972412460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:24:57.224847078 CET4972512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:24:57.469750881 CET12460497253.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:24:57.469769955 CET12460497243.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:24:57.469886065 CET4972512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:24:57.473767996 CET4972512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:24:57.714098930 CET12460497253.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:24:57.714175940 CET4972512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:24:57.954216957 CET12460497253.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:25:04.347656965 CET4972512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:25:04.588474989 CET12460497253.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:25:05.080512047 CET12460497253.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:25:05.238044024 CET4972512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:25:07.081904888 CET4972512460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:25:07.083302975 CET4972612460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:25:07.322840929 CET12460497263.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:25:07.323015928 CET4972612460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:25:07.325936079 CET4972612460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:25:07.565390110 CET12460497263.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:25:07.565443039 CET4972612460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:25:07.804862976 CET12460497263.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:25:12.545144081 CET4972612460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:25:12.787326097 CET12460497263.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:25:27.805676937 CET12460497263.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:25:27.805721045 CET4972612460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:25:29.745826960 CET12460497263.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:25:29.745901108 CET4972612460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:25:31.755338907 CET4972612460192.168.2.53.127.138.57
                                                    Dec 21, 2023 08:25:31.913546085 CET4972712460192.168.2.518.192.93.86
                                                    Dec 21, 2023 08:25:31.994894981 CET12460497263.127.138.57192.168.2.5
                                                    Dec 21, 2023 08:25:32.153824091 CET124604972718.192.93.86192.168.2.5
                                                    Dec 21, 2023 08:25:32.153892040 CET4972712460192.168.2.518.192.93.86
                                                    Dec 21, 2023 08:25:32.154856920 CET4972712460192.168.2.518.192.93.86
                                                    Dec 21, 2023 08:25:32.396737099 CET124604972718.192.93.86192.168.2.5
                                                    Dec 21, 2023 08:25:32.396830082 CET4972712460192.168.2.518.192.93.86
                                                    Dec 21, 2023 08:25:32.637514114 CET124604972718.192.93.86192.168.2.5
                                                    Dec 21, 2023 08:25:35.257122040 CET4972712460192.168.2.518.192.93.86
                                                    Dec 21, 2023 08:25:35.498989105 CET124604972718.192.93.86192.168.2.5
                                                    Dec 21, 2023 08:25:39.593806982 CET124604972718.192.93.86192.168.2.5
                                                    Dec 21, 2023 08:25:39.593930960 CET4972712460192.168.2.518.192.93.86
                                                    Dec 21, 2023 08:25:41.597737074 CET4972712460192.168.2.518.192.93.86
                                                    Dec 21, 2023 08:25:41.599987030 CET4972812460192.168.2.518.192.93.86
                                                    Dec 21, 2023 08:25:41.838534117 CET124604972718.192.93.86192.168.2.5
                                                    Dec 21, 2023 08:25:41.840390921 CET124604972818.192.93.86192.168.2.5
                                                    Dec 21, 2023 08:25:41.840492010 CET4972812460192.168.2.518.192.93.86
                                                    Dec 21, 2023 08:25:41.841463089 CET4972812460192.168.2.518.192.93.86
                                                    Dec 21, 2023 08:25:42.081593990 CET124604972818.192.93.86192.168.2.5
                                                    Dec 21, 2023 08:25:42.081729889 CET4972812460192.168.2.518.192.93.86
                                                    Dec 21, 2023 08:25:42.321876049 CET124604972818.192.93.86192.168.2.5
                                                    Dec 21, 2023 08:25:44.765775919 CET4972812460192.168.2.518.192.93.86
                                                    Dec 21, 2023 08:25:45.005779982 CET124604972818.192.93.86192.168.2.5
                                                    Dec 21, 2023 08:26:00.146995068 CET124604972818.192.93.86192.168.2.5
                                                    Dec 21, 2023 08:26:00.147047997 CET4972812460192.168.2.518.192.93.86
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 21, 2023 08:22:00.101906061 CET6074753192.168.2.51.1.1.1
                                                    Dec 21, 2023 08:22:00.243022919 CET53607471.1.1.1192.168.2.5
                                                    Dec 21, 2023 08:23:09.301723957 CET5563953192.168.2.51.1.1.1
                                                    Dec 21, 2023 08:23:09.495954990 CET53556391.1.1.1192.168.2.5
                                                    Dec 21, 2023 08:24:21.968174934 CET5661453192.168.2.51.1.1.1
                                                    Dec 21, 2023 08:24:22.200453997 CET53566141.1.1.1192.168.2.5
                                                    Dec 21, 2023 08:25:31.756707907 CET5463453192.168.2.51.1.1.1
                                                    Dec 21, 2023 08:25:31.897093058 CET53546341.1.1.1192.168.2.5
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Dec 21, 2023 08:22:00.101906061 CET192.168.2.51.1.1.10x3a53Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                    Dec 21, 2023 08:23:09.301723957 CET192.168.2.51.1.1.10x6b89Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                    Dec 21, 2023 08:24:21.968174934 CET192.168.2.51.1.1.10xd89cStandard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                    Dec 21, 2023 08:25:31.756707907 CET192.168.2.51.1.1.10x21f3Standard query (0)2.tcp.eu.ngrok.ioA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Dec 21, 2023 08:22:00.243022919 CET1.1.1.1192.168.2.50x3a53No error (0)2.tcp.eu.ngrok.io3.127.138.57A (IP address)IN (0x0001)false
                                                    Dec 21, 2023 08:23:09.495954990 CET1.1.1.1192.168.2.50x6b89No error (0)2.tcp.eu.ngrok.io18.197.239.5A (IP address)IN (0x0001)false
                                                    Dec 21, 2023 08:24:22.200453997 CET1.1.1.1192.168.2.50xd89cNo error (0)2.tcp.eu.ngrok.io3.127.138.57A (IP address)IN (0x0001)false
                                                    Dec 21, 2023 08:25:31.897093058 CET1.1.1.1192.168.2.50x21f3No error (0)2.tcp.eu.ngrok.io18.192.93.86A (IP address)IN (0x0001)false

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:08:21:52
                                                    Start date:21/12/2023
                                                    Path:C:\Users\user\Desktop\QUuUm3J8x3.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\Desktop\QUuUm3J8x3.exe
                                                    Imagebase:0x8c0000
                                                    File size:95'232 bytes
                                                    MD5 hash:B9F6511E03F2F4FA61D4FDB1964CAE4F
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:.Net C# or VB.NET
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000000.1968331201.00000000008C2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000000.1968331201.00000000008C2000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                    • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000000.1968331201.00000000008C2000.00000002.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.1988085134.0000000003EE8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000002.1988085134.0000000003EE8000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000002.1988085134.0000000003EE8000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:2
                                                    Start time:08:21:54
                                                    Start date:21/12/2023
                                                    Path:C:\Users\user\AppData\Local\Temp\server.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Local\Temp\server.exe"
                                                    Imagebase:0xf40000
                                                    File size:95'232 bytes
                                                    MD5 hash:B9F6511E03F2F4FA61D4FDB1964CAE4F
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:.Net C# or VB.NET
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000002.00000002.4425655282.0000000003551000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: Joe Security
                                                    • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: unknown
                                                    • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: Florian Roth
                                                    • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: JPCERT/CC Incident Response Group
                                                    • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\Temp\server.exe, Author: ditekSHen
                                                    Antivirus matches:
                                                    • Detection: 100%, Avira
                                                    • Detection: 100%, Joe Sandbox ML
                                                    • Detection: 84%, ReversingLabs
                                                    • Detection: 81%, Virustotal, Browse
                                                    Reputation:low
                                                    Has exited:false

                                                    Target ID:3
                                                    Start time:08:21:55
                                                    Start date:21/12/2023
                                                    Path:C:\Windows\SysWOW64\netsh.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE
                                                    Imagebase:0x1080000
                                                    File size:82'432 bytes
                                                    MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:4
                                                    Start time:08:21:56
                                                    Start date:21/12/2023
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff6d64d0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:2.3%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:58
                                                      Total number of Limit Nodes:4
                                                      execution_graph 14146 10caeae 14148 10caee3 WriteFile 14146->14148 14149 10caf15 14148->14149 14218 10ca6ce 14219 10ca72e OleGetClipboard 14218->14219 14221 10ca78c 14219->14221 14154 10cb06a 14155 10cb0a2 CreateMutexW 14154->14155 14157 10cb0e5 14155->14157 14186 10cb424 14189 10cb446 ShellExecuteExW 14186->14189 14188 10cb488 14189->14188 14158 10cb446 14159 10cb46c ShellExecuteExW 14158->14159 14161 10cb488 14159->14161 14162 10caaa6 14163 10caade CreateFileW 14162->14163 14165 10cab2d 14163->14165 14198 10cab7c 14199 10cabbe FindCloseChangeNotification 14198->14199 14201 10cabf8 14199->14201 14166 10ca65e 14167 10ca68a OleInitialize 14166->14167 14168 10ca6c0 14166->14168 14169 10ca698 14167->14169 14168->14167 14170 10cabbe 14171 10cac29 14170->14171 14172 10cabea FindCloseChangeNotification 14170->14172 14171->14172 14173 10cabf8 14172->14173 14182 10ca61e 14183 10ca65e OleInitialize 14182->14183 14185 10ca698 14183->14185 14214 10ca9bf 14215 10ca9c9 SetErrorMode 14214->14215 14217 10caa53 14215->14217 14174 10ca59a 14175 10ca5d8 DuplicateHandle 14174->14175 14176 10ca610 14174->14176 14177 10ca5e6 14175->14177 14176->14175 14202 10caa75 14203 10caaa6 CreateFileW 14202->14203 14205 10cab2d 14203->14205 14190 10cb036 14192 10cb06a CreateMutexW 14190->14192 14193 10cb0e5 14192->14193 14194 10cac37 14195 10cac6a GetFileType 14194->14195 14197 10caccc 14195->14197 14206 10cae77 14208 10caeae WriteFile 14206->14208 14209 10caf15 14208->14209 14178 10caa12 14179 10caa3e SetErrorMode 14178->14179 14180 10caa67 14178->14180 14181 10caa53 14179->14181 14180->14179 14210 10ca573 14212 10ca59a DuplicateHandle 14210->14212 14213 10ca5e6 14212->14213

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 5094298-50942c9 4 50942cb-5094350 0->4 5 5094352-509435a 0->5 4->5 33 509435c 4->33 6 5094366-509437a 5->6 8 509452f-509467d 6->8 9 5094380-50943bc 6->9 45 509480d-5094821 8->45 46 5094683-50947d2 8->46 20 50943ed-50944ea 9->20 21 50943be-50943e6 9->21 138 50944ef 20->138 21->20 33->6 48 509496f-5094983 45->48 49 5094827-5094934 45->49 46->45 51 5094985-509499b call 5094210 48->51 52 50949d6-50949ea 48->52 49->48 51->52 54 50949ec-50949f7 52->54 55 5094a32-5094a46 52->55 54->55 59 5094a4c-5094b59 55->59 60 5094b94-5094ba8 55->60 59->60 64 5094bae-5094bc2 60->64 65 5094cd4-5094ce8 60->65 67 5094bd0-5094be4 64->67 68 5094bc4-5094bcb 64->68 71 5094cee-5094f2d 65->71 72 5094f74-5094f88 65->72 79 5094bef-5094c03 67->79 80 5094be6-5094bed 67->80 76 5094c48-5094c5c 68->76 71->72 77 5094f8a-5094f9b 72->77 78 5094fe2-5094ff6 72->78 86 5094c5e-5094c74 76->86 87 5094c76-5094c82 76->87 77->78 81 5094ff8-5094ffe 78->81 82 5095045-5095059 78->82 84 5094c0e-5094c22 79->84 85 5094c05-5094c0c 79->85 80->76 81->82 93 509505b 82->93 94 50950a2-50950b6 82->94 91 5094c2d-5094c41 84->91 92 5094c24-5094c2b 84->92 85->76 96 5094c8d 86->96 87->96 91->76 104 5094c43-5094c45 91->104 92->76 93->94 105 50950b8-50950e1 94->105 106 509512d-5095141 94->106 96->65 104->76 105->106 109 50953b4-50953c8 106->109 110 5095147-5095363 106->110 112 509549e-50954b2 109->112 113 50953ce-5095457 109->113 490 5095365 110->490 491 5095367 110->491 120 50954b8-5095628 112->120 121 509566f-5095683 112->121 113->112 120->121 128 5095689-509579f 121->128 129 50957e6-50957fa 121->129 128->129 134 509595d-5095971 129->134 135 5095800-5095916 129->135 141 5095ad4-5095ae8 134->141 142 5095977-5095a8d 134->142 135->134 138->8 147 5095c4b-5095c5f 141->147 148 5095aee-5095c04 141->148 142->141 154 5095dc2-5095dd6 147->154 155 5095c65-5095d7b 147->155 148->147 161 5095f39-5095f4d 154->161 162 5095ddc-5095ef2 154->162 155->154 167 50960b0-50960c4 161->167 168 5095f53-5096069 161->168 162->161 176 50960ca-50961e0 167->176 177 5096227-509623b 167->177 168->167 176->177 184 509639e-50963b2 177->184 185 5096241-5096357 177->185 194 50963b8-50963fd call 5094278 184->194 195 5096536-509654a 184->195 185->184 326 50964bd-50964df 194->326 207 509668d-50966a1 195->207 208 5096550-509656f 195->208 220 50967ee-5096802 207->220 221 50966a7-50967a7 207->221 244 5096614-5096636 208->244 227 5096808-5096908 220->227 228 509694f-5096963 220->228 221->220 227->228 242 5096969-5096a69 228->242 243 5096ab0-5096ada 228->243 242->243 263 5096b9a-5096bae 243->263 264 5096ae0-5096b53 243->264 253 509663c 244->253 254 5096574-5096583 244->254 253->207 268 5096589-50965bc 254->268 269 509663e 254->269 278 5096c8b-5096c9f 263->278 279 5096bb4-5096c44 263->279 264->263 359 50965be-50965f8 268->359 360 5096603-509660c 268->360 289 5096643-509668b 269->289 283 5096de5-5096df9 278->283 284 5096ca5-5096d9e 278->284 279->278 298 509705c-5097070 283->298 299 5096dff-5096e4f 283->299 284->283 289->207 319 5097158-509715f 298->319 320 5097076-5097111 call 5094278 * 2 298->320 418 5096ebd-5096ee8 299->418 419 5096e51-5096e77 299->419 320->319 339 5096402-5096411 326->339 340 50964e5 326->340 356 50964e7 339->356 357 5096417-50964b5 339->357 340->195 375 50964ec-5096534 356->375 357->375 493 50964b7 357->493 359->360 360->289 367 509660e 360->367 367->244 375->195 488 5096eee-5096fc1 418->488 489 5096fc6-5097057 418->489 495 5096e79-5096e99 419->495 496 5096eb8 419->496 488->298 489->298 499 509536d 490->499 491->499 493->326 495->496 496->298 499->109
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1988208692.0000000005090000.00000040.00000800.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5090000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @
                                                      • API String ID: 0-2766056989
                                                      • Opcode ID: 610da42a3b2dffbb861b32ca7fc57bd93377d256b4760a8c2684d5c19554daea
                                                      • Instruction ID: baee2211a76c4e2ee559911997526fe7ca1d61e7d09d7afb9cea71fda2a566c3
                                                      • Opcode Fuzzy Hash: 610da42a3b2dffbb861b32ca7fc57bd93377d256b4760a8c2684d5c19554daea
                                                      • Instruction Fuzzy Hash: 01232974A01228CFDB69EB35D854BADB7B2BF48304F1041E9E9096B3A8DB355E81CF51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 557 5094269-5094288 558 509428a-5094290 557->558 559 50942b1-50942c2 557->559 560 5094292-50942af 558->560 561 50942c4-50942c9 558->561 559->561 560->559 564 50942cb-5094350 561->564 565 5094352-509435a 561->565 564->565 593 509435c 564->593 566 5094366-509437a 565->566 568 509452f-509467d 566->568 569 5094380-50943bc 566->569 605 509480d-5094821 568->605 606 5094683-50947d2 568->606 580 50943ed-50944ea 569->580 581 50943be-50943e6 569->581 698 50944ef 580->698 581->580 593->566 608 509496f-5094983 605->608 609 5094827-5094934 605->609 606->605 611 5094985-509499b call 5094210 608->611 612 50949d6-50949ea 608->612 609->608 611->612 614 50949ec-50949f7 612->614 615 5094a32-5094a46 612->615 614->615 619 5094a4c-5094b59 615->619 620 5094b94-5094ba8 615->620 619->620 624 5094bae-5094bc2 620->624 625 5094cd4-5094ce8 620->625 627 5094bd0-5094be4 624->627 628 5094bc4-5094bcb 624->628 631 5094cee-5094f2d 625->631 632 5094f74-5094f88 625->632 639 5094bef-5094c03 627->639 640 5094be6-5094bed 627->640 636 5094c48-5094c5c 628->636 631->632 637 5094f8a-5094f9b 632->637 638 5094fe2-5094ff6 632->638 646 5094c5e-5094c74 636->646 647 5094c76-5094c82 636->647 637->638 641 5094ff8-5094ffe 638->641 642 5095045-5095059 638->642 644 5094c0e-5094c22 639->644 645 5094c05-5094c0c 639->645 640->636 641->642 653 509505b 642->653 654 50950a2-50950b6 642->654 651 5094c2d-5094c41 644->651 652 5094c24-5094c2b 644->652 645->636 656 5094c8d 646->656 647->656 651->636 664 5094c43-5094c45 651->664 652->636 653->654 665 50950b8-50950e1 654->665 666 509512d-5095141 654->666 656->625 664->636 665->666 669 50953b4-50953c8 666->669 670 5095147-5095363 666->670 672 509549e-50954b2 669->672 673 50953ce-5095457 669->673 1050 5095365 670->1050 1051 5095367 670->1051 680 50954b8-5095628 672->680 681 509566f-5095683 672->681 673->672 680->681 688 5095689-509579f 681->688 689 50957e6-50957fa 681->689 688->689 694 509595d-5095971 689->694 695 5095800-5095916 689->695 701 5095ad4-5095ae8 694->701 702 5095977-5095a8d 694->702 695->694 698->568 707 5095c4b-5095c5f 701->707 708 5095aee-5095c04 701->708 702->701 714 5095dc2-5095dd6 707->714 715 5095c65-5095d7b 707->715 708->707 721 5095f39-5095f4d 714->721 722 5095ddc-5095ef2 714->722 715->714 727 50960b0-50960c4 721->727 728 5095f53-5096069 721->728 722->721 736 50960ca-50961e0 727->736 737 5096227-509623b 727->737 728->727 736->737 744 509639e-50963b2 737->744 745 5096241-5096357 737->745 754 50963b8-50963fd call 5094278 744->754 755 5096536-509654a 744->755 745->744 886 50964bd-50964df 754->886 767 509668d-50966a1 755->767 768 5096550-509656f 755->768 780 50967ee-5096802 767->780 781 50966a7-50967a7 767->781 804 5096614-5096636 768->804 787 5096808-5096908 780->787 788 509694f-5096963 780->788 781->780 787->788 802 5096969-5096a69 788->802 803 5096ab0-5096ada 788->803 802->803 823 5096b9a-5096bae 803->823 824 5096ae0-5096b53 803->824 813 509663c 804->813 814 5096574-5096583 804->814 813->767 828 5096589-50965bc 814->828 829 509663e 814->829 838 5096c8b-5096c9f 823->838 839 5096bb4-5096c44 823->839 824->823 919 50965be-50965f8 828->919 920 5096603-509660c 828->920 849 5096643-509668b 829->849 843 5096de5-5096df9 838->843 844 5096ca5-5096d9e 838->844 839->838 858 509705c-5097070 843->858 859 5096dff-5096e4f 843->859 844->843 849->767 879 5097158-509715f 858->879 880 5097076-5097111 call 5094278 * 2 858->880 978 5096ebd-5096ee8 859->978 979 5096e51-5096e77 859->979 880->879 899 5096402-5096411 886->899 900 50964e5 886->900 916 50964e7 899->916 917 5096417-50964b5 899->917 900->755 935 50964ec-5096534 916->935 917->935 1053 50964b7 917->1053 919->920 920->849 927 509660e 920->927 927->804 935->755 1048 5096eee-5096fc1 978->1048 1049 5096fc6-5097057 978->1049 1055 5096e79-5096e99 979->1055 1056 5096eb8 979->1056 1048->858 1049->858 1059 509536d 1050->1059 1051->1059 1053->886 1055->1056 1056->858 1059->669
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1988208692.0000000005090000.00000040.00000800.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5090000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID: 0-3916222277
                                                      • Opcode ID: 5fc5f09a234bccf7663e467ecca96e5c99e58d176546bc10e28f645ce16eb371
                                                      • Instruction ID: e0c3c1ab0ff311cdd51be7607b6abd73ad724b7c2b875eb41e2d18281ea966d4
                                                      • Opcode Fuzzy Hash: 5fc5f09a234bccf7663e467ecca96e5c99e58d176546bc10e28f645ce16eb371
                                                      • Instruction Fuzzy Hash: 52131974A01228CFDB29EF31D854BADB7B2BB48304F1041E9E9496B3A9DB355E81CF51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1117 10caa75-10caafe 1121 10cab00 1117->1121 1122 10cab03-10cab0f 1117->1122 1121->1122 1123 10cab14-10cab1d 1122->1123 1124 10cab11 1122->1124 1125 10cab6e-10cab73 1123->1125 1126 10cab1f-10cab43 CreateFileW 1123->1126 1124->1123 1125->1126 1129 10cab75-10cab7a 1126->1129 1130 10cab45-10cab6b 1126->1130 1129->1130
                                                      APIs
                                                      • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 010CAB25
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987453935.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10ca000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: f5a1f5628017c9971fffee058a9b5a39ab42e60d6b55528121031ceb5b015d6a
                                                      • Instruction ID: 0d4550b8d1e3c4f5bc14ee6ba9c23733f3424f0a91203d1491975cf079c1daa0
                                                      • Opcode Fuzzy Hash: f5a1f5628017c9971fffee058a9b5a39ab42e60d6b55528121031ceb5b015d6a
                                                      • Instruction Fuzzy Hash: BE316071505344AFE722CF65CC85F56BFF8EF05614F08889EE9858B652D365E808CB71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1133 10cb036-10cb0b9 1137 10cb0be-10cb0c7 1133->1137 1138 10cb0bb 1133->1138 1139 10cb0cc-10cb0d5 1137->1139 1140 10cb0c9 1137->1140 1138->1137 1141 10cb126-10cb12b 1139->1141 1142 10cb0d7-10cb0fb CreateMutexW 1139->1142 1140->1139 1141->1142 1145 10cb12d-10cb132 1142->1145 1146 10cb0fd-10cb123 1142->1146 1145->1146
                                                      APIs
                                                      • CreateMutexW.KERNELBASE(?,?), ref: 010CB0DD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987453935.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10ca000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID: CreateMutex
                                                      • String ID:
                                                      • API String ID: 1964310414-0
                                                      • Opcode ID: d682c19891c405133ca158f26f3e85c3f1951981d34d52bda9999e73172dfc92
                                                      • Instruction ID: 72fb0a2871e5e6430f09b806cde40142c5581763c65cb381c7c9c0191fa3443d
                                                      • Opcode Fuzzy Hash: d682c19891c405133ca158f26f3e85c3f1951981d34d52bda9999e73172dfc92
                                                      • Instruction Fuzzy Hash: 773172715093805FE721CB25DC45B96BFF8EF16614F08849AE9848B293D365E909CB72
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1149 10ca6ce-10ca72b 1150 10ca72e-10ca786 OleGetClipboard 1149->1150 1152 10ca78c-10ca7a2 1150->1152
                                                      APIs
                                                      • OleGetClipboard.OLE32(?,00000E24,?,?), ref: 010CA77E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987453935.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10ca000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID: Clipboard
                                                      • String ID:
                                                      • API String ID: 220874293-0
                                                      • Opcode ID: dc169d1927ffc854016135cb740e98d11cc3996bdddd6cc8d78f2380c1f0d256
                                                      • Instruction ID: 520a2a535525a6d4232da1d83476bf5c0e57a777a2d27905d1856bc50fa0f27c
                                                      • Opcode Fuzzy Hash: dc169d1927ffc854016135cb740e98d11cc3996bdddd6cc8d78f2380c1f0d256
                                                      • Instruction Fuzzy Hash: 9E31717114E3C06FD3138B259C61B61BFB4EF87610F0A80CBE884CB5A3D2256919D772
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1153 10cae77-10caf05 1157 10caf49-10caf4e 1153->1157 1158 10caf07-10caf27 WriteFile 1153->1158 1157->1158 1161 10caf29-10caf46 1158->1161 1162 10caf50-10caf55 1158->1162 1162->1161
                                                      APIs
                                                      • WriteFile.KERNELBASE(?,00000E24,A8DEAFEC,00000000,00000000,00000000,00000000), ref: 010CAF0D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987453935.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10ca000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID: FileWrite
                                                      • String ID:
                                                      • API String ID: 3934441357-0
                                                      • Opcode ID: 6987f23d8f5fdafe0f849fdc36c774e8b041ea3568a9299e9020ee5360930d3e
                                                      • Instruction ID: d97068e3248e1fdd6bf01870dfd68d454f83da1ff4f7fa23b13ad8e06387690d
                                                      • Opcode Fuzzy Hash: 6987f23d8f5fdafe0f849fdc36c774e8b041ea3568a9299e9020ee5360930d3e
                                                      • Instruction Fuzzy Hash: B121B1B2509380AFD722CB61DC44F96BFB8EF56714F0884DAE9848F193D274A509CB71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1165 10caaa6-10caafe 1168 10cab00 1165->1168 1169 10cab03-10cab0f 1165->1169 1168->1169 1170 10cab14-10cab1d 1169->1170 1171 10cab11 1169->1171 1172 10cab6e-10cab73 1170->1172 1173 10cab1f-10cab27 CreateFileW 1170->1173 1171->1170 1172->1173 1175 10cab2d-10cab43 1173->1175 1176 10cab75-10cab7a 1175->1176 1177 10cab45-10cab6b 1175->1177 1176->1177
                                                      APIs
                                                      • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 010CAB25
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987453935.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10ca000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: c6581c949dc6813acd42b3de43dbcd2de03834a0ce0a892c856f2c0ea1457161
                                                      • Instruction ID: 22498643ea16caf7be3c1195a272e2889d622086e7ac7be160271552522d941d
                                                      • Opcode Fuzzy Hash: c6581c949dc6813acd42b3de43dbcd2de03834a0ce0a892c856f2c0ea1457161
                                                      • Instruction Fuzzy Hash: E7219271600204AFE761DF65CD45F6AFBE8EF14724F04886DEA858B652E375E408CB71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1180 10ca9bf-10caa3c 1185 10caa3e-10caa51 SetErrorMode 1180->1185 1186 10caa67-10caa6c 1180->1186 1187 10caa6e-10caa73 1185->1187 1188 10caa53-10caa66 1185->1188 1186->1185 1187->1188
                                                      APIs
                                                      • SetErrorMode.KERNELBASE(?), ref: 010CAA44
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987453935.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10ca000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode
                                                      • String ID:
                                                      • API String ID: 2340568224-0
                                                      • Opcode ID: cc3fe40955252f36565ebd172fee0de69afaac9e28494183b00c8644a6e3204d
                                                      • Instruction ID: 7432f9b9183d6d32818c0162114a4b3d6f34877608385c1aec8a2979e424d5a2
                                                      • Opcode Fuzzy Hash: cc3fe40955252f36565ebd172fee0de69afaac9e28494183b00c8644a6e3204d
                                                      • Instruction Fuzzy Hash: 8A21486550E3C4AFD7138B258C64A51BFB4EF53624F0E80DBE884CF5A3D2689809CB72
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1191 10cac37-10cacb5 1195 10cacea-10cacef 1191->1195 1196 10cacb7-10cacca GetFileType 1191->1196 1195->1196 1197 10caccc-10cace9 1196->1197 1198 10cacf1-10cacf6 1196->1198 1198->1197
                                                      APIs
                                                      • GetFileType.KERNELBASE(?,00000E24,A8DEAFEC,00000000,00000000,00000000,00000000), ref: 010CACBD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987453935.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10ca000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID: FileType
                                                      • String ID:
                                                      • API String ID: 3081899298-0
                                                      • Opcode ID: d7a5ea92a75f0d0d98eb591a8f02ab59ae209b0325c48145ff27137e772ecb42
                                                      • Instruction ID: 4bfb9ef90480e141ea1ffde0b38cac1c3f52e5297c7d49183d96050cdf56a1ca
                                                      • Opcode Fuzzy Hash: d7a5ea92a75f0d0d98eb591a8f02ab59ae209b0325c48145ff27137e772ecb42
                                                      • Instruction Fuzzy Hash: D621F3B54093846FE7128B119C80BA6BFB8EF52724F0880DAF9848B293D264A909C771
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1202 10cb06a-10cb0b9 1205 10cb0be-10cb0c7 1202->1205 1206 10cb0bb 1202->1206 1207 10cb0cc-10cb0d5 1205->1207 1208 10cb0c9 1205->1208 1206->1205 1209 10cb126-10cb12b 1207->1209 1210 10cb0d7-10cb0df CreateMutexW 1207->1210 1208->1207 1209->1210 1212 10cb0e5-10cb0fb 1210->1212 1213 10cb12d-10cb132 1212->1213 1214 10cb0fd-10cb123 1212->1214 1213->1214
                                                      APIs
                                                      • CreateMutexW.KERNELBASE(?,?), ref: 010CB0DD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987453935.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10ca000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID: CreateMutex
                                                      • String ID:
                                                      • API String ID: 1964310414-0
                                                      • Opcode ID: 7069e0837157a515e45d02650e1dd273071f4231ff3a82831a6ea2902be160a7
                                                      • Instruction ID: 7162049b288a427b826f8e4d66baeb64793c6d510a2f6ffeee63ee7a47a0d3e8
                                                      • Opcode Fuzzy Hash: 7069e0837157a515e45d02650e1dd273071f4231ff3a82831a6ea2902be160a7
                                                      • Instruction Fuzzy Hash: FF2180716012049FE720DB69DC46BAAFBE8EF14624F1484ADED858B742D775E408CA72
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1217 10cab7c-10cabe8 1219 10cac29-10cac2e 1217->1219 1220 10cabea-10cabf2 FindCloseChangeNotification 1217->1220 1219->1220 1221 10cabf8-10cac0a 1220->1221 1223 10cac0c-10cac28 1221->1223 1224 10cac30-10cac35 1221->1224 1224->1223
                                                      APIs
                                                      • FindCloseChangeNotification.KERNELBASE(?), ref: 010CABF0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987453935.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10ca000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID: ChangeCloseFindNotification
                                                      • String ID:
                                                      • API String ID: 2591292051-0
                                                      • Opcode ID: 5a0bacf1aaea93da36c8a858f1040f84ac0550c81557af1e0967a107cc93a326
                                                      • Instruction ID: b49b21830f846ab18e5f2d77466a938fac95aabb887bf3df46af7e050911f4a5
                                                      • Opcode Fuzzy Hash: 5a0bacf1aaea93da36c8a858f1040f84ac0550c81557af1e0967a107cc93a326
                                                      • Instruction Fuzzy Hash: 3021D4B55097C49FD7128B29DC94752BFB4EF03320F0984DBEC858B5A3D224A808C762
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1226 10ca61e-10ca688 1228 10ca68a-10ca692 OleInitialize 1226->1228 1229 10ca6c0-10ca6c5 1226->1229 1230 10ca698-10ca6aa 1228->1230 1229->1228 1232 10ca6ac-10ca6bf 1230->1232 1233 10ca6c7-10ca6cc 1230->1233 1233->1232
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987453935.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10ca000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID: Initialize
                                                      • String ID:
                                                      • API String ID: 2538663250-0
                                                      • Opcode ID: 6d537a93794988619964080b659d50a301e49d564d209fc010280fe1820769e4
                                                      • Instruction ID: 51c4b5be00d0ad1f3718f23dff6484113f56ea9866776d010b21f7aaea66ddc2
                                                      • Opcode Fuzzy Hash: 6d537a93794988619964080b659d50a301e49d564d209fc010280fe1820769e4
                                                      • Instruction Fuzzy Hash: AA21587150D3C49FDB138B259C94A56BFB4DF47224F0984DBEC848F1A3D269A908CBB2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1235 10ca573-10ca5d6 1237 10ca5d8-10ca5e0 DuplicateHandle 1235->1237 1238 10ca610-10ca615 1235->1238 1240 10ca5e6-10ca5f8 1237->1240 1238->1237 1241 10ca5fa-10ca60d 1240->1241 1242 10ca617-10ca61c 1240->1242 1242->1241
                                                      APIs
                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010CA5DE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987453935.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10ca000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID: DuplicateHandle
                                                      • String ID:
                                                      • API String ID: 3793708945-0
                                                      • Opcode ID: 8c4023e2797152ae2737e907f307c8b6976c91faf003f404bdd6629805d5fd15
                                                      • Instruction ID: b53260df71c8f75d48f093602efc91a9da7893ed2ad68f38dec5908c9ca15bdb
                                                      • Opcode Fuzzy Hash: 8c4023e2797152ae2737e907f307c8b6976c91faf003f404bdd6629805d5fd15
                                                      • Instruction Fuzzy Hash: C311A271508380AFDB228F54DC44A66FFF4EF4A310F0888DEED858B563D275A418DB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1244 10caeae-10caf05 1247 10caf49-10caf4e 1244->1247 1248 10caf07-10caf0f WriteFile 1244->1248 1247->1248 1250 10caf15-10caf27 1248->1250 1251 10caf29-10caf46 1250->1251 1252 10caf50-10caf55 1250->1252 1252->1251
                                                      APIs
                                                      • WriteFile.KERNELBASE(?,00000E24,A8DEAFEC,00000000,00000000,00000000,00000000), ref: 010CAF0D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987453935.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10ca000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID: FileWrite
                                                      • String ID:
                                                      • API String ID: 3934441357-0
                                                      • Opcode ID: 305f371be7e80711f2892a738de83ea157ba49d2c06b612d96009a4b2923d56e
                                                      • Instruction ID: 627a528bdb46aef5b55fd2a654568e95547ddf457a85ab79baab1409ee6f6ecd
                                                      • Opcode Fuzzy Hash: 305f371be7e80711f2892a738de83ea157ba49d2c06b612d96009a4b2923d56e
                                                      • Instruction Fuzzy Hash: DC11C471600204EFEB21CF95DC44FAAFBE8EF14724F04849EE9458B651D375E4098BB1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1255 10cb424-10cb46a 1257 10cb46c 1255->1257 1258 10cb46f-10cb478 1255->1258 1257->1258 1259 10cb4b9-10cb4be 1258->1259 1260 10cb47a-10cb49a ShellExecuteExW 1258->1260 1259->1260 1263 10cb49c-10cb4b8 1260->1263 1264 10cb4c0-10cb4c5 1260->1264 1264->1263
                                                      APIs
                                                      • ShellExecuteExW.SHELL32(?), ref: 010CB480
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987453935.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10ca000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID: ExecuteShell
                                                      • String ID:
                                                      • API String ID: 587946157-0
                                                      • Opcode ID: 484a6319279c901becf9aa6235e7474b6f49c99641ec05a5153784fb3bbadaa0
                                                      • Instruction ID: 5637292091e1be709333066115a18c0033f7eb158d13a894e0b5857974650da4
                                                      • Opcode Fuzzy Hash: 484a6319279c901becf9aa6235e7474b6f49c99641ec05a5153784fb3bbadaa0
                                                      • Instruction Fuzzy Hash: 67115E715093849FDB12CB29DC95B56BFF89F46620F0884EAED85CB252D264E908CB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetFileType.KERNELBASE(?,00000E24,A8DEAFEC,00000000,00000000,00000000,00000000), ref: 010CACBD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987453935.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10ca000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID: FileType
                                                      • String ID:
                                                      • API String ID: 3081899298-0
                                                      • Opcode ID: ac5314ac64671d0f5c7d73e3c8fc3f52db7a8f9761c3a128cec5c9bc814a54c1
                                                      • Instruction ID: c8e6b100fe76c2f674f53be517ad2fb8b699fbd12e30e64a57571f5ae7e341e8
                                                      • Opcode Fuzzy Hash: ac5314ac64671d0f5c7d73e3c8fc3f52db7a8f9761c3a128cec5c9bc814a54c1
                                                      • Instruction Fuzzy Hash: E401D271604208AFE720CB05DC85BAAFBECDF65B24F04C09AED448B742D774E5088AB1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ShellExecuteExW.SHELL32(?), ref: 010CB480
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987453935.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10ca000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID: ExecuteShell
                                                      • String ID:
                                                      • API String ID: 587946157-0
                                                      • Opcode ID: da34d54af85bca59af90bd5ff1cf49b1106953664a6bb794cd0e74dd0517263c
                                                      • Instruction ID: 7bdd5f50c891b4312e32b4affe7be0893c2717305509958a8cf631120bf0826a
                                                      • Opcode Fuzzy Hash: da34d54af85bca59af90bd5ff1cf49b1106953664a6bb794cd0e74dd0517263c
                                                      • Instruction Fuzzy Hash: EC0180716042048FDB50CF69D88675AFBE8DF05664F08C4AEED89CB652D774E408CF61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010CA5DE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987453935.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10ca000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID: DuplicateHandle
                                                      • String ID:
                                                      • API String ID: 3793708945-0
                                                      • Opcode ID: 6ab685cc0226a7fcfa57cc3d8fa982892a7e7db22a858aee1d9d4865a6002295
                                                      • Instruction ID: 963372d2d9bc9232702b32b078def24d5e1c1565e0801aecb4065bbaeb36e803
                                                      • Opcode Fuzzy Hash: 6ab685cc0226a7fcfa57cc3d8fa982892a7e7db22a858aee1d9d4865a6002295
                                                      • Instruction Fuzzy Hash: 7A015A715002049FDB218F55D844B5AFFE4EF58720F08889EEE854B612D375E418DF62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • OleGetClipboard.OLE32(?,00000E24,?,?), ref: 010CA77E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987453935.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10ca000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID: Clipboard
                                                      • String ID:
                                                      • API String ID: 220874293-0
                                                      • Opcode ID: f1b79650319d7358430e69d9cb931ac8b4111c4fe04a3cf334e429bf3e607835
                                                      • Instruction ID: 743c248fb8db2c0d998c420264abfaf6bc878ed4fdd32664dbe1d04f7590d337
                                                      • Opcode Fuzzy Hash: f1b79650319d7358430e69d9cb931ac8b4111c4fe04a3cf334e429bf3e607835
                                                      • Instruction Fuzzy Hash: 6701A271600200ABD320DF16CC46B66FBE8FB88A20F148159EC089BB41D771F915CBE5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindCloseChangeNotification.KERNELBASE(?), ref: 010CABF0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987453935.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10ca000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID: ChangeCloseFindNotification
                                                      • String ID:
                                                      • API String ID: 2591292051-0
                                                      • Opcode ID: 2dd48f375885be5bc0493a50fc3fe79b840260c322115205825e20bf1e06fe3f
                                                      • Instruction ID: 54a80da968953b849b1d829aef5f06b49707fa11b4004a80eb0b08a0432eeb28
                                                      • Opcode Fuzzy Hash: 2dd48f375885be5bc0493a50fc3fe79b840260c322115205825e20bf1e06fe3f
                                                      • Instruction Fuzzy Hash: B5017C71604248DFDB108F59D8857AAFBE8DF05724F08C4AEED498B652E375E408CEA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987453935.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10ca000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID: Initialize
                                                      • String ID:
                                                      • API String ID: 2538663250-0
                                                      • Opcode ID: a8f5816b0ab2b0f810b933bae9a8ed245ada888290389051c50ff7b259317921
                                                      • Instruction ID: 594166eaacb371a24649794f714fb8df20927bfa2d2e5646f308e98ca645e318
                                                      • Opcode Fuzzy Hash: a8f5816b0ab2b0f810b933bae9a8ed245ada888290389051c50ff7b259317921
                                                      • Instruction Fuzzy Hash: 6B017C716042449FDB10CF55D88575AFBE4DF55724F08C4AADD898B252D379A4088EA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetErrorMode.KERNELBASE(?), ref: 010CAA44
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987453935.00000000010CA000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CA000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10ca000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode
                                                      • String ID:
                                                      • API String ID: 2340568224-0
                                                      • Opcode ID: bf7843f2d983eb280692f88f1a27c5df813bb22ce055f7cb91dc412d0ca691c9
                                                      • Instruction ID: a92f30bcdb622f3782a015e0021b05aeb3cfcc9834717a0e71ad1e3754a30fa8
                                                      • Opcode Fuzzy Hash: bf7843f2d983eb280692f88f1a27c5df813bb22ce055f7cb91dc412d0ca691c9
                                                      • Instruction Fuzzy Hash: F8F0F431600244DFDB208F09D985769FBE4DF04724F08C09EED444B752D378E508CEA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1988208692.0000000005090000.00000040.00000800.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5090000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6c7867ffdf56bee66df40511fc630f58483a9770e50cdc229f90a108ec2c3814
                                                      • Instruction ID: 780186aa556385271a0b12123e29b50fbd1245e0a2ceb4cb2a9dcd70039d3286
                                                      • Opcode Fuzzy Hash: 6c7867ffdf56bee66df40511fc630f58483a9770e50cdc229f90a108ec2c3814
                                                      • Instruction Fuzzy Hash: 9732F830A01228CFDB18EF75D855BEDB7B2BB49304F1045A9E509AB399DB359E85CF80
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1988208692.0000000005090000.00000040.00000800.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5090000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ba3f1d35886ee4c54a299042d6fdeb596bbe8b959adf06474bf5cdb91ffe3c81
                                                      • Instruction ID: 71ca78b2a378bca8ecfe8fa72bdb7c6fe54100713eec640459c9975d92eb6614
                                                      • Opcode Fuzzy Hash: ba3f1d35886ee4c54a299042d6fdeb596bbe8b959adf06474bf5cdb91ffe3c81
                                                      • Instruction Fuzzy Hash: 65815C30A012288FDB18EFB5D854BEDB7B2BF89304F0045A9E509AB398DB755D85CF91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1988208692.0000000005090000.00000040.00000800.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5090000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5d9c0f21e2e1df7946ac5370ee1a7c0f7e97e9d4d6dcd035124d9e3ee973afb6
                                                      • Instruction ID: a9f6b03b92cacbe308defd15af795bf5459d370a7278c57211686961c1941624
                                                      • Opcode Fuzzy Hash: 5d9c0f21e2e1df7946ac5370ee1a7c0f7e97e9d4d6dcd035124d9e3ee973afb6
                                                      • Instruction Fuzzy Hash: 09415D30A00218CFDB14EBB5D954BECB7B2BF59304F1045AEE005AB295CB755E84CF51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1988208692.0000000005090000.00000040.00000800.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5090000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 98191415cca7b5f23efa4721cdb92511aeada7bab8b6e05233dd3cde09083edc
                                                      • Instruction ID: a35f95b9cef1099f9365e648d618ab1f0977e4f8301bd781c8b7d2e6641c1f8d
                                                      • Opcode Fuzzy Hash: 98191415cca7b5f23efa4721cdb92511aeada7bab8b6e05233dd3cde09083edc
                                                      • Instruction Fuzzy Hash: 3131C731B012218FDB44BB75D8257BE33A69FD8208F104429D415DB7E8EF398D059BD1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1988208692.0000000005090000.00000040.00000800.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5090000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f28e58259bed568a6f5ca5b7b5c387328422f604fb9a46302c87e5efd5c5826e
                                                      • Instruction ID: 4edb5f91570eda45c3518686903c31eec615c8ed63e4f55714d6bb12c52320b9
                                                      • Opcode Fuzzy Hash: f28e58259bed568a6f5ca5b7b5c387328422f604fb9a46302c87e5efd5c5826e
                                                      • Instruction Fuzzy Hash: DE3105327053419FD715AB769811BAD3F67AFD2248F1885AEE081DF292CF7A4C46C391
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1988208692.0000000005090000.00000040.00000800.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5090000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0be6db9552bcc882fd05f1279ac9d99950680d47da437974d80a0e0a8e24e5cf
                                                      • Instruction ID: e5a12abbfeff55b77115ee11e9371d25f9515b5b524f61397694ff0d813edcd8
                                                      • Opcode Fuzzy Hash: 0be6db9552bcc882fd05f1279ac9d99950680d47da437974d80a0e0a8e24e5cf
                                                      • Instruction Fuzzy Hash: F611C2327052918FC325B776A4106AD3FA36BE624835844AEE081DF366CF7A8C49C792
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1988208692.0000000005090000.00000040.00000800.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5090000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d4e9588c7de38ee2338a4f5737d4c2a7fa7e4225be59a322b3f5600ce24ae3c2
                                                      • Instruction ID: 9f4305d4e2e72220ceb79b08a5ff1d66a4af30c0d851cca99df51098caee6660
                                                      • Opcode Fuzzy Hash: d4e9588c7de38ee2338a4f5737d4c2a7fa7e4225be59a322b3f5600ce24ae3c2
                                                      • Instruction Fuzzy Hash: A801D672A05341AFEB059BB0CC5179E3F72EF43214F0840AFD184DB1D2EA795845C750
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987828130.00000000012A0000.00000040.00000020.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_12a0000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c9d20076e1bb932581aa9cd5a3a95ee0354b179d07dfa1849d4c8e63b1c9b635
                                                      • Instruction ID: 46086d8139bcaa0613ef250fb53e0029888d686dea384799eb66fac6b03016d3
                                                      • Opcode Fuzzy Hash: c9d20076e1bb932581aa9cd5a3a95ee0354b179d07dfa1849d4c8e63b1c9b635
                                                      • Instruction Fuzzy Hash: A2F086B65093805FD7118B16AC41863FFE8DB96630719C49FFC49CB612D225A809CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1988208692.0000000005090000.00000040.00000800.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5090000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 15856bb45ae677c0a03e9505a37cc17dd8ad99b05bd7272290c80974584c3429
                                                      • Instruction ID: 609fd23ec75c67d987004fef766b9888bd1c2a45076d58a200acc765e6a05fec
                                                      • Opcode Fuzzy Hash: 15856bb45ae677c0a03e9505a37cc17dd8ad99b05bd7272290c80974584c3429
                                                      • Instruction Fuzzy Hash: F3014C306063428FCB00EF74D55849D77E2AFD8248B50885DF9C5DBB69EF7598488B42
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987828130.00000000012A0000.00000040.00000020.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_12a0000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: aed879c7e0e74ea7788e00068d66be772210a447d6230091c77b40209f485b59
                                                      • Instruction ID: 05f43a3155d42ba483e0007927c2143054c3fce6d07329bd7e1e18844aa9da82
                                                      • Opcode Fuzzy Hash: aed879c7e0e74ea7788e00068d66be772210a447d6230091c77b40209f485b59
                                                      • Instruction Fuzzy Hash: 55E092B66046044B9750DF0AEC41456FBE8EB84630B08C07FEC0D8BB01D676B909CAA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1988208692.0000000005090000.00000040.00000800.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5090000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 94d58f524509fe4b6bd1e95cd4d9fdfb7ef9ed6c2a06436f18d1d0014cd28f15
                                                      • Instruction ID: 97c448f8b24b60052c493f18704247891f0b404dbc6fae99f89269c2670991bc
                                                      • Opcode Fuzzy Hash: 94d58f524509fe4b6bd1e95cd4d9fdfb7ef9ed6c2a06436f18d1d0014cd28f15
                                                      • Instruction Fuzzy Hash: DEE0EC311173808FC7171770A1180583B319F8730D35408EFD485CEAABD63B9886C700
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987443080.00000000010C2000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C2000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10c2000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4205279257610a071ed83d4e415bfd2803fc22e41fe2bd873c433a538709fb5a
                                                      • Instruction ID: 429ad27cdd685d132762577438a582ad6c71205339bedea5448fa235b5436aba
                                                      • Opcode Fuzzy Hash: 4205279257610a071ed83d4e415bfd2803fc22e41fe2bd873c433a538709fb5a
                                                      • Instruction Fuzzy Hash: A8D05E7A2056D14FE3169B1CC1A4B9D7BE4AB61B14F4A44FDAC408BB63CB68D5D1DA00
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1987443080.00000000010C2000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C2000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_10c2000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2e33f493df87d8eddb4c13e57fa428c914ffba81cccf337283d5e18b2ff347e3
                                                      • Instruction ID: 3e37fd5392b668e872d1b886e8e94e3927fac8f17535e9effe9d344c18bd57d3
                                                      • Opcode Fuzzy Hash: 2e33f493df87d8eddb4c13e57fa428c914ffba81cccf337283d5e18b2ff347e3
                                                      • Instruction Fuzzy Hash: 3CD05E343002814BD715DB0CC6D5F5D3BD4AB50B14F0684ECAC508BB62C7A4D8C0CE00
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1988208692.0000000005090000.00000040.00000800.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5090000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID: 0-3916222277
                                                      • Opcode ID: f47cdad9474f23805fa1570abccfa1740f48e98bb7bb93676340c164e3836118
                                                      • Instruction ID: 7201dfcfda89cb814e004246198d28d2dea54adcd5a7a4c0dde4ce600180bbb6
                                                      • Opcode Fuzzy Hash: f47cdad9474f23805fa1570abccfa1740f48e98bb7bb93676340c164e3836118
                                                      • Instruction Fuzzy Hash: 6C031974A01228CFDB29EF31D855BADB7B2BB48304F1041E9E9496B3A8DB355E81CF51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1988208692.0000000005090000.00000040.00000800.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5090000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID: 0-3916222277
                                                      • Opcode ID: 75c16d32cd47da459f5a085b41186d8472cfd34549b9ec2ea3775da93b1c1d57
                                                      • Instruction ID: f72a7e43e99b12b13f229ed25398c5db2f630019d4f37ddf240dd1370f18dd09
                                                      • Opcode Fuzzy Hash: 75c16d32cd47da459f5a085b41186d8472cfd34549b9ec2ea3775da93b1c1d57
                                                      • Instruction Fuzzy Hash: 23031974A01228CFDB29EF31D855BADB7B2BB48304F1041E9E9496B3A8DB355E81CF51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1988208692.0000000005090000.00000040.00000800.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5090000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID: 0-3916222277
                                                      • Opcode ID: fd151ebb72e2c2adb5640e7d7b6f0472b97dd14ac6322d077d13aacc3acfcce1
                                                      • Instruction ID: f5960d48e37e92af071623d11b2a61332fa5d4ddba1b2234b9258ee8b0a57737
                                                      • Opcode Fuzzy Hash: fd151ebb72e2c2adb5640e7d7b6f0472b97dd14ac6322d077d13aacc3acfcce1
                                                      • Instruction Fuzzy Hash: E4031974A01228CFDB69EF31D854BADB7B2BB48304F1041E9E9496B3A8DB355E81CF51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1988208692.0000000005090000.00000040.00000800.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5090000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID: 0-3916222277
                                                      • Opcode ID: 5321a169aa11ed2bca9a989d21ebf489ac48c6ef689de3e98886bee789aa89df
                                                      • Instruction ID: d6b81c40047ad7656af5ed5ee9c4bdfd47f31928d7b0482bb01695039b295ee9
                                                      • Opcode Fuzzy Hash: 5321a169aa11ed2bca9a989d21ebf489ac48c6ef689de3e98886bee789aa89df
                                                      • Instruction Fuzzy Hash: C7F21974A01228CFDB29EF31D854BADB7B2BB48304F1041E9E9496B3A8DB355E81CF51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1988208692.0000000005090000.00000040.00000800.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5090000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID: 0-3916222277
                                                      • Opcode ID: 079aa03f4caa4b2fe8e973033c750ed8fa38366fd3774545fc1d0b041478f540
                                                      • Instruction ID: 38842b392223fa4f7ed76c8ccdc1708b8f1f7d7d8b61bf3fc3aa05b168507d91
                                                      • Opcode Fuzzy Hash: 079aa03f4caa4b2fe8e973033c750ed8fa38366fd3774545fc1d0b041478f540
                                                      • Instruction Fuzzy Hash: 0AF22974A01228CFDB29EF31D854BADB7B2BB48304F1041E9E9496B3A8DB355E81CF51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1988208692.0000000005090000.00000040.00000800.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5090000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID: 0-3916222277
                                                      • Opcode ID: fb662914f1f510668b2df690ba02a328a7a6deaa94a650849f0e97898197f349
                                                      • Instruction ID: 14663b19252c4131d1e805c1605f5782c33c7a08717ef5c49375e1651ddb3903
                                                      • Opcode Fuzzy Hash: fb662914f1f510668b2df690ba02a328a7a6deaa94a650849f0e97898197f349
                                                      • Instruction Fuzzy Hash: 3AF22974A05228CFDB29EF31D854BADB7B2BB48304F1041E9E9496B3A8DB355E81CF51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1988208692.0000000005090000.00000040.00000800.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5090000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID: 0-3916222277
                                                      • Opcode ID: 6557fc49b2902bd604b99a8da0a1a94023abc9f11e57a404ac4f5545a56ec35c
                                                      • Instruction ID: 93509e8e4852330d2c25722d90e973a42d95f7b430fab0aabc0d4e2257932bff
                                                      • Opcode Fuzzy Hash: 6557fc49b2902bd604b99a8da0a1a94023abc9f11e57a404ac4f5545a56ec35c
                                                      • Instruction Fuzzy Hash: 95F22974A01228CFDB69EF31D854BADB7B2BB48304F1041E9E9496B3A8DB355E81CF51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1988208692.0000000005090000.00000040.00000800.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5090000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID: 0-3916222277
                                                      • Opcode ID: 602599384b00a886ef9174aa9d4c01a4a2d6451b6999c5a702b9982c7ea7c6ed
                                                      • Instruction ID: 0d83749fa35a955262480db548daad8555b94ab0d55e784177573e041273ace1
                                                      • Opcode Fuzzy Hash: 602599384b00a886ef9174aa9d4c01a4a2d6451b6999c5a702b9982c7ea7c6ed
                                                      • Instruction Fuzzy Hash: 71F21974A01228CFDB69EF31D854BADB7B2BB48304F1041E9E9496B3A8DB355E81CF51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1988208692.0000000005090000.00000040.00000800.00020000.00000000.sdmp, Offset: 05090000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_5090000_QUuUm3J8x3.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID: 0-3916222277
                                                      • Opcode ID: a9f46ab52f5f6c4d165fbcd8d32812c9faba7a94c555fe6480ffed86316de41d
                                                      • Instruction ID: 0aa4ee61c6d034d9d2d3e5e32dbecd9c6a7a3fd0fe50f7a0088bf9ae62458e3b
                                                      • Opcode Fuzzy Hash: a9f46ab52f5f6c4d165fbcd8d32812c9faba7a94c555fe6480ffed86316de41d
                                                      • Instruction Fuzzy Hash: 9EE21974A01228CFDB69EF31D854BADB7B2BB48304F1041E9E9496B3A8DB355E81CF51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Execution Graph

                                                      Execution Coverage:20.9%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:2.4%
                                                      Total number of Nodes:123
                                                      Total number of Limit Nodes:4
                                                      execution_graph 19786 174b176 19789 174b1ae RegOpenKeyExW 19786->19789 19788 174b204 19789->19788 19882 5ed26ae 19884 5ed26dd AdjustTokenPrivileges 19882->19884 19885 5ed26ff 19884->19885 19886 5ed21ae 19887 5ed21e6 RegCreateKeyExW 19886->19887 19889 5ed2258 19887->19889 19790 174b372 19791 174b3a7 RegSetValueExW 19790->19791 19793 174b3f3 19791->19793 19794 5ed29ea 19796 5ed2a1f SetProcessWorkingSetSize 19794->19796 19797 5ed2a4b 19796->19797 19890 5ed282a 19892 5ed285f GetExitCodeProcess 19890->19892 19893 5ed2888 19892->19893 19798 174b27e 19799 174b2b3 RegQueryValueExW 19798->19799 19801 174b307 19799->19801 19898 5ed0da6 19900 5ed0dde MapViewOfFile 19898->19900 19901 5ed0e2d 19900->19901 19802 57176fe 19803 571733a 19802->19803 19808 57177d4 19803->19808 19813 571780e 19803->19813 19818 571783d 19803->19818 19823 5717758 19803->19823 19809 57177de 19808->19809 19810 5717922 19809->19810 19828 5718d80 19809->19828 19831 5718d6f 19809->19831 19814 5717818 19813->19814 19815 5717922 19814->19815 19816 5718d80 KiUserExceptionDispatcher 19814->19816 19817 5718d6f KiUserExceptionDispatcher 19814->19817 19816->19815 19817->19815 19819 5717847 19818->19819 19820 5717922 19819->19820 19821 5718d80 KiUserExceptionDispatcher 19819->19821 19822 5718d6f KiUserExceptionDispatcher 19819->19822 19820->19820 19821->19820 19822->19820 19824 5717768 19823->19824 19825 5717922 19824->19825 19826 5718d80 KiUserExceptionDispatcher 19824->19826 19827 5718d6f KiUserExceptionDispatcher 19824->19827 19826->19825 19827->19825 19829 5718dab KiUserExceptionDispatcher 19828->19829 19830 5718dc7 19829->19830 19830->19810 19832 5718dab KiUserExceptionDispatcher 19831->19832 19833 5718dc7 19832->19833 19833->19810 19902 174aaa6 19903 174aade CreateFileW 19902->19903 19905 174ab2d 19903->19905 19834 5ed13fe 19835 5ed1439 getaddrinfo 19834->19835 19837 5ed14ab 19835->19837 19838 5ed237e 19841 5ed23b3 ioctlsocket 19838->19841 19840 5ed23df 19841->19840 19842 174adee 19843 174ae23 WriteFile 19842->19843 19845 174ae55 19843->19845 19906 174a72e 19907 174a77e OleGetClipboard 19906->19907 19908 174a78c 19907->19908 19846 5ed0bf6 19847 5ed0c2e ConvertStringSecurityDescriptorToSecurityDescriptorW 19846->19847 19849 5ed0c6f 19847->19849 19850 174ac6a 19852 174ac9f GetFileType 19850->19852 19853 174accc 19852->19853 19912 174afaa 19913 174afe2 CreateMutexW 19912->19913 19915 174b025 19913->19915 19916 174aa12 19917 174aa67 19916->19917 19918 174aa3e SetErrorMode 19916->19918 19917->19918 19919 174aa53 19918->19919 19854 5ed104a 19855 5ed107f shutdown 19854->19855 19857 5ed10a8 19855->19857 19920 5ed188a 19922 5ed18c5 LoadLibraryA 19920->19922 19923 5ed1902 19922->19923 19858 174a65e 19859 174a6c0 19858->19859 19860 174a68a FindCloseChangeNotification 19858->19860 19859->19860 19861 174a698 19860->19861 19928 5ed2906 19931 5ed293b GetProcessWorkingSetSize 19928->19931 19930 5ed2967 19931->19930 19862 174b45a 19864 174b495 SendMessageTimeoutA 19862->19864 19865 174b4dd 19864->19865 19932 174a59a 19933 174a610 19932->19933 19934 174a5d8 DuplicateHandle 19932->19934 19933->19934 19935 174a5e6 19934->19935 19936 174b806 19939 174b82f CopyFileW 19936->19939 19938 174b856 19939->19938 19940 174a186 19941 174a1f3 19940->19941 19942 174a1bb send 19940->19942 19941->19942 19943 174a1c9 19942->19943 19866 5ed15de 19867 5ed1613 WSAConnect 19866->19867 19869 5ed1632 19867->19869 19944 174b982 19945 174b9ab SetFileAttributesW 19944->19945 19947 174b9c7 19945->19947 19870 5ed245a 19872 5ed2483 select 19870->19872 19873 5ed24b8 19872->19873 19874 174b8ce 19876 174b8f4 DeleteFileW 19874->19876 19877 174b910 19876->19877 19878 5ed0752 19881 5ed078a WSASocketW 19878->19881 19880 5ed07c6 19881->19880 19948 5ed1312 19950 5ed1347 GetProcessTimes 19948->19950 19951 5ed1379 19950->19951
                                                      APIs
                                                      • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 05ED26F7
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: AdjustPrivilegesToken
                                                      • String ID:
                                                      • API String ID: 2874748243-0
                                                      • Opcode ID: b9c1be93f9279a4c68f499d175c58bf3e8970b922323efa102d647fbf45cb1fa
                                                      • Instruction ID: 927605b119ad1919099a0f664ed7a27f439a011cbe2790aabfd95222841f88e2
                                                      • Opcode Fuzzy Hash: b9c1be93f9279a4c68f499d175c58bf3e8970b922323efa102d647fbf45cb1fa
                                                      • Instruction Fuzzy Hash: 6F219F765097809FEB228F25DC44B52BFB4FF06314F0884DAE9858F563D271E918DB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 05ED26F7
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: AdjustPrivilegesToken
                                                      • String ID:
                                                      • API String ID: 2874748243-0
                                                      • Opcode ID: cb796d935bdba69ec74c01064d9386ba39a1a47d80946d84d5963b0814c31024
                                                      • Instruction ID: 2d72aef91a68a419e1288eddca69a0b7c1aa827eea4dbbd289366d544f0b37c5
                                                      • Opcode Fuzzy Hash: cb796d935bdba69ec74c01064d9386ba39a1a47d80946d84d5963b0814c31024
                                                      • Instruction Fuzzy Hash: E7118C366002009FEB20CF55D844B66FBE8EF04324F08C4AAEE868B652D331E418DF71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 5544 5718d80-5718dd8 KiUserExceptionDispatcher 5548 5718e21-5718e83 call 5714210 5544->5548 5549 5718dda-5718e1c call 5714210 5544->5549 5562 5718ec9-5719011 5548->5562 5549->5562 5651 5719013 call 1960606 5562->5651 5652 5719013 call 19605df 5562->5652 5580 5719018-5719113 5593 5719115-5719123 5580->5593 5594 5719126-571912c 5580->5594 5593->5594 5595 5719144 5594->5595 5596 571912e-5719131 5594->5596 5599 5719149-5719179 5595->5599 5598 5719133-5719142 5596->5598 5596->5599 5602 571917e 5598->5602 5599->5602 5604 5719188-57191a8 5602->5604 5608 57191c3-57191da 5604->5608 5609 57191aa-57191c1 5604->5609 5613 571920c-5719214 5608->5613 5609->5613 5616 5719216-571922d 5613->5616 5617 571922f-5719243 5613->5617 5620 5719246-5719323 5616->5620 5617->5620 5635 5719352-571935d 5620->5635 5636 5719325-5719328 5635->5636 5637 571935f 5635->5637 5638 5719366-5719385 5636->5638 5639 571932a-571933a 5636->5639 5640 571938a-571939c 5637->5640 5638->5640 5641 571934d-5719350 5639->5641 5642 571933c-571934a 5639->5642 5641->5635 5643 5719361 5641->5643 5642->5641 5643->5638 5651->5580 5652->5580
                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 05718DBA
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4432946696.0000000005710000.00000040.00000800.00020000.00000000.sdmp, Offset: 05710000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5710000_server.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: b00d498d084f85fc74f73faff72227e4a023dba031a301a3c5ca6e19397158c3
                                                      • Instruction ID: 26d19148c707bc944789ff5b46cb65975258f6a1c4d8e72513b1b10f4564b7f8
                                                      • Opcode Fuzzy Hash: b00d498d084f85fc74f73faff72227e4a023dba031a301a3c5ca6e19397158c3
                                                      • Instruction Fuzzy Hash: 6ED11C31A00205DFCB09DFB5E461AAD77BAFF88344B118429E816973A4DF399C46EF90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 5653 5718d6f-5718dd8 KiUserExceptionDispatcher 5657 5718e21-5718e83 call 5714210 5653->5657 5658 5718dda-5718e1c call 5714210 5653->5658 5671 5718ec9-5719011 5657->5671 5658->5671 5760 5719013 call 1960606 5671->5760 5761 5719013 call 19605df 5671->5761 5689 5719018-5719113 5702 5719115-5719123 5689->5702 5703 5719126-571912c 5689->5703 5702->5703 5704 5719144 5703->5704 5705 571912e-5719131 5703->5705 5708 5719149-5719179 5704->5708 5707 5719133-5719142 5705->5707 5705->5708 5711 571917e 5707->5711 5708->5711 5713 5719188-57191a8 5711->5713 5717 57191c3-57191da 5713->5717 5718 57191aa-57191c1 5713->5718 5722 571920c-5719214 5717->5722 5718->5722 5725 5719216-571922d 5722->5725 5726 571922f-5719243 5722->5726 5729 5719246-5719323 5725->5729 5726->5729 5744 5719352-571935d 5729->5744 5745 5719325-5719328 5744->5745 5746 571935f 5744->5746 5747 5719366-5719385 5745->5747 5748 571932a-571933a 5745->5748 5749 571938a-571939c 5746->5749 5747->5749 5750 571934d-5719350 5748->5750 5751 571933c-571934a 5748->5751 5750->5744 5752 5719361 5750->5752 5751->5750 5752->5747 5760->5689 5761->5689
                                                      APIs
                                                      • KiUserExceptionDispatcher.NTDLL ref: 05718DBA
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4432946696.0000000005710000.00000040.00000800.00020000.00000000.sdmp, Offset: 05710000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5710000_server.jbxd
                                                      Similarity
                                                      • API ID: DispatcherExceptionUser
                                                      • String ID:
                                                      • API String ID: 6842923-0
                                                      • Opcode ID: 0fdc088e119e34b2ff49a676b1990a1c473829aa748f61c67b1509593b83607c
                                                      • Instruction ID: 29246ceb65b18b2442e8d8a096ca5ece8fc6b6bc0b0323e92e4bace0a78d1bce
                                                      • Opcode Fuzzy Hash: 0fdc088e119e34b2ff49a676b1990a1c473829aa748f61c67b1509593b83607c
                                                      • Instruction Fuzzy Hash: 3BA12931A00205DFCB09DBB4E461A6E77B6FF88344F118469E816973B4DB399C8AEF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 5762 5ed214e-5ed2206 5766 5ed2208 5762->5766 5767 5ed220b-5ed2217 5762->5767 5766->5767 5768 5ed221c-5ed2225 5767->5768 5769 5ed2219 5767->5769 5770 5ed222a-5ed2241 5768->5770 5771 5ed2227 5768->5771 5769->5768 5773 5ed2283-5ed2288 5770->5773 5774 5ed2243-5ed2256 RegCreateKeyExW 5770->5774 5771->5770 5773->5774 5775 5ed2258-5ed2280 5774->5775 5776 5ed228a-5ed228f 5774->5776 5776->5775
                                                      APIs
                                                      • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 05ED2249
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: Create
                                                      • String ID:
                                                      • API String ID: 2289755597-0
                                                      • Opcode ID: a0e6f6500d24f02952be6724ed9a5e5405d08dc17254d29baf5bbb7a649b11a2
                                                      • Instruction ID: 6abf051d4ece7579232a6b88c49ec9061aa0f654754fa5adbe58fdf15305d32e
                                                      • Opcode Fuzzy Hash: a0e6f6500d24f02952be6724ed9a5e5405d08dc17254d29baf5bbb7a649b11a2
                                                      • Instruction Fuzzy Hash: 05417C751093806FE7238B618C50FA2BFB8EF16614F0985DAE9C5CB563D264E809CB72
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 5781 5ed0cc7-5ed0cfb 5782 5ed0cfd-5ed0d04 5781->5782 5783 5ed0d68-5ed0d7e 5781->5783 5782->5783
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e44929a21e6a33c96c6e17a4136da4a7a5765e63a92fca750fa8f0ec7b8be97b
                                                      • Instruction ID: 827d75a020d0f62e14510f194628b331798845d341a98ca8e550ea2b1bbdcfca
                                                      • Opcode Fuzzy Hash: e44929a21e6a33c96c6e17a4136da4a7a5765e63a92fca750fa8f0ec7b8be97b
                                                      • Instruction Fuzzy Hash: 464190724093C05FE7238B259C45B96BFB4EF07224F0989DBE9858B1A3D265A90DC772
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 0174B1F5
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: Open
                                                      • String ID:
                                                      • API String ID: 71445658-0
                                                      • Opcode ID: ec091ca0f807654646f9fe2c961916b1494847ea3104e6eb102ae8e10b9eae03
                                                      • Instruction ID: 29cf53a7a83a77f56cea7241bc2f7d86aa9f2c7318f5da468e85a762df22a097
                                                      • Opcode Fuzzy Hash: ec091ca0f807654646f9fe2c961916b1494847ea3104e6eb102ae8e10b9eae03
                                                      • Instruction Fuzzy Hash: 383182715093806FE7238B658C54BA6BFB8EF17210F0884DBE980CB563D224E909C771
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 05ED0706
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: QueryValue
                                                      • String ID:
                                                      • API String ID: 3660427363-0
                                                      • Opcode ID: d90fa0c2480f53ffdb4738b8c278bdcd9df0fa4f00ce55428b84f52ed4da5c85
                                                      • Instruction ID: f483d5894bca4e4e57ef680c24b1a1725997462483032e13630114b0299a006c
                                                      • Opcode Fuzzy Hash: d90fa0c2480f53ffdb4738b8c278bdcd9df0fa4f00ce55428b84f52ed4da5c85
                                                      • Instruction Fuzzy Hash: F9318D6110E3C06FD3138B218C65A61BFB4EF87610F0E85CBD8C48F6A3D259A909C7B2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • getaddrinfo.WS2_32(?,00000E24), ref: 05ED14A3
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: getaddrinfo
                                                      • String ID:
                                                      • API String ID: 300660673-0
                                                      • Opcode ID: a617bcc49a0d2c11c110bd809198978a531b8cc57d7de1db0b809702b7b2451b
                                                      • Instruction ID: 2fb7af3eb2791a4cf4116c8cc4c89b136587884a6597e1d396692ff98beb0b24
                                                      • Opcode Fuzzy Hash: a617bcc49a0d2c11c110bd809198978a531b8cc57d7de1db0b809702b7b2451b
                                                      • Instruction Fuzzy Hash: 0331C2B1104344AFE721CB61DC44FA6FBACEF14714F04889AFA489B692D374E949CB71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetProcessTimes.KERNELBASE(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 05ED1371
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: ProcessTimes
                                                      • String ID:
                                                      • API String ID: 1995159646-0
                                                      • Opcode ID: 0a93a787f88b8938ec97fd9dbf55a0e8d158852eb7184f958b2407fafb71aef0
                                                      • Instruction ID: c0661a166974b9c64715c68d7b670a77c16feb46e2f5fbfc3985f2788913f48a
                                                      • Opcode Fuzzy Hash: 0a93a787f88b8938ec97fd9dbf55a0e8d158852eb7184f958b2407fafb71aef0
                                                      • Instruction Fuzzy Hash: 5031E8715097806FE7228F21DC44FA6BFB8EF16324F0884DBE8848F552D325A509C771
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0174AB25
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: 8e88dbf45eb4a26755dda61462eecf8292c1a2dd56f4b99321c278273bf04f5f
                                                      • Instruction ID: c1fadf8dc1a300a0b707dd036445da07e72bb2ff54a662d161923f61c174705f
                                                      • Opcode Fuzzy Hash: 8e88dbf45eb4a26755dda61462eecf8292c1a2dd56f4b99321c278273bf04f5f
                                                      • Instruction Fuzzy Hash: B8314D71509340AFE722CF65CC85F56BBF8EF06614F08889AE9858B652D365E908CB71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 05ED0C67
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: DescriptorSecurity$ConvertString
                                                      • String ID:
                                                      • API String ID: 3907675253-0
                                                      • Opcode ID: 5afde0d2bd9ab99d0d65534c995289d25395965b4feabb841e8b6300b8a178c3
                                                      • Instruction ID: 9a81790643b23c2443a77ea40d776b9e529592f29b2764b11f3d1ab6976dffd1
                                                      • Opcode Fuzzy Hash: 5afde0d2bd9ab99d0d65534c995289d25395965b4feabb841e8b6300b8a178c3
                                                      • Instruction Fuzzy Hash: 6131C372504384AFE721CB65DC44FA7BFF8EF05214F0884AAE985CB652D364E909CB71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateMutexW.KERNELBASE(?,?), ref: 0174B01D
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: CreateMutex
                                                      • String ID:
                                                      • API String ID: 1964310414-0
                                                      • Opcode ID: 791610670491cf5f8785277c4594035d84cc25bec4202fbe85542d1d6b0c9601
                                                      • Instruction ID: 5a2e384f205490825324e4e74dfbb427c0c1e0d5e9ff9b8f6946466ff94f812a
                                                      • Opcode Fuzzy Hash: 791610670491cf5f8785277c4594035d84cc25bec4202fbe85542d1d6b0c9601
                                                      • Instruction Fuzzy Hash: 3D3161715093806FE722CB65DC45B96FFF8EF06214F08849AE985CB292D375E909C772
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RegQueryValueExW.KERNELBASE(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 0174B2F8
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: QueryValue
                                                      • String ID:
                                                      • API String ID: 3660427363-0
                                                      • Opcode ID: dbe8b53cf9ef4f20ac615c80286cdd1d534484412ef8b5e143e80078b4064a6d
                                                      • Instruction ID: 04156079034af0bb881ca45cb951bd676bb4e455bfbb39b56034797f298183d4
                                                      • Opcode Fuzzy Hash: dbe8b53cf9ef4f20ac615c80286cdd1d534484412ef8b5e143e80078b4064a6d
                                                      • Instruction Fuzzy Hash: 2331AD751093846FE722CF25CC45FA6BFB8EF06624F08849AE985CB253D364E948CB71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 05ED2249
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: Create
                                                      • String ID:
                                                      • API String ID: 2289755597-0
                                                      • Opcode ID: 441d51e9a6d8f9eb85583f5d7d6f971543d6ea5ac62a7b59e614d00fa8275265
                                                      • Instruction ID: 7e6c088fdc94c43efca607444074ac0e19c941bf2d51758db57d92d433af33e5
                                                      • Opcode Fuzzy Hash: 441d51e9a6d8f9eb85583f5d7d6f971543d6ea5ac62a7b59e614d00fa8275265
                                                      • Instruction Fuzzy Hash: 1F21A076600204AFEB31DE55CC44FA7FBECFF28614F04855AFA85CA651E760E5098A71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • OleGetClipboard.OLE32(?,00000E24,?,?), ref: 0174A77E
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: Clipboard
                                                      • String ID:
                                                      • API String ID: 220874293-0
                                                      • Opcode ID: 6affb1d1c14ccdb74681eae8fecad7be7dd6a4eb7d2b7642d313f73cb9d4126a
                                                      • Instruction ID: 9d78a3afc77e004abfb5a802f44d556e28f7ffdcf711c62f2c940d292bce4fb5
                                                      • Opcode Fuzzy Hash: 6affb1d1c14ccdb74681eae8fecad7be7dd6a4eb7d2b7642d313f73cb9d4126a
                                                      • Instruction Fuzzy Hash: AE316F7114E3C06FD3138B259C61B61BFB4EF87610F0A80CBD884CB5A3D2656919D772
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • getaddrinfo.WS2_32(?,00000E24), ref: 05ED14A3
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: getaddrinfo
                                                      • String ID:
                                                      • API String ID: 300660673-0
                                                      • Opcode ID: 09c9a48eb590a7c5c8edde3a92dc2caaeea390632b1f317d3dcf55b62f7531d2
                                                      • Instruction ID: d29bc4384b10b88c56ff093b97c5174ed262a900ea74144510c3850db8017ec1
                                                      • Opcode Fuzzy Hash: 09c9a48eb590a7c5c8edde3a92dc2caaeea390632b1f317d3dcf55b62f7531d2
                                                      • Instruction Fuzzy Hash: 3421BF71100204AFEB31DB60DC85FBAF7ACEF14718F04885AFA489A681D7B4E549CB71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageTimeoutA.USER32(?,00000E24), ref: 0174B4D5
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: MessageSendTimeout
                                                      • String ID:
                                                      • API String ID: 1599653421-0
                                                      • Opcode ID: 3629c9d9c5f1480276e7d8330a593258f1bde5cd1164a21d6c41e1c01095be14
                                                      • Instruction ID: 4000512fc7861e3e440b5be6bdb769e0495bb77897679e6da54dceb1aaca996b
                                                      • Opcode Fuzzy Hash: 3629c9d9c5f1480276e7d8330a593258f1bde5cd1164a21d6c41e1c01095be14
                                                      • Instruction Fuzzy Hash: B421D271504380AFEB228F61DC44FA2FFB8EF46310F08849AEA858B562D375E509CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: select
                                                      • String ID:
                                                      • API String ID: 1274211008-0
                                                      • Opcode ID: 43159ae7c92540c80740143ce7a99b4999f0775128982b47ac652e87c8256591
                                                      • Instruction ID: e6232afa51bdd98310f8174c0eba2c29f948b0cd9365635a7280aeffc4e9fd28
                                                      • Opcode Fuzzy Hash: 43159ae7c92540c80740143ce7a99b4999f0775128982b47ac652e87c8256591
                                                      • Instruction Fuzzy Hash: 122148755083849FEB22CF25DC44AA2BFF8FF06214F08849AED85CB162D265A909CB71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetExitCodeProcess.KERNELBASE(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 05ED2880
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: CodeExitProcess
                                                      • String ID:
                                                      • API String ID: 3861947596-0
                                                      • Opcode ID: 388662035e6f9af55bce3fbc6a79c00bb8e5d234dd34a94be9dc3c1c4c47b489
                                                      • Instruction ID: 14dc520419ed2cf2c482720d09b7309a6378d97b75b252ca0ccc0b3926aa346a
                                                      • Opcode Fuzzy Hash: 388662035e6f9af55bce3fbc6a79c00bb8e5d234dd34a94be9dc3c1c4c47b489
                                                      • Instruction Fuzzy Hash: BF21C1755093806FE712CB25CC44FA6BFB8EF02314F0884DBE984CF192D264A909CB71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • WSASocketW.WS2_32(?,?,?,?,?), ref: 05ED07BE
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: Socket
                                                      • String ID:
                                                      • API String ID: 38366605-0
                                                      • Opcode ID: 79c3959260dcbc4f202910e69052155a969377baf618d871d503eb77ccba6d75
                                                      • Instruction ID: 4d2d4b1338257332d5ea549b9213256eec59d64cfae7b79eedd4edcd5323cf27
                                                      • Opcode Fuzzy Hash: 79c3959260dcbc4f202910e69052155a969377baf618d871d503eb77ccba6d75
                                                      • Instruction Fuzzy Hash: 43218D71505380AFE721CF51CC45F96FFB8EF05224F08889EE9858B652D375A508CB72
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RegSetValueExW.KERNELBASE(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 0174B3E4
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: Value
                                                      • String ID:
                                                      • API String ID: 3702945584-0
                                                      • Opcode ID: fa6a7e7267f5025420509af30ed19d101adcb38094f6645b496317ece7bcd64b
                                                      • Instruction ID: 6f5664192350f9346f9e71874927d3e46eb82c3ff4ff26f222f0ea5229a7c00d
                                                      • Opcode Fuzzy Hash: fa6a7e7267f5025420509af30ed19d101adcb38094f6645b496317ece7bcd64b
                                                      • Instruction Fuzzy Hash: 482190725093806FE7228F55DC44FA7FFB8EF56610F08849AE9859B292D364E908CB71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 05ED0C67
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: DescriptorSecurity$ConvertString
                                                      • String ID:
                                                      • API String ID: 3907675253-0
                                                      • Opcode ID: a6240d3a08270d1028a629ad5d001acec463b350388b8657b5dce1efeda24d59
                                                      • Instruction ID: e04c5a67383d688e5c017b9eab08aa272744b9a97afe0234f2b01d9d47a8e8d8
                                                      • Opcode Fuzzy Hash: a6240d3a08270d1028a629ad5d001acec463b350388b8657b5dce1efeda24d59
                                                      • Instruction Fuzzy Hash: 8321A772600204AFE720DF65DC45FAAFBECEF14714F08846AED45CB651E774E5098A71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RegQueryValueExW.KERNELBASE(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 05ED0B7C
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: QueryValue
                                                      • String ID:
                                                      • API String ID: 3660427363-0
                                                      • Opcode ID: 9c613be849cf07c3bd1bd4f62fed54cd428356b4366db0798305723a0b4e8e01
                                                      • Instruction ID: f2cfbbdd65a8c75345a026f2cd3b1c51d7ba2e857477a32567f4bdeb317ddea6
                                                      • Opcode Fuzzy Hash: 9c613be849cf07c3bd1bd4f62fed54cd428356b4366db0798305723a0b4e8e01
                                                      • Instruction Fuzzy Hash: E0219F72509380AFE721CF11CC48F66FBF8AF45714F08849AE9859B292D365E909CB71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0174AB25
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: 58cadc704f7fca9484be1c95a394cf5e95835e00a89c3c3340582f4de0740286
                                                      • Instruction ID: e2f27747d1664b4f44fa04561d805e68f6f546ff43f3465c09347c84bd43a548
                                                      • Opcode Fuzzy Hash: 58cadc704f7fca9484be1c95a394cf5e95835e00a89c3c3340582f4de0740286
                                                      • Instruction Fuzzy Hash: D6219271600200AFEB21DF65CC45F66FBE9EF18724F04886DE9468B651D375E408CB71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 0174B1F5
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: Open
                                                      • String ID:
                                                      • API String ID: 71445658-0
                                                      • Opcode ID: bd117d1dfb7f8de8e69b6d8fdbf4c4911bbb92aa7d2897f175ed1c2a062394ea
                                                      • Instruction ID: 9b7cab67268e5d2a2eb51382244e01882ef74cd7660377bdff8006d1259d290c
                                                      • Opcode Fuzzy Hash: bd117d1dfb7f8de8e69b6d8fdbf4c4911bbb92aa7d2897f175ed1c2a062394ea
                                                      • Instruction Fuzzy Hash: C621A172500204AFE7319F55DC45FABFBECEF28724F04845AEA45CB652D774E9088A72
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetProcessWorkingSetSize.KERNEL32(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 05ED295F
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: ProcessSizeWorking
                                                      • String ID:
                                                      • API String ID: 3584180929-0
                                                      • Opcode ID: b2e2113bc64a3e4c98af9db6668ab369a6be9b237c72225b5540dd616747834f
                                                      • Instruction ID: 12f51f03c300b453c5f5be1126226d6d285f2c3a5fb7b61bd0c076ce1be31db6
                                                      • Opcode Fuzzy Hash: b2e2113bc64a3e4c98af9db6668ab369a6be9b237c72225b5540dd616747834f
                                                      • Instruction Fuzzy Hash: 9B2195715053846FD721CB65DC44FA6BFB8EF45214F08849AE945DB152D374E508CB72
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetProcessWorkingSetSize.KERNEL32(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 05ED2A43
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: ProcessSizeWorking
                                                      • String ID:
                                                      • API String ID: 3584180929-0
                                                      • Opcode ID: b2e2113bc64a3e4c98af9db6668ab369a6be9b237c72225b5540dd616747834f
                                                      • Instruction ID: 61ec9ee6a1fa9fda0594001344d63bb24672036cc52e751f75c26f790cfb2353
                                                      • Opcode Fuzzy Hash: b2e2113bc64a3e4c98af9db6668ab369a6be9b237c72225b5540dd616747834f
                                                      • Instruction Fuzzy Hash: 1F21C2715093846FE721CB21CC44FA6FFA8EF46214F0884AAE945DF152D374E908CB71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • WriteFile.KERNELBASE(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 0174AE4D
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: FileWrite
                                                      • String ID:
                                                      • API String ID: 3934441357-0
                                                      • Opcode ID: 442b0182573b742e05457d5aaff2084b24142f14cc0d66dfc36953484d81731d
                                                      • Instruction ID: bad7731a7145c78f313dccf8ecba034fa06f7bd4410541ad9f2c2f53850bf395
                                                      • Opcode Fuzzy Hash: 442b0182573b742e05457d5aaff2084b24142f14cc0d66dfc36953484d81731d
                                                      • Instruction Fuzzy Hash: 2821CF72505340AFEB228F51DC44FA7BBACEF45720F04849AE9458B252C375A908CBB1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetFileType.KERNELBASE(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 0174ACBD
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: FileType
                                                      • String ID:
                                                      • API String ID: 3081899298-0
                                                      • Opcode ID: 83282935930d724a6e5c8d67831ab759ab20677947e585e212f9164085c5db50
                                                      • Instruction ID: cc93cea929aaac10d73bd790480c99683650a6d726af50b445552201d0db9277
                                                      • Opcode Fuzzy Hash: 83282935930d724a6e5c8d67831ab759ab20677947e585e212f9164085c5db50
                                                      • Instruction Fuzzy Hash: 4821D5B54093806FE7128B15DC40BA2BFB8EF57714F0880DBE9858F293D364A909D775
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetErrorMode.KERNELBASE(?), ref: 0174AA44
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode
                                                      • String ID:
                                                      • API String ID: 2340568224-0
                                                      • Opcode ID: 81be41b71913c95b1879e51186623538f823900154115c1228c2ed0e35ce53ed
                                                      • Instruction ID: 1824b443e2d7d46fa636db2e4139e38f07cc6c86028eff6498c440a6efbbf7f5
                                                      • Opcode Fuzzy Hash: 81be41b71913c95b1879e51186623538f823900154115c1228c2ed0e35ce53ed
                                                      • Instruction Fuzzy Hash: 6921666554E3C0AFD7138B258C60A51BFB4AF43620F0A80DBD8858F5A3C2689908CB72
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • shutdown.WS2_32(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 05ED10A0
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: shutdown
                                                      • String ID:
                                                      • API String ID: 2510479042-0
                                                      • Opcode ID: f33320d0c0147e3f3f7e7e1d1c1ab736c1206a0235fb6ba2bdce1626617669de
                                                      • Instruction ID: 4281a10ddb7b50fe3f2582fa27cf766bc24b98931635c7011b670ed0cd7a0ac7
                                                      • Opcode Fuzzy Hash: f33320d0c0147e3f3f7e7e1d1c1ab736c1206a0235fb6ba2bdce1626617669de
                                                      • Instruction Fuzzy Hash: CF2183B1509384AFD7228B51CC44F56FFB8EF46214F0884DAE9849F152C369A549CB72
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CopyFileW.KERNELBASE(?,?,?), ref: 0174B84E
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: CopyFile
                                                      • String ID:
                                                      • API String ID: 1304948518-0
                                                      • Opcode ID: b8d4286ea1f2f4bae0d16551065b03cfad287411ee5253d2e6f4ab86d28190df
                                                      • Instruction ID: 8658677df1928ef35ecd2ae6c57ada6bccf313a698ddd4ca09202b94b6e45e9b
                                                      • Opcode Fuzzy Hash: b8d4286ea1f2f4bae0d16551065b03cfad287411ee5253d2e6f4ab86d28190df
                                                      • Instruction Fuzzy Hash: 792160B15493809FEB11CF25DC45B52BFE8EF06214F0984EAE985CB163D365E909CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateMutexW.KERNELBASE(?,?), ref: 0174B01D
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: CreateMutex
                                                      • String ID:
                                                      • API String ID: 1964310414-0
                                                      • Opcode ID: ac3210e734d5f3ef669f4a5ce9820a0a7b380f16fc27a36e8758afb71683e41b
                                                      • Instruction ID: ad38fb59dc5db378914c96da89a394eccd0b93fc85df4ea4437bf8655c32d25d
                                                      • Opcode Fuzzy Hash: ac3210e734d5f3ef669f4a5ce9820a0a7b380f16fc27a36e8758afb71683e41b
                                                      • Instruction Fuzzy Hash: EE21B0716012009FE720DF25DC45BA6FBE8EF14624F04846AED458B351D775E908CA72
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ioctlsocket.WS2_32(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 05ED23D7
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: ioctlsocket
                                                      • String ID:
                                                      • API String ID: 3577187118-0
                                                      • Opcode ID: 53f736d0d68120d04785b1cf26e877848f65fb3671b90099a9cff3c09f2a1613
                                                      • Instruction ID: c76c9d44d083ad46760a640b579a97e2e066f15d0aa6ba7a205457e6cff111f6
                                                      • Opcode Fuzzy Hash: 53f736d0d68120d04785b1cf26e877848f65fb3671b90099a9cff3c09f2a1613
                                                      • Instruction Fuzzy Hash: B321A1715093846FE722CF51DC44FA6FFB8EF46214F0884AAE9859B192C374A508CBB2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RegQueryValueExW.KERNELBASE(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 0174B2F8
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: QueryValue
                                                      • String ID:
                                                      • API String ID: 3660427363-0
                                                      • Opcode ID: b9e25498abb10913314bea636f55322a46628323fac01c7d8326539c21bb76ce
                                                      • Instruction ID: 8f97ab479b7f085ae8dad351c128d3cac73a70c775d540ac341619397e96caae
                                                      • Opcode Fuzzy Hash: b9e25498abb10913314bea636f55322a46628323fac01c7d8326539c21bb76ce
                                                      • Instruction Fuzzy Hash: 01218C76600204AFEB21CE16DC85FAAFBECEF14724F08856AED458B651D774E908CA71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: send
                                                      • String ID:
                                                      • API String ID: 2809346765-0
                                                      • Opcode ID: 94c7bca2e7b690602a1fa49c9180e5f956149ceb5d3b2b1de800f64f0af1ad7a
                                                      • Instruction ID: d1b5bed721a30b570bf3f91f7db553dc6e0996aaf842b7328b290f58c394f10c
                                                      • Opcode Fuzzy Hash: 94c7bca2e7b690602a1fa49c9180e5f956149ceb5d3b2b1de800f64f0af1ad7a
                                                      • Instruction Fuzzy Hash: 7721AC7140D3C09FD7238B65CC54A52BFB4EF07220F0A84DBD9858F1A3C279A809CB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 05ED162A
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: Connect
                                                      • String ID:
                                                      • API String ID: 3144859779-0
                                                      • Opcode ID: 982d991e4ba48267666bdc4f7283a1bc307020637a535b2849b2b964e1893c27
                                                      • Instruction ID: b93e32c724f3cc772199b882f6ed50b46241193e2838ec83d099e1856b2be0e5
                                                      • Opcode Fuzzy Hash: 982d991e4ba48267666bdc4f7283a1bc307020637a535b2849b2b964e1893c27
                                                      • Instruction Fuzzy Hash: 5D218E75508380AFDB228F65DC44B62FFF8EF06310F0885DAED858B162D376A819DB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: FileView
                                                      • String ID:
                                                      • API String ID: 3314676101-0
                                                      • Opcode ID: 7d0d3dd1fa0e96c3530445d09a4ba4903931bc8bd3ea4f9144a90ff268edbbcc
                                                      • Instruction ID: 6481ebb0b434ec79c0decac6a22c51dd21712400c5c24ead3138257334b73110
                                                      • Opcode Fuzzy Hash: 7d0d3dd1fa0e96c3530445d09a4ba4903931bc8bd3ea4f9144a90ff268edbbcc
                                                      • Instruction Fuzzy Hash: 6721F371500204AFEB21CF55CC49FA6FBE8EF18724F04885DE9858B641E375E509CB72
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • WSASocketW.WS2_32(?,?,?,?,?), ref: 05ED07BE
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: Socket
                                                      • String ID:
                                                      • API String ID: 38366605-0
                                                      • Opcode ID: 03f8d72c992f91a3825bd715d9bfb705404654f80b996444a1dfd1dfbb4bd5d1
                                                      • Instruction ID: 9c16e61dae698f480aecd4fc9dff3f7ea2a09ce03467040c75f2fd70d14de812
                                                      • Opcode Fuzzy Hash: 03f8d72c992f91a3825bd715d9bfb705404654f80b996444a1dfd1dfbb4bd5d1
                                                      • Instruction Fuzzy Hash: CE21D172500200AFEB21DF55CC45FA6FBE8EF15324F08886EE9858A651D375E509CB72
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LoadLibraryA.KERNELBASE(?,00000E24), ref: 05ED18F3
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: e09147db3481d3cac541f86a8c0f97b115b246043489349cded0614ee342b3c8
                                                      • Instruction ID: 599a7a0e98e54ce712e2f3bbac1a85dab550c2ad5bb10defcf813bc3bb4d8e72
                                                      • Opcode Fuzzy Hash: e09147db3481d3cac541f86a8c0f97b115b246043489349cded0614ee342b3c8
                                                      • Instruction Fuzzy Hash: CF11B4715053406FE721CB15DC85FA6FBB8EF45724F08809AFD849B692D2A4A948CB72
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageTimeoutA.USER32(?,00000E24), ref: 0174B4D5
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: MessageSendTimeout
                                                      • String ID:
                                                      • API String ID: 1599653421-0
                                                      • Opcode ID: b643898c2e1fca49738fbacb9b2dd9ae04ac6fd8c4b6c93c633dc397b2431521
                                                      • Instruction ID: 2c8c08226cf33c7a38fa40da376b6223b6de3337df48c8dcc02ec443ae990d88
                                                      • Opcode Fuzzy Hash: b643898c2e1fca49738fbacb9b2dd9ae04ac6fd8c4b6c93c633dc397b2431521
                                                      • Instruction Fuzzy Hash: 6221E171500200AFEB319F55DC41FA6FBA8EF14724F14849EEE458B691D375E918CBB2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RegQueryValueExW.KERNELBASE(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 05ED0B7C
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: QueryValue
                                                      • String ID:
                                                      • API String ID: 3660427363-0
                                                      • Opcode ID: 0be6b1e63787534ed98876a261085dea11d4d7feab40102f12fe25ae55fc5da9
                                                      • Instruction ID: ae8e11dbe951cebac069df171ea56997af6057e975b76ac0dbe5114bc84032ca
                                                      • Opcode Fuzzy Hash: 0be6b1e63787534ed98876a261085dea11d4d7feab40102f12fe25ae55fc5da9
                                                      • Instruction Fuzzy Hash: BD11B472504200AFE731CF15CC88FA6F7EDEF14728F08849AE9858B651E370E509CA71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RegSetValueExW.KERNELBASE(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 0174B3E4
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: Value
                                                      • String ID:
                                                      • API String ID: 3702945584-0
                                                      • Opcode ID: 597e866b0c72e9f0f171162ae45c187aebd82ad0c0ed118f48edd346b616d852
                                                      • Instruction ID: ae4ef59c4ba03b743c5c2527d90e96e61566516b0835aa8e3c1ab646d51c18a4
                                                      • Opcode Fuzzy Hash: 597e866b0c72e9f0f171162ae45c187aebd82ad0c0ed118f48edd346b616d852
                                                      • Instruction Fuzzy Hash: 70118172600200AFEB318E56DC45FA6FBECEF54714F04855AED459B652D374E9088AB1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetFileAttributesW.KERNELBASE(?,?), ref: 0174B9BF
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: eb08e47ba7f9885a10e2eadb607a5919a4f75045d7237e5dc677f370139bf9f6
                                                      • Instruction ID: 444ab967c474d8eb4120bb91b0267138182072aaeb98371bcd5156ea66fc6af6
                                                      • Opcode Fuzzy Hash: eb08e47ba7f9885a10e2eadb607a5919a4f75045d7237e5dc677f370139bf9f6
                                                      • Instruction Fuzzy Hash: 1A21A1755093809FD7128B29CC85B52BFE8EF06220F0984DAD985CF263D274E904CB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetProcessTimes.KERNELBASE(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 05ED1371
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: ProcessTimes
                                                      • String ID:
                                                      • API String ID: 1995159646-0
                                                      • Opcode ID: 4bb51391a908e10f9616f160373bdb837e22d0ddb4a8b8f98b14e674dede37cc
                                                      • Instruction ID: 5cd5e1d4ee6956286dc238a4f88a99cd77b2a20ce15cdf12ffbcdc4900c48511
                                                      • Opcode Fuzzy Hash: 4bb51391a908e10f9616f160373bdb837e22d0ddb4a8b8f98b14e674dede37cc
                                                      • Instruction Fuzzy Hash: 1211E272600200AFEB21CF55DC45FAAFBE8EF14724F04846AED458BA51D375E409CBB1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindCloseChangeNotification.KERNELBASE(?), ref: 0174ABF0
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: ChangeCloseFindNotification
                                                      • String ID:
                                                      • API String ID: 2591292051-0
                                                      • Opcode ID: ddaa71ba622a19b1a8a1fee3cd5084a4f2d171c4894385fcdd42c49502026cb1
                                                      • Instruction ID: b4deae1c240991cf02c224538ba458a8250d2d13d5254444b80b2696e348c2be
                                                      • Opcode Fuzzy Hash: ddaa71ba622a19b1a8a1fee3cd5084a4f2d171c4894385fcdd42c49502026cb1
                                                      • Instruction Fuzzy Hash: 7F21D5755087C09FD7128B29DC55752BFB8EF02320F0984DBDC858B563D335A908C761
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindCloseChangeNotification.KERNELBASE(?), ref: 0174A690
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: ChangeCloseFindNotification
                                                      • String ID:
                                                      • API String ID: 2591292051-0
                                                      • Opcode ID: a7c1206f37fff5c414de270f2737fb041adba65cdffbd277df0bff46a4babfb0
                                                      • Instruction ID: db34cefe79e5e33f6a5aab8d54257d5715a195ffc07e46a473530d75a16b771a
                                                      • Opcode Fuzzy Hash: a7c1206f37fff5c414de270f2737fb041adba65cdffbd277df0bff46a4babfb0
                                                      • Instruction Fuzzy Hash: 3E214A715093C45FDB128B25DC94B52BFB4EF47220F0984DBDD859F1A3D2659908CBB2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetProcessWorkingSetSize.KERNEL32(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 05ED2A43
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: ProcessSizeWorking
                                                      • String ID:
                                                      • API String ID: 3584180929-0
                                                      • Opcode ID: 5955f6a037c60aa2c19cdae8405bc949d6b9b0f1ad79df287d75d96c09fe5d3f
                                                      • Instruction ID: 9287919d937f573cfd7a4a54381b2562dd03dc8251c7de01b321716c6b9ee1e8
                                                      • Opcode Fuzzy Hash: 5955f6a037c60aa2c19cdae8405bc949d6b9b0f1ad79df287d75d96c09fe5d3f
                                                      • Instruction Fuzzy Hash: 9111EF75600200AFEB20CF65CC45BAAFBA8EF15324F04C46AEE45CF641D375E9098BB1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetProcessWorkingSetSize.KERNEL32(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 05ED295F
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: ProcessSizeWorking
                                                      • String ID:
                                                      • API String ID: 3584180929-0
                                                      • Opcode ID: 5955f6a037c60aa2c19cdae8405bc949d6b9b0f1ad79df287d75d96c09fe5d3f
                                                      • Instruction ID: ad7abbb99b2dfaf3c1d64527a8fa66791aba71382493cbd851dd011e0975b699
                                                      • Opcode Fuzzy Hash: 5955f6a037c60aa2c19cdae8405bc949d6b9b0f1ad79df287d75d96c09fe5d3f
                                                      • Instruction Fuzzy Hash: D011C475600200AFEB20CF65DC45FA6F7A8EF55724F08846AEE45CB641D374E5098AB2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetExitCodeProcess.KERNELBASE(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 05ED2880
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: CodeExitProcess
                                                      • String ID:
                                                      • API String ID: 3861947596-0
                                                      • Opcode ID: f71c2acaaaf04db17209ccead84a2f63ada95a14a8db621392d6319ad8f691ae
                                                      • Instruction ID: 7f4dfddbbb75731a20072ad8f2e7a44c7e7705a3850d2f8f5ffa657ea3752b37
                                                      • Opcode Fuzzy Hash: f71c2acaaaf04db17209ccead84a2f63ada95a14a8db621392d6319ad8f691ae
                                                      • Instruction Fuzzy Hash: 1311E375600200AFEB20CF55DC85FAAF7ACEF15724F0484AAEE45CB641D375E5098BB1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0174A5DE
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: DuplicateHandle
                                                      • String ID:
                                                      • API String ID: 3793708945-0
                                                      • Opcode ID: 49510292c8f5d792e8231965cc97bf73f19563dbb185bee1488afd94289010d7
                                                      • Instruction ID: 12f26ce7ad11f45adaa8bc2005f1ffaa0fdf6cc6fdb4d9b2a7990b03ba3de0cb
                                                      • Opcode Fuzzy Hash: 49510292c8f5d792e8231965cc97bf73f19563dbb185bee1488afd94289010d7
                                                      • Instruction Fuzzy Hash: C2117271549380AFDB228F55DC44A62FFF4EF4A310F0888DEED858B562C375A518DB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • WriteFile.KERNELBASE(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 0174AE4D
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: FileWrite
                                                      • String ID:
                                                      • API String ID: 3934441357-0
                                                      • Opcode ID: 23b72b7bb63767d83a834607899fdc24ebfd8d841a723e9d500582aca7dbfc0b
                                                      • Instruction ID: 9d0a733a5ee2e14004015e85198f35bddc43807c8b431f1966be8d012952b630
                                                      • Opcode Fuzzy Hash: 23b72b7bb63767d83a834607899fdc24ebfd8d841a723e9d500582aca7dbfc0b
                                                      • Instruction Fuzzy Hash: 2711BF72500200AFEB31CF55DC45FA6FBA8EF19724F0484AAEA468B651C375E5088BB2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • DeleteFileW.KERNELBASE(?), ref: 0174B908
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: DeleteFile
                                                      • String ID:
                                                      • API String ID: 4033686569-0
                                                      • Opcode ID: 427d2937f0be2e2b959a90ebe95c7591198e369798b29ce08d06996570f5c154
                                                      • Instruction ID: 96be5a5488fb70f42ef5f1b509dcb8f96a12470bef643ecf181e46cea88a6ee7
                                                      • Opcode Fuzzy Hash: 427d2937f0be2e2b959a90ebe95c7591198e369798b29ce08d06996570f5c154
                                                      • Instruction Fuzzy Hash: 721160756093809FDB11CB29DC85B52BFE8EF46220F0984AAED85CB252D275E948CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ioctlsocket.WS2_32(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 05ED23D7
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: ioctlsocket
                                                      • String ID:
                                                      • API String ID: 3577187118-0
                                                      • Opcode ID: da38bf0d7cc534c29b2e8090f1970e9c58c57fa7ffcd6043fb0af53588ba9b9e
                                                      • Instruction ID: 5d8b271ec4a3b9adcbd434acff567a276f986d980ae6fd8e52a3a20d2f436699
                                                      • Opcode Fuzzy Hash: da38bf0d7cc534c29b2e8090f1970e9c58c57fa7ffcd6043fb0af53588ba9b9e
                                                      • Instruction Fuzzy Hash: 8611E075500200AFEB21CF51DC44FA6FBA8EF14728F04C4AAEE859B641D374E5098AB6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • shutdown.WS2_32(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 05ED10A0
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: shutdown
                                                      • String ID:
                                                      • API String ID: 2510479042-0
                                                      • Opcode ID: 487736564817a27c2e557093174e97c3f02fafdf7b746e35d37a4916a9adf6f9
                                                      • Instruction ID: bd69c7fdcc3f6c6b94aaee8381207cb2601f9874932e3aa0d39bda1e8daa6967
                                                      • Opcode Fuzzy Hash: 487736564817a27c2e557093174e97c3f02fafdf7b746e35d37a4916a9adf6f9
                                                      • Instruction Fuzzy Hash: 3B110271500244AFEB20DF51DC84FAAFBA8EF14728F04C4AAED448F641D374E509CAB2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LoadLibraryA.KERNELBASE(?,00000E24), ref: 05ED18F3
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: 5d8104bc90183aa4069b6762ac26d085ebc43ad6defee75ac6baa5d14636f22c
                                                      • Instruction ID: d555351cbce3fbc40b3df3edb266e8f2aacdbdf84de495137701abccc70135bb
                                                      • Opcode Fuzzy Hash: 5d8104bc90183aa4069b6762ac26d085ebc43ad6defee75ac6baa5d14636f22c
                                                      • Instruction Fuzzy Hash: 5111E571600200AFE720DB15DD41FB6F7A8DF15728F148099FD449A781D3B5E549CAB2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: select
                                                      • String ID:
                                                      • API String ID: 1274211008-0
                                                      • Opcode ID: c688f5cc7810d6eee56f44a3182f6d26f9d461d8b85ec4934aafd9d02889713f
                                                      • Instruction ID: 28e497d61cd590c1fb337c950298bafcc76fcc6e38346d157eb096b58d207b2c
                                                      • Opcode Fuzzy Hash: c688f5cc7810d6eee56f44a3182f6d26f9d461d8b85ec4934aafd9d02889713f
                                                      • Instruction Fuzzy Hash: 3E115B796042009FEB20CF55D884BA6FBE8FF04624F0884AADE898B651D375E409CB71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CopyFileW.KERNELBASE(?,?,?), ref: 0174B84E
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: CopyFile
                                                      • String ID:
                                                      • API String ID: 1304948518-0
                                                      • Opcode ID: d08ef2964adaefdf790adadbb4d777cb99ff3024cfda1ed883830ae37fc30229
                                                      • Instruction ID: dc08c674de2cee2dcdecc7e4f54b2b67b0b2b29ad01c684be1a2349e8e550f6f
                                                      • Opcode Fuzzy Hash: d08ef2964adaefdf790adadbb4d777cb99ff3024cfda1ed883830ae37fc30229
                                                      • Instruction Fuzzy Hash: 9D115E716402049FEB10CF6AD885B56FBECEF15624F08C4AADD49CB652D375E808CAA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetFileType.KERNELBASE(?,00000E24,74469BA2,00000000,00000000,00000000,00000000), ref: 0174ACBD
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: FileType
                                                      • String ID:
                                                      • API String ID: 3081899298-0
                                                      • Opcode ID: 0f054abce7dfc66c20cb115cc7c990133dff883c03b99bbb48d6378c00a51b1a
                                                      • Instruction ID: 7f1510f1a90b183a664a3a9ecd1604c3006449b2a1ca27bf914593132b76c9a7
                                                      • Opcode Fuzzy Hash: 0f054abce7dfc66c20cb115cc7c990133dff883c03b99bbb48d6378c00a51b1a
                                                      • Instruction Fuzzy Hash: D101D271541200AFE760CB05DC85BA6F7ACDF25724F04C09AEE059B781D374E5088AB6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 05ED162A
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: Connect
                                                      • String ID:
                                                      • API String ID: 3144859779-0
                                                      • Opcode ID: 081674beb05546420207ac4a10a6222126ea17c5cfe8438e755148118fa4b01e
                                                      • Instruction ID: 1f137309e9976c7a29cb134bda3719efe8a81fdd56f19a8e06eea47115143b83
                                                      • Opcode Fuzzy Hash: 081674beb05546420207ac4a10a6222126ea17c5cfe8438e755148118fa4b01e
                                                      • Instruction Fuzzy Hash: 0611A0715002009FEB20CF55D884B62FBE4FF04314F0884AADE898B612D372E419CF72
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetFileAttributesW.KERNELBASE(?,?), ref: 0174B9BF
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: 11be6d611dd2e6b2ed8bbad5df41694f4bb2489c14de0cb5fea32ca6707b8673
                                                      • Instruction ID: 53d86d384c2f3d1f7dd387781aa85fc4030b270969febb3ba70296ab9f7ecc94
                                                      • Opcode Fuzzy Hash: 11be6d611dd2e6b2ed8bbad5df41694f4bb2489c14de0cb5fea32ca6707b8673
                                                      • Instruction Fuzzy Hash: 49018C75604240DFEB10CF2AD885766FBE8EF05324F0884AADD49CB752D375E804CA62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • DeleteFileW.KERNELBASE(?), ref: 0174B908
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: DeleteFile
                                                      • String ID:
                                                      • API String ID: 4033686569-0
                                                      • Opcode ID: 8f6740c885c079d4da77a2b0b3206533dd5b7eb417996c29628bd8bc8c494831
                                                      • Instruction ID: 2d15bb8e9a05e1e9b71cbfd8bc19b3f05acab46f777e9e2a5a4d9f28f78bf764
                                                      • Opcode Fuzzy Hash: 8f6740c885c079d4da77a2b0b3206533dd5b7eb417996c29628bd8bc8c494831
                                                      • Instruction Fuzzy Hash: 5F015E75A042449FEB10CF2AD885766FBE8EF15624F0884AADD49CB742D375E904CA62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0174A5DE
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: DuplicateHandle
                                                      • String ID:
                                                      • API String ID: 3793708945-0
                                                      • Opcode ID: 203beb830eae00ccba4f07ba748750399cd5530dbb95a65cace5f6315dfd81d0
                                                      • Instruction ID: ddc4084dde6784d4eba39b66ab401badb16dba8f33038d8a1493f1b68401ee1b
                                                      • Opcode Fuzzy Hash: 203beb830eae00ccba4f07ba748750399cd5530dbb95a65cace5f6315dfd81d0
                                                      • Instruction Fuzzy Hash: C1016D725006009FDB218F55D944B52FFE4EF49724F08C9AEEE4A4B652C376E418DFA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 05ED0706
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433238365.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5ed0000_server.jbxd
                                                      Similarity
                                                      • API ID: QueryValue
                                                      • String ID:
                                                      • API String ID: 3660427363-0
                                                      • Opcode ID: f2ad548fd262a739ae26c2ee43fa938ca4d2326a56a0c38456ac223b5a5e2691
                                                      • Instruction ID: 94861ca45676894549d0b2b15ee730713a79a096b9d8f27eac5a20014fd1165e
                                                      • Opcode Fuzzy Hash: f2ad548fd262a739ae26c2ee43fa938ca4d2326a56a0c38456ac223b5a5e2691
                                                      • Instruction Fuzzy Hash: 5D01D671600200ABD310DF16CC46B66FBE8FB88B20F14815AED089BB41D771F915CBE6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindCloseChangeNotification.KERNELBASE(?), ref: 0174ABF0
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: ChangeCloseFindNotification
                                                      • String ID:
                                                      • API String ID: 2591292051-0
                                                      • Opcode ID: 8e50e5b8bd254cf80d1415fbd8c41190c463582e4b16821c02baa6a0f495e0b3
                                                      • Instruction ID: b98664942e416538114bbb0d184ee2d234a90a80f4f85886610f2774c9235812
                                                      • Opcode Fuzzy Hash: 8e50e5b8bd254cf80d1415fbd8c41190c463582e4b16821c02baa6a0f495e0b3
                                                      • Instruction Fuzzy Hash: 63018F71A042449FDB50CF5AE885766FBE8EF05324F08C4AADD4A8F652D375E408CA62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • OleGetClipboard.OLE32(?,00000E24,?,?), ref: 0174A77E
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: Clipboard
                                                      • String ID:
                                                      • API String ID: 220874293-0
                                                      • Opcode ID: b5899c7ec7b307b8721be95941e2b7168f44ee802e205a156c73a69a7b935baf
                                                      • Instruction ID: 4ccdd588f64af526e5c4069a2bcf312aedfbb55693f5e29835704cdd8d93ef62
                                                      • Opcode Fuzzy Hash: b5899c7ec7b307b8721be95941e2b7168f44ee802e205a156c73a69a7b935baf
                                                      • Instruction Fuzzy Hash: 0801D671600200ABD310DF16CC46B66FBE8FB88A20F148159ED089BB41D771F915CBE6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: send
                                                      • String ID:
                                                      • API String ID: 2809346765-0
                                                      • Opcode ID: d5d1ee87b686cde1ebb455b35d84c25c1f9c66b8bd3000e351993cab96214cb1
                                                      • Instruction ID: 1d8633a64db07faf24d58f9ab6c8138dec9333bf79a4dab3374e653104e2a007
                                                      • Opcode Fuzzy Hash: d5d1ee87b686cde1ebb455b35d84c25c1f9c66b8bd3000e351993cab96214cb1
                                                      • Instruction Fuzzy Hash: 84019E315042409FDB20CF59D844B62FBF4EF15324F08C4AADE4A4B612C375E418CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindCloseChangeNotification.KERNELBASE(?), ref: 0174A690
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: ChangeCloseFindNotification
                                                      • String ID:
                                                      • API String ID: 2591292051-0
                                                      • Opcode ID: fc8bfb53fdcbc62afa706c1547df30c9bb23a1675ab2aad140cb17e42b3c01f4
                                                      • Instruction ID: e91fdb316ee2daa7711263644ee486f0cdee7cba5d6edaad8e6fad1e7856642a
                                                      • Opcode Fuzzy Hash: fc8bfb53fdcbc62afa706c1547df30c9bb23a1675ab2aad140cb17e42b3c01f4
                                                      • Instruction Fuzzy Hash: D401AD71A042409FDB10CF5AD885766FBE4EF45324F08C4AADD4A8F252D379E408CEA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetErrorMode.KERNELBASE(?), ref: 0174AA44
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425385987.000000000174A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_174a000_server.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode
                                                      • String ID:
                                                      • API String ID: 2340568224-0
                                                      • Opcode ID: 28178f7171a34b43be0a520d141879e3336245e39948a9e18610516938b17dd9
                                                      • Instruction ID: 66335fe755d3a5bb7fc32910a2714bcf8942ce25e3a56081e2c513a231bc7c65
                                                      • Opcode Fuzzy Hash: 28178f7171a34b43be0a520d141879e3336245e39948a9e18610516938b17dd9
                                                      • Instruction Fuzzy Hash: 59F0AF75A402409FDB208F0AD985B65FBE4EF05724F08C0EADD4A4B752D379E608CEA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425603630.0000000001960000.00000040.00000020.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_1960000_server.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6822aa5cbd6a4feff74e540d9514b6fae37c20722a3041304a2d5d0e3407db5e
                                                      • Instruction ID: 450d846bbeba3f997dcf765ac598312c1b92b22aeecc63720b7183f43976ee6e
                                                      • Opcode Fuzzy Hash: 6822aa5cbd6a4feff74e540d9514b6fae37c20722a3041304a2d5d0e3407db5e
                                                      • Instruction Fuzzy Hash: 6E21623450D7C19FC713CB24C890B55BFB1AF46218F1D89EED4898B6A3C33A8846CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433320536.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5f20000_server.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4ecf047aadbda216f4c89b49146576495bb92c350ca322919174bb00b49c4ff9
                                                      • Instruction ID: befdc42fce1894123959fb172100664d32e0813fe119113945e3d4a96cbbdcb8
                                                      • Opcode Fuzzy Hash: 4ecf047aadbda216f4c89b49146576495bb92c350ca322919174bb00b49c4ff9
                                                      • Instruction Fuzzy Hash: 2311BAB5A08341AFD340CF19D841A5BFBE4FB98664F04895EF998D7311D235E914CFA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425603630.0000000001960000.00000040.00000020.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_1960000_server.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8e823b77496ccb3f717bcd0a12a60523a9148bc9b64353c00249c0a47d4408cc
                                                      • Instruction ID: 11ae36d10add7900e0792c5954b6c83846abd65f2a08605edb501be226edd530
                                                      • Opcode Fuzzy Hash: 8e823b77496ccb3f717bcd0a12a60523a9148bc9b64353c00249c0a47d4408cc
                                                      • Instruction Fuzzy Hash: F611E430204280DFD711CB14D580F15BBA9AB99708F28C9ACF94D0BB43C77BD812CAA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433320536.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5f20000_server.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5489788de02e4a8b99939759b7d0420a74a5a84096b0332ae6a77b2910a1605f
                                                      • Instruction ID: 532757698c420e7a9c710cbb3b442a4679c1a301cf657cc19343bc87bdd0c755
                                                      • Opcode Fuzzy Hash: 5489788de02e4a8b99939759b7d0420a74a5a84096b0332ae6a77b2910a1605f
                                                      • Instruction Fuzzy Hash: C511FEB5608301AFD750CF09DC41E57FBE8EB88660F04891EF95997311D271E908CFA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425423395.000000000175A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0175A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_175a000_server.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 39b6bf4fbefe78744b1e2d6e48af9c9859fd1a8a1ec920c5c11b97b6f4453af5
                                                      • Instruction ID: f96f2f07f871d54d41e0d7d7631c275562002cda0500b1889c77dcf77bd0ae97
                                                      • Opcode Fuzzy Hash: 39b6bf4fbefe78744b1e2d6e48af9c9859fd1a8a1ec920c5c11b97b6f4453af5
                                                      • Instruction Fuzzy Hash: 5411FAB5A08301AFD350CF09DC41E5BFBE8EB98660F04891EF99997311D271E908CFA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425603630.0000000001960000.00000040.00000020.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_1960000_server.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6c8eb95b414f277dafeddc2ed16b20c6b00dd2f0f2e558da64b5dafa59a37049
                                                      • Instruction ID: 48d6460afb936dd24f1f5cefa1ba80c14211ad6f1d34864f56542070aaa2ad01
                                                      • Opcode Fuzzy Hash: 6c8eb95b414f277dafeddc2ed16b20c6b00dd2f0f2e558da64b5dafa59a37049
                                                      • Instruction Fuzzy Hash: 2E01A77650D7805FD7128B169C41862FFA8DF86620709C49FEC898BA52D125AC09CB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425603630.0000000001960000.00000040.00000020.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_1960000_server.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c088c5f4422919bb187d7e2321f3437007d1721d3ee5741c69d1989cd7885274
                                                      • Instruction ID: c57e25b3e79a8745de6540a870fd15a71d378ff8bc9000e3ccb416cae5a3732d
                                                      • Opcode Fuzzy Hash: c088c5f4422919bb187d7e2321f3437007d1721d3ee5741c69d1989cd7885274
                                                      • Instruction Fuzzy Hash: 50F01D35148644DFC706CF04D580B15FBA6FB89718F28CAADE94917B52C737D813DA91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425603630.0000000001960000.00000040.00000020.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_1960000_server.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9cde2a3a819a1abb2fa684be51f05f90cd4de1894b0ba8beee1f31ffb4bf5260
                                                      • Instruction ID: b197d1aa38b9dc33a279caad485a9935809c62513677aa47ac19c904cde0e18d
                                                      • Opcode Fuzzy Hash: 9cde2a3a819a1abb2fa684be51f05f90cd4de1894b0ba8beee1f31ffb4bf5260
                                                      • Instruction Fuzzy Hash: 85E092B66046044B9750CF0BEC41452F7D8EB84630B08C07FDC0D8BB01D676B909CEA6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433320536.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5f20000_server.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f1d0d82e7b8713c582cb1bce001902d0bdae2a19cfe49d71ffb865043b8687e4
                                                      • Instruction ID: 7575a0b90efa0090c5f50c26ef6917e469cc5560786200b134965dd345b4c41a
                                                      • Opcode Fuzzy Hash: f1d0d82e7b8713c582cb1bce001902d0bdae2a19cfe49d71ffb865043b8687e4
                                                      • Instruction Fuzzy Hash: B4E0D8B264030467D7108E079C45F52FB9CDB54A30F04C56BED081B742D176B514CAE2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433320536.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5f20000_server.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4bb6de2911cb9e26f79c83c5eb88a1f8a32cbf422869d026a9ad37e7b348a461
                                                      • Instruction ID: ba04b2ee6660f14d9d9b16e6806c8e0083c1394dd583b84a4e71ecfacfb055d9
                                                      • Opcode Fuzzy Hash: 4bb6de2911cb9e26f79c83c5eb88a1f8a32cbf422869d026a9ad37e7b348a461
                                                      • Instruction Fuzzy Hash: 53E0D8B260020067D2109E079C45F53FB9CDB50A30F04C55BED091B702D172B514CEE1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4433320536.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_5f20000_server.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1f6a3a0a0ace3eb8f6f3d09887725634b4bd2e620e0147ad7a637101c4a73b33
                                                      • Instruction ID: 692432f24e07c48814289ec1483162156f987acc9b23773a48da7c4d4fba3603
                                                      • Opcode Fuzzy Hash: 1f6a3a0a0ace3eb8f6f3d09887725634b4bd2e620e0147ad7a637101c4a73b33
                                                      • Instruction Fuzzy Hash: A8E0D8F260030467D6509E079C45F53FB9CDB50A30F04C55BED091B702D172B514CAF1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425423395.000000000175A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0175A000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_175a000_server.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d1b7f04bf6fc310c9f5ab80a31602a9a69a795cff3adef7b5450ba85856c5630
                                                      • Instruction ID: 89e33f155f4eb1e24e2477c6a0a1892a50caa246e27cae9f3bc4105de79e11ec
                                                      • Opcode Fuzzy Hash: d1b7f04bf6fc310c9f5ab80a31602a9a69a795cff3adef7b5450ba85856c5630
                                                      • Instruction Fuzzy Hash: B4E0D8B264020467D2109E079C45F52FB9CDB51A30F04C55BED095B702D172B504CAF1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425373811.0000000001742000.00000040.00000800.00020000.00000000.sdmp, Offset: 01742000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_1742000_server.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 54cc6057364e1f2263c4db8314fb8f97bd723cf2053b9c31a3c17510c0c7190f
                                                      • Instruction ID: 499bf5bfd807ba137d9204bbf2efc35f435cdb3dff72297f57e6eb14fd3ff9ae
                                                      • Opcode Fuzzy Hash: 54cc6057364e1f2263c4db8314fb8f97bd723cf2053b9c31a3c17510c0c7190f
                                                      • Instruction Fuzzy Hash: 7BD02E393006C04FE3128A0CD1A8BA53BE4AB60704F0A00F9AC008BBA3CB28D880C200
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.4425373811.0000000001742000.00000040.00000800.00020000.00000000.sdmp, Offset: 01742000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_1742000_server.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f4cd4296239557935555a4d0f1c04d55d61dbdacb3fd4f96960318b78afc95f3
                                                      • Instruction ID: 2770e9427a8d41f62373a12a4edf8005da315b084fd440a13b2cc685cc351d85
                                                      • Opcode Fuzzy Hash: f4cd4296239557935555a4d0f1c04d55d61dbdacb3fd4f96960318b78afc95f3
                                                      • Instruction Fuzzy Hash: C9D05E342002814BD715DA0CD6D5F597BE4AB50B14F0644E8BC108B762C7A4D8D0CA00
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%